diff --git a/1999/CVE-1999-0524.json b/1999/CVE-1999-0524.json new file mode 100644 index 0000000000..550826c4f4 --- /dev/null +++ b/1999/CVE-1999-0524.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645499, + "name": "CVE-1999-0524", + "full_name": "Live-Hack-CVE\/CVE-1999-0524", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-1999-0524", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-1999-0524 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:01Z", + "updated_at": "2022-12-23T20:25:01Z", + "pushed_at": "2022-12-23T20:25:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json index 9a747d1ae2..8b80ba10b7 100644 --- a/2002/CVE-2002-20001.json +++ b/2002/CVE-2002-20001.json @@ -48,5 +48,34 @@ "forks": 11, "watchers": 138, "score": 0 + }, + { + "id": 581662228, + "name": "CVE-2002-20001", + "full_name": "Live-Hack-CVE\/CVE-2002-20001", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2002-20001", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2002-20001 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:00Z", + "updated_at": "2022-12-23T21:50:00Z", + "pushed_at": "2022-12-23T21:50:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2007/CVE-2007-2727.json b/2007/CVE-2007-2727.json new file mode 100644 index 0000000000..82def74cd4 --- /dev/null +++ b/2007/CVE-2007-2727.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676940, + "name": "CVE-2007-2727", + "full_name": "Live-Hack-CVE\/CVE-2007-2727", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2007-2727", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2007-2727 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:49Z", + "updated_at": "2022-12-23T23:16:49Z", + "pushed_at": "2022-12-23T23:16:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2011/CVE-2011-4329.json b/2011/CVE-2011-4329.json new file mode 100644 index 0000000000..911d75c40b --- /dev/null +++ b/2011/CVE-2011-4329.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617107, + "name": "CVE-2011-4329", + "full_name": "Live-Hack-CVE\/CVE-2011-4329", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2011-4329", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2011-4329 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:14Z", + "updated_at": "2022-12-23T18:20:14Z", + "pushed_at": "2022-12-23T18:20:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2011/CVE-2011-4802.json b/2011/CVE-2011-4802.json new file mode 100644 index 0000000000..361c030e8f --- /dev/null +++ b/2011/CVE-2011-4802.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617165, + "name": "CVE-2011-4802", + "full_name": "Live-Hack-CVE\/CVE-2011-4802", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2011-4802", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2011-4802 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:28Z", + "updated_at": "2022-12-23T18:20:28Z", + "pushed_at": "2022-12-23T18:20:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2011/CVE-2011-4814.json b/2011/CVE-2011-4814.json new file mode 100644 index 0000000000..cd9c26c928 --- /dev/null +++ b/2011/CVE-2011-4814.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617145, + "name": "CVE-2011-4814", + "full_name": "Live-Hack-CVE\/CVE-2011-4814", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2011-4814", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2011-4814 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:24Z", + "updated_at": "2022-12-23T18:20:24Z", + "pushed_at": "2022-12-23T18:20:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2012/CVE-2012-1225.json b/2012/CVE-2012-1225.json new file mode 100644 index 0000000000..5de4a136e1 --- /dev/null +++ b/2012/CVE-2012-1225.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617230, + "name": "CVE-2012-1225", + "full_name": "Live-Hack-CVE\/CVE-2012-1225", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2012-1225", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2012-1225 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:48Z", + "updated_at": "2022-12-23T18:20:48Z", + "pushed_at": "2022-12-23T18:20:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2012/CVE-2012-1226.json b/2012/CVE-2012-1226.json new file mode 100644 index 0000000000..60cbc25c0c --- /dev/null +++ b/2012/CVE-2012-1226.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617220, + "name": "CVE-2012-1226", + "full_name": "Live-Hack-CVE\/CVE-2012-1226", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2012-1226", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2012-1226 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:45Z", + "updated_at": "2022-12-23T18:20:45Z", + "pushed_at": "2022-12-23T18:20:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-2091.json b/2013/CVE-2013-2091.json new file mode 100644 index 0000000000..1236da832b --- /dev/null +++ b/2013/CVE-2013-2091.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617194, + "name": "CVE-2013-2091", + "full_name": "Live-Hack-CVE\/CVE-2013-2091", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-2091", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-2091 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:38Z", + "updated_at": "2022-12-23T18:20:38Z", + "pushed_at": "2022-12-23T18:20:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-2092.json b/2013/CVE-2013-2092.json new file mode 100644 index 0000000000..6e9ee66284 --- /dev/null +++ b/2013/CVE-2013-2092.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617184, + "name": "CVE-2013-2092", + "full_name": "Live-Hack-CVE\/CVE-2013-2092", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-2092", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-2092 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:35Z", + "updated_at": "2022-12-23T18:20:35Z", + "pushed_at": "2022-12-23T18:20:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-2093.json b/2013/CVE-2013-2093.json new file mode 100644 index 0000000000..09a439ecab --- /dev/null +++ b/2013/CVE-2013-2093.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617261, + "name": "CVE-2013-2093", + "full_name": "Live-Hack-CVE\/CVE-2013-2093", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-2093", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-2093 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:55Z", + "updated_at": "2022-12-23T18:20:55Z", + "pushed_at": "2022-12-23T18:20:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-6641.json b/2013/CVE-2013-6641.json new file mode 100644 index 0000000000..3707919c01 --- /dev/null +++ b/2013/CVE-2013-6641.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653228, + "name": "CVE-2013-6641", + "full_name": "Live-Hack-CVE\/CVE-2013-6641", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-6641", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-6641 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:29Z", + "updated_at": "2022-12-23T21:03:29Z", + "pushed_at": "2022-12-23T21:03:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-6644.json b/2013/CVE-2013-6644.json new file mode 100644 index 0000000000..aca4395a2e --- /dev/null +++ b/2013/CVE-2013-6644.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653215, + "name": "CVE-2013-6644", + "full_name": "Live-Hack-CVE\/CVE-2013-6644", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-6644", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-6644 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:26Z", + "updated_at": "2022-12-23T21:03:26Z", + "pushed_at": "2022-12-23T21:03:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-6645.json b/2013/CVE-2013-6645.json new file mode 100644 index 0000000000..fe46086964 --- /dev/null +++ b/2013/CVE-2013-6645.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653242, + "name": "CVE-2013-6645", + "full_name": "Live-Hack-CVE\/CVE-2013-6645", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-6645", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-6645 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:33Z", + "updated_at": "2022-12-23T21:03:33Z", + "pushed_at": "2022-12-23T21:03:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2013/CVE-2013-6646.json b/2013/CVE-2013-6646.json new file mode 100644 index 0000000000..11792a529a --- /dev/null +++ b/2013/CVE-2013-6646.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653285, + "name": "CVE-2013-6646", + "full_name": "Live-Hack-CVE\/CVE-2013-6646", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2013-6646", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2013-6646 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:44Z", + "updated_at": "2022-12-23T21:03:44Z", + "pushed_at": "2022-12-23T21:03:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index ea694f80c8..f9a8145f7e 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1663,5 +1663,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581637716, + "name": "CVE-2014-0160", + "full_name": "Live-Hack-CVE\/CVE-2014-0160", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-0160", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-0160 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:41Z", + "updated_at": "2022-12-23T19:48:41Z", + "pushed_at": "2022-12-23T19:48:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-1705.json b/2014/CVE-2014-1705.json new file mode 100644 index 0000000000..5999d29df1 --- /dev/null +++ b/2014/CVE-2014-1705.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653802, + "name": "CVE-2014-1705", + "full_name": "Live-Hack-CVE\/CVE-2014-1705", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1705", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1705 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:14Z", + "updated_at": "2022-12-23T21:06:14Z", + "pushed_at": "2022-12-23T21:06:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1713.json b/2014/CVE-2014-1713.json new file mode 100644 index 0000000000..7a51493d19 --- /dev/null +++ b/2014/CVE-2014-1713.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653778, + "name": "CVE-2014-1713", + "full_name": "Live-Hack-CVE\/CVE-2014-1713", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1713", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1713 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:06Z", + "updated_at": "2022-12-23T21:06:07Z", + "pushed_at": "2022-12-23T21:06:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1714.json b/2014/CVE-2014-1714.json new file mode 100644 index 0000000000..16ffea3d3e --- /dev/null +++ b/2014/CVE-2014-1714.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653794, + "name": "CVE-2014-1714", + "full_name": "Live-Hack-CVE\/CVE-2014-1714", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1714", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1714 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:10Z", + "updated_at": "2022-12-23T21:06:10Z", + "pushed_at": "2022-12-23T21:06:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1715.json b/2014/CVE-2014-1715.json new file mode 100644 index 0000000000..a86093648d --- /dev/null +++ b/2014/CVE-2014-1715.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653763, + "name": "CVE-2014-1715", + "full_name": "Live-Hack-CVE\/CVE-2014-1715", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1715", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1715 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:03Z", + "updated_at": "2022-12-23T21:11:12Z", + "pushed_at": "2022-12-23T21:06:05Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1730.json b/2014/CVE-2014-1730.json new file mode 100644 index 0000000000..073c724f86 --- /dev/null +++ b/2014/CVE-2014-1730.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653696, + "name": "CVE-2014-1730", + "full_name": "Live-Hack-CVE\/CVE-2014-1730", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1730", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1730 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:44Z", + "updated_at": "2022-12-23T21:05:44Z", + "pushed_at": "2022-12-23T21:05:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1731.json b/2014/CVE-2014-1731.json new file mode 100644 index 0000000000..f3734f8131 --- /dev/null +++ b/2014/CVE-2014-1731.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653709, + "name": "CVE-2014-1731", + "full_name": "Live-Hack-CVE\/CVE-2014-1731", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1731", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1731 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:48Z", + "updated_at": "2022-12-23T21:05:48Z", + "pushed_at": "2022-12-23T21:05:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1732.json b/2014/CVE-2014-1732.json new file mode 100644 index 0000000000..13cb13b54a --- /dev/null +++ b/2014/CVE-2014-1732.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653409, + "name": "CVE-2014-1732", + "full_name": "Live-Hack-CVE\/CVE-2014-1732", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1732", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1732 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:19Z", + "updated_at": "2022-12-23T21:04:19Z", + "pushed_at": "2022-12-23T21:04:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1733.json b/2014/CVE-2014-1733.json new file mode 100644 index 0000000000..785af09ca9 --- /dev/null +++ b/2014/CVE-2014-1733.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653447, + "name": "CVE-2014-1733", + "full_name": "Live-Hack-CVE\/CVE-2014-1733", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1733", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1733 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:29Z", + "updated_at": "2022-12-23T21:04:29Z", + "pushed_at": "2022-12-23T21:04:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1734.json b/2014/CVE-2014-1734.json new file mode 100644 index 0000000000..3db255f67a --- /dev/null +++ b/2014/CVE-2014-1734.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653738, + "name": "CVE-2014-1734", + "full_name": "Live-Hack-CVE\/CVE-2014-1734", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1734", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1734 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:56Z", + "updated_at": "2022-12-23T21:05:56Z", + "pushed_at": "2022-12-23T21:05:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1735.json b/2014/CVE-2014-1735.json new file mode 100644 index 0000000000..c2984036db --- /dev/null +++ b/2014/CVE-2014-1735.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653878, + "name": "CVE-2014-1735", + "full_name": "Live-Hack-CVE\/CVE-2014-1735", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1735", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1735 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:34Z", + "updated_at": "2022-12-23T21:06:34Z", + "pushed_at": "2022-12-23T21:06:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-1736.json b/2014/CVE-2014-1736.json new file mode 100644 index 0000000000..b242af971f --- /dev/null +++ b/2014/CVE-2014-1736.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653754, + "name": "CVE-2014-1736", + "full_name": "Live-Hack-CVE\/CVE-2014-1736", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-1736", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-1736 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:59Z", + "updated_at": "2022-12-23T21:05:59Z", + "pushed_at": "2022-12-23T21:06:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-3166.json b/2014/CVE-2014-3166.json new file mode 100644 index 0000000000..07de335257 --- /dev/null +++ b/2014/CVE-2014-3166.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653726, + "name": "CVE-2014-3166", + "full_name": "Live-Hack-CVE\/CVE-2014-3166", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-3166", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-3166 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:52Z", + "updated_at": "2022-12-23T21:05:52Z", + "pushed_at": "2022-12-23T21:05:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-3515.json b/2014/CVE-2014-3515.json new file mode 100644 index 0000000000..18ac0730a7 --- /dev/null +++ b/2014/CVE-2014-3515.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668928, + "name": "CVE-2014-3515", + "full_name": "Live-Hack-CVE\/CVE-2014-3515", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-3515", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-3515 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:10Z", + "updated_at": "2022-12-23T22:28:10Z", + "pushed_at": "2022-12-23T22:28:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-3710.json b/2014/CVE-2014-3710.json new file mode 100644 index 0000000000..d2abdc5543 --- /dev/null +++ b/2014/CVE-2014-3710.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681751, + "name": "CVE-2014-3710", + "full_name": "Live-Hack-CVE\/CVE-2014-3710", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-3710", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-3710 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:25Z", + "updated_at": "2022-12-23T23:49:25Z", + "pushed_at": "2022-12-23T23:49:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-3991.json b/2014/CVE-2014-3991.json new file mode 100644 index 0000000000..ebd914ac60 --- /dev/null +++ b/2014/CVE-2014-3991.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617120, + "name": "CVE-2014-3991", + "full_name": "Live-Hack-CVE\/CVE-2014-3991", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-3991", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-3991 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:18Z", + "updated_at": "2022-12-23T18:20:18Z", + "pushed_at": "2022-12-23T18:20:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-3992.json b/2014/CVE-2014-3992.json new file mode 100644 index 0000000000..e61b936e28 --- /dev/null +++ b/2014/CVE-2014-3992.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617174, + "name": "CVE-2014-3992", + "full_name": "Live-Hack-CVE\/CVE-2014-3992", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-3992", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-3992 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:31Z", + "updated_at": "2022-12-23T18:20:31Z", + "pushed_at": "2022-12-23T18:20:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-4717.json b/2014/CVE-2014-4717.json new file mode 100644 index 0000000000..2135f80c40 --- /dev/null +++ b/2014/CVE-2014-4717.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638416, + "name": "CVE-2014-4717", + "full_name": "Live-Hack-CVE\/CVE-2014-4717", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-4717", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-4717 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:48Z", + "updated_at": "2022-12-23T19:51:48Z", + "pushed_at": "2022-12-23T19:51:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2014/CVE-2014-9709.json b/2014/CVE-2014-9709.json new file mode 100644 index 0000000000..3ff7881e3c --- /dev/null +++ b/2014/CVE-2014-9709.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668944, + "name": "CVE-2014-9709", + "full_name": "Live-Hack-CVE\/CVE-2014-9709", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2014-9709", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2014-9709 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:14Z", + "updated_at": "2022-12-23T22:28:14Z", + "pushed_at": "2022-12-23T22:28:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-1352.json b/2015/CVE-2015-1352.json new file mode 100644 index 0000000000..b43024c761 --- /dev/null +++ b/2015/CVE-2015-1352.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681757, + "name": "CVE-2015-1352", + "full_name": "Live-Hack-CVE\/CVE-2015-1352", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-1352", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2015-1352 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:28Z", + "updated_at": "2022-12-23T23:49:28Z", + "pushed_at": "2022-12-23T23:49:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2015/CVE-2015-8873.json b/2015/CVE-2015-8873.json new file mode 100644 index 0000000000..e1fb7a6102 --- /dev/null +++ b/2015/CVE-2015-8873.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681767, + "name": "CVE-2015-8873", + "full_name": "Live-Hack-CVE\/CVE-2015-8873", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2015-8873", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2015-8873 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:32Z", + "updated_at": "2022-12-23T23:49:32Z", + "pushed_at": "2022-12-23T23:49:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-1019.json b/2016/CVE-2016-1019.json new file mode 100644 index 0000000000..41fff689e0 --- /dev/null +++ b/2016/CVE-2016-1019.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653252, + "name": "CVE-2016-1019", + "full_name": "Live-Hack-CVE\/CVE-2016-1019", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-1019", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-1019 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:37Z", + "updated_at": "2022-12-23T21:03:37Z", + "pushed_at": "2022-12-23T21:03:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-2031.json b/2016/CVE-2016-2031.json new file mode 100644 index 0000000000..0cab275ea0 --- /dev/null +++ b/2016/CVE-2016-2031.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654865, + "name": "CVE-2016-2031", + "full_name": "Live-Hack-CVE\/CVE-2016-2031", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-2031", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-2031 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:22Z", + "updated_at": "2022-12-23T21:11:22Z", + "pushed_at": "2022-12-23T21:11:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-3735.json b/2016/CVE-2016-3735.json new file mode 100644 index 0000000000..2551513efc --- /dev/null +++ b/2016/CVE-2016-3735.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676414, + "name": "CVE-2016-3735", + "full_name": "Live-Hack-CVE\/CVE-2016-3735", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-3735", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-3735 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:22Z", + "updated_at": "2022-12-23T23:13:22Z", + "pushed_at": "2022-12-23T23:13:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4271.json b/2016/CVE-2016-4271.json new file mode 100644 index 0000000000..aa3a2a8480 --- /dev/null +++ b/2016/CVE-2016-4271.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645471, + "name": "CVE-2016-4271", + "full_name": "Live-Hack-CVE\/CVE-2016-4271", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4271", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4271 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:51Z", + "updated_at": "2022-12-23T20:24:51Z", + "pushed_at": "2022-12-23T20:24:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4274.json b/2016/CVE-2016-4274.json new file mode 100644 index 0000000000..f648b611a1 --- /dev/null +++ b/2016/CVE-2016-4274.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645461, + "name": "CVE-2016-4274", + "full_name": "Live-Hack-CVE\/CVE-2016-4274", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4274", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4274 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:47Z", + "updated_at": "2022-12-23T20:24:47Z", + "pushed_at": "2022-12-23T20:24:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4275.json b/2016/CVE-2016-4275.json new file mode 100644 index 0000000000..d3a13a29ad --- /dev/null +++ b/2016/CVE-2016-4275.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645488, + "name": "CVE-2016-4275", + "full_name": "Live-Hack-CVE\/CVE-2016-4275", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4275", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4275 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:58Z", + "updated_at": "2022-12-23T20:24:58Z", + "pushed_at": "2022-12-23T20:24:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4276.json b/2016/CVE-2016-4276.json new file mode 100644 index 0000000000..f783eca791 --- /dev/null +++ b/2016/CVE-2016-4276.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645478, + "name": "CVE-2016-4276", + "full_name": "Live-Hack-CVE\/CVE-2016-4276", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4276", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4276 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:54Z", + "updated_at": "2022-12-23T20:24:54Z", + "pushed_at": "2022-12-23T20:24:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4277.json b/2016/CVE-2016-4277.json new file mode 100644 index 0000000000..eced133c45 --- /dev/null +++ b/2016/CVE-2016-4277.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647146, + "name": "CVE-2016-4277", + "full_name": "Live-Hack-CVE\/CVE-2016-4277", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4277", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4277 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:33:01Z", + "updated_at": "2022-12-23T20:33:01Z", + "pushed_at": "2022-12-23T20:33:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4280.json b/2016/CVE-2016-4280.json new file mode 100644 index 0000000000..a82fd649e0 --- /dev/null +++ b/2016/CVE-2016-4280.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647196, + "name": "CVE-2016-4280", + "full_name": "Live-Hack-CVE\/CVE-2016-4280", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4280", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4280 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:33:14Z", + "updated_at": "2022-12-23T20:33:14Z", + "pushed_at": "2022-12-23T20:33:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4281.json b/2016/CVE-2016-4281.json new file mode 100644 index 0000000000..1e17909f39 --- /dev/null +++ b/2016/CVE-2016-4281.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647179, + "name": "CVE-2016-4281", + "full_name": "Live-Hack-CVE\/CVE-2016-4281", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4281", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4281 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:33:11Z", + "updated_at": "2022-12-23T20:33:11Z", + "pushed_at": "2022-12-23T20:33:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4282.json b/2016/CVE-2016-4282.json new file mode 100644 index 0000000000..a79ad83f0d --- /dev/null +++ b/2016/CVE-2016-4282.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647172, + "name": "CVE-2016-4282", + "full_name": "Live-Hack-CVE\/CVE-2016-4282", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4282", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4282 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:33:07Z", + "updated_at": "2022-12-23T20:33:07Z", + "pushed_at": "2022-12-23T20:33:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4283.json b/2016/CVE-2016-4283.json new file mode 100644 index 0000000000..95d6b5f968 --- /dev/null +++ b/2016/CVE-2016-4283.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653205, + "name": "CVE-2016-4283", + "full_name": "Live-Hack-CVE\/CVE-2016-4283", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4283", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4283 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:23Z", + "updated_at": "2022-12-23T21:03:23Z", + "pushed_at": "2022-12-23T21:03:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4284.json b/2016/CVE-2016-4284.json new file mode 100644 index 0000000000..849870faea --- /dev/null +++ b/2016/CVE-2016-4284.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653192, + "name": "CVE-2016-4284", + "full_name": "Live-Hack-CVE\/CVE-2016-4284", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4284", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4284 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:19Z", + "updated_at": "2022-12-23T21:03:19Z", + "pushed_at": "2022-12-23T21:03:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-4287.json b/2016/CVE-2016-4287.json new file mode 100644 index 0000000000..dc3d1f40f8 --- /dev/null +++ b/2016/CVE-2016-4287.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647164, + "name": "CVE-2016-4287", + "full_name": "Live-Hack-CVE\/CVE-2016-4287", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-4287", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-4287 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:33:04Z", + "updated_at": "2022-12-23T20:33:04Z", + "pushed_at": "2022-12-23T20:33:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-6922.json b/2016/CVE-2016-6922.json new file mode 100644 index 0000000000..6c281381b7 --- /dev/null +++ b/2016/CVE-2016-6922.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645448, + "name": "CVE-2016-6922", + "full_name": "Live-Hack-CVE\/CVE-2016-6922", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6922", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-6922 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:44Z", + "updated_at": "2022-12-23T20:24:44Z", + "pushed_at": "2022-12-23T20:24:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-6924.json b/2016/CVE-2016-6924.json new file mode 100644 index 0000000000..25861f19a7 --- /dev/null +++ b/2016/CVE-2016-6924.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647137, + "name": "CVE-2016-6924", + "full_name": "Live-Hack-CVE\/CVE-2016-6924", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-6924", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-6924 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:57Z", + "updated_at": "2022-12-23T20:32:57Z", + "pushed_at": "2022-12-23T20:32:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7867.json b/2016/CVE-2016-7867.json new file mode 100644 index 0000000000..8e57d7eb25 --- /dev/null +++ b/2016/CVE-2016-7867.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618919, + "name": "CVE-2016-7867", + "full_name": "Live-Hack-CVE\/CVE-2016-7867", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7867", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7867 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:32Z", + "updated_at": "2022-12-23T18:27:32Z", + "pushed_at": "2022-12-23T18:27:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7868.json b/2016/CVE-2016-7868.json new file mode 100644 index 0000000000..59b0a0435a --- /dev/null +++ b/2016/CVE-2016-7868.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618939, + "name": "CVE-2016-7868", + "full_name": "Live-Hack-CVE\/CVE-2016-7868", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7868", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7868 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:35Z", + "updated_at": "2022-12-23T18:27:35Z", + "pushed_at": "2022-12-23T18:27:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7869.json b/2016/CVE-2016-7869.json new file mode 100644 index 0000000000..5930f0fd45 --- /dev/null +++ b/2016/CVE-2016-7869.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618956, + "name": "CVE-2016-7869", + "full_name": "Live-Hack-CVE\/CVE-2016-7869", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7869", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7869 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:38Z", + "updated_at": "2022-12-23T18:27:38Z", + "pushed_at": "2022-12-23T18:27:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7870.json b/2016/CVE-2016-7870.json new file mode 100644 index 0000000000..183d40599c --- /dev/null +++ b/2016/CVE-2016-7870.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618993, + "name": "CVE-2016-7870", + "full_name": "Live-Hack-CVE\/CVE-2016-7870", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7870", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7870 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:48Z", + "updated_at": "2022-12-23T18:27:48Z", + "pushed_at": "2022-12-23T18:27:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7871.json b/2016/CVE-2016-7871.json new file mode 100644 index 0000000000..a3818c6f7c --- /dev/null +++ b/2016/CVE-2016-7871.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618968, + "name": "CVE-2016-7871", + "full_name": "Live-Hack-CVE\/CVE-2016-7871", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7871", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7871 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:42Z", + "updated_at": "2022-12-23T18:27:42Z", + "pushed_at": "2022-12-23T18:27:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7872.json b/2016/CVE-2016-7872.json new file mode 100644 index 0000000000..92b821456f --- /dev/null +++ b/2016/CVE-2016-7872.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618982, + "name": "CVE-2016-7872", + "full_name": "Live-Hack-CVE\/CVE-2016-7872", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7872", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7872 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:45Z", + "updated_at": "2022-12-23T18:27:45Z", + "pushed_at": "2022-12-23T18:27:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7873.json b/2016/CVE-2016-7873.json new file mode 100644 index 0000000000..d286cdfd9d --- /dev/null +++ b/2016/CVE-2016-7873.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619008, + "name": "CVE-2016-7873", + "full_name": "Live-Hack-CVE\/CVE-2016-7873", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7873", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7873 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:52Z", + "updated_at": "2022-12-23T18:27:52Z", + "pushed_at": "2022-12-23T18:27:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7874.json b/2016/CVE-2016-7874.json new file mode 100644 index 0000000000..99a0a9b6bb --- /dev/null +++ b/2016/CVE-2016-7874.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626443, + "name": "CVE-2016-7874", + "full_name": "Live-Hack-CVE\/CVE-2016-7874", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7874", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7874 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:14Z", + "updated_at": "2022-12-23T18:59:14Z", + "pushed_at": "2022-12-23T18:59:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7875.json b/2016/CVE-2016-7875.json new file mode 100644 index 0000000000..f7e65f581c --- /dev/null +++ b/2016/CVE-2016-7875.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626435, + "name": "CVE-2016-7875", + "full_name": "Live-Hack-CVE\/CVE-2016-7875", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7875", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7875 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:10Z", + "updated_at": "2022-12-23T18:59:10Z", + "pushed_at": "2022-12-23T18:59:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7877.json b/2016/CVE-2016-7877.json new file mode 100644 index 0000000000..650672604a --- /dev/null +++ b/2016/CVE-2016-7877.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626419, + "name": "CVE-2016-7877", + "full_name": "Live-Hack-CVE\/CVE-2016-7877", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7877", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7877 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:07Z", + "updated_at": "2022-12-23T18:59:07Z", + "pushed_at": "2022-12-23T18:59:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7878.json b/2016/CVE-2016-7878.json new file mode 100644 index 0000000000..0d05d4767a --- /dev/null +++ b/2016/CVE-2016-7878.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619302, + "name": "CVE-2016-7878", + "full_name": "Live-Hack-CVE\/CVE-2016-7878", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7878", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7878 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:29:02Z", + "updated_at": "2022-12-23T18:29:02Z", + "pushed_at": "2022-12-23T18:29:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7879.json b/2016/CVE-2016-7879.json new file mode 100644 index 0000000000..1fe4746d29 --- /dev/null +++ b/2016/CVE-2016-7879.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619286, + "name": "CVE-2016-7879", + "full_name": "Live-Hack-CVE\/CVE-2016-7879", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7879", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7879 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:58Z", + "updated_at": "2022-12-23T18:28:58Z", + "pushed_at": "2022-12-23T18:29:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7880.json b/2016/CVE-2016-7880.json new file mode 100644 index 0000000000..050d719e12 --- /dev/null +++ b/2016/CVE-2016-7880.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619273, + "name": "CVE-2016-7880", + "full_name": "Live-Hack-CVE\/CVE-2016-7880", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7880", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7880 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:55Z", + "updated_at": "2022-12-23T18:28:55Z", + "pushed_at": "2022-12-23T18:28:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7881.json b/2016/CVE-2016-7881.json new file mode 100644 index 0000000000..62a4101d91 --- /dev/null +++ b/2016/CVE-2016-7881.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619237, + "name": "CVE-2016-7881", + "full_name": "Live-Hack-CVE\/CVE-2016-7881", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7881", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7881 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:48Z", + "updated_at": "2022-12-23T18:28:48Z", + "pushed_at": "2022-12-23T18:28:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7890.json b/2016/CVE-2016-7890.json new file mode 100644 index 0000000000..f3dfe08412 --- /dev/null +++ b/2016/CVE-2016-7890.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619223, + "name": "CVE-2016-7890", + "full_name": "Live-Hack-CVE\/CVE-2016-7890", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7890", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7890 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:45Z", + "updated_at": "2022-12-23T18:28:45Z", + "pushed_at": "2022-12-23T18:28:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2016/CVE-2016-7892.json b/2016/CVE-2016-7892.json new file mode 100644 index 0000000000..ac1e0ef9d1 --- /dev/null +++ b/2016/CVE-2016-7892.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619249, + "name": "CVE-2016-7892", + "full_name": "Live-Hack-CVE\/CVE-2016-7892", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-7892", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2016-7892 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:52Z", + "updated_at": "2022-12-23T18:28:52Z", + "pushed_at": "2022-12-23T18:28:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-1000509.json b/2017/CVE-2017-1000509.json new file mode 100644 index 0000000000..80dfe5943e --- /dev/null +++ b/2017/CVE-2017-1000509.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617270, + "name": "CVE-2017-1000509", + "full_name": "Live-Hack-CVE\/CVE-2017-1000509", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-1000509", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-1000509 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:58Z", + "updated_at": "2022-12-23T18:20:58Z", + "pushed_at": "2022-12-23T18:21:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-11683.json b/2017/CVE-2017-11683.json new file mode 100644 index 0000000000..fdc26d859e --- /dev/null +++ b/2017/CVE-2017-11683.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653556, + "name": "CVE-2017-11683", + "full_name": "Live-Hack-CVE\/CVE-2017-11683", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-11683", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-11683 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:03Z", + "updated_at": "2022-12-23T21:05:03Z", + "pushed_at": "2022-12-23T21:05:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17897.json b/2017/CVE-2017-17897.json new file mode 100644 index 0000000000..1997daaaa2 --- /dev/null +++ b/2017/CVE-2017-17897.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617010, + "name": "CVE-2017-17897", + "full_name": "Live-Hack-CVE\/CVE-2017-17897", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-17897", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-17897 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:19:51Z", + "updated_at": "2022-12-23T18:19:51Z", + "pushed_at": "2022-12-23T18:19:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17898.json b/2017/CVE-2017-17898.json new file mode 100644 index 0000000000..7b0b12d9e5 --- /dev/null +++ b/2017/CVE-2017-17898.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616680, + "name": "CVE-2017-17898", + "full_name": "Live-Hack-CVE\/CVE-2017-17898", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-17898", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-17898 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:34Z", + "updated_at": "2022-12-23T18:18:34Z", + "pushed_at": "2022-12-23T18:18:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17899.json b/2017/CVE-2017-17899.json new file mode 100644 index 0000000000..e21784eb06 --- /dev/null +++ b/2017/CVE-2017-17899.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617053, + "name": "CVE-2017-17899", + "full_name": "Live-Hack-CVE\/CVE-2017-17899", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-17899", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-17899 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:00Z", + "updated_at": "2022-12-23T18:20:00Z", + "pushed_at": "2022-12-23T18:20:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17900.json b/2017/CVE-2017-17900.json new file mode 100644 index 0000000000..78453507ed --- /dev/null +++ b/2017/CVE-2017-17900.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617040, + "name": "CVE-2017-17900", + "full_name": "Live-Hack-CVE\/CVE-2017-17900", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-17900", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-17900 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:19:57Z", + "updated_at": "2022-12-23T18:19:57Z", + "pushed_at": "2022-12-23T18:19:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-17971.json b/2017/CVE-2017-17971.json new file mode 100644 index 0000000000..9219fdd414 --- /dev/null +++ b/2017/CVE-2017-17971.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617079, + "name": "CVE-2017-17971", + "full_name": "Live-Hack-CVE\/CVE-2017-17971", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-17971", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-17971 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:07Z", + "updated_at": "2022-12-23T18:20:07Z", + "pushed_at": "2022-12-23T18:20:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-18926.json b/2017/CVE-2017-18926.json new file mode 100644 index 0000000000..51618a87ce --- /dev/null +++ b/2017/CVE-2017-18926.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628985, + "name": "CVE-2017-18926", + "full_name": "Live-Hack-CVE\/CVE-2017-18926", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-18926", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-18926 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:45Z", + "updated_at": "2022-12-23T19:09:45Z", + "pushed_at": "2022-12-23T19:09:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-20052.json b/2017/CVE-2017-20052.json new file mode 100644 index 0000000000..b206137f00 --- /dev/null +++ b/2017/CVE-2017-20052.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677332, + "name": "CVE-2017-20052", + "full_name": "Live-Hack-CVE\/CVE-2017-20052", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-20052", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-20052 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:19:04Z", + "updated_at": "2022-12-23T23:19:04Z", + "pushed_at": "2022-12-23T23:19:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2926.json b/2017/CVE-2017-2926.json new file mode 100644 index 0000000000..8a97d38af7 --- /dev/null +++ b/2017/CVE-2017-2926.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619182, + "name": "CVE-2017-2926", + "full_name": "Live-Hack-CVE\/CVE-2017-2926", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2926", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2926 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:35Z", + "updated_at": "2022-12-23T18:28:35Z", + "pushed_at": "2022-12-23T18:28:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2932.json b/2017/CVE-2017-2932.json new file mode 100644 index 0000000000..f9c57772ac --- /dev/null +++ b/2017/CVE-2017-2932.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619099, + "name": "CVE-2017-2932", + "full_name": "Live-Hack-CVE\/CVE-2017-2932", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2932", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2932 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:12Z", + "updated_at": "2022-12-23T18:28:12Z", + "pushed_at": "2022-12-23T18:28:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2933.json b/2017/CVE-2017-2933.json new file mode 100644 index 0000000000..765bf69a03 --- /dev/null +++ b/2017/CVE-2017-2933.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619110, + "name": "CVE-2017-2933", + "full_name": "Live-Hack-CVE\/CVE-2017-2933", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2933", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2933 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:16Z", + "updated_at": "2022-12-23T18:28:16Z", + "pushed_at": "2022-12-23T18:28:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2934.json b/2017/CVE-2017-2934.json new file mode 100644 index 0000000000..74f71fa963 --- /dev/null +++ b/2017/CVE-2017-2934.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619122, + "name": "CVE-2017-2934", + "full_name": "Live-Hack-CVE\/CVE-2017-2934", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2934", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2934 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:19Z", + "updated_at": "2022-12-23T18:28:19Z", + "pushed_at": "2022-12-23T18:28:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2935.json b/2017/CVE-2017-2935.json new file mode 100644 index 0000000000..d862a67701 --- /dev/null +++ b/2017/CVE-2017-2935.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619019, + "name": "CVE-2017-2935", + "full_name": "Live-Hack-CVE\/CVE-2017-2935", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2935", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2935 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:27:55Z", + "updated_at": "2022-12-23T18:27:55Z", + "pushed_at": "2022-12-23T18:27:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2936.json b/2017/CVE-2017-2936.json new file mode 100644 index 0000000000..eb2f56e4df --- /dev/null +++ b/2017/CVE-2017-2936.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619139, + "name": "CVE-2017-2936", + "full_name": "Live-Hack-CVE\/CVE-2017-2936", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2936", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2936 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:23Z", + "updated_at": "2022-12-23T18:28:23Z", + "pushed_at": "2022-12-23T18:28:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-2937.json b/2017/CVE-2017-2937.json new file mode 100644 index 0000000000..6164a52817 --- /dev/null +++ b/2017/CVE-2017-2937.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619171, + "name": "CVE-2017-2937", + "full_name": "Live-Hack-CVE\/CVE-2017-2937", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-2937", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-2937 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:31Z", + "updated_at": "2022-12-23T18:28:31Z", + "pushed_at": "2022-12-23T18:28:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3085.json b/2017/CVE-2017-3085.json new file mode 100644 index 0000000000..1703901e01 --- /dev/null +++ b/2017/CVE-2017-3085.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619210, + "name": "CVE-2017-3085", + "full_name": "Live-Hack-CVE\/CVE-2017-3085", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-3085", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-3085 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:42Z", + "updated_at": "2022-12-23T18:28:42Z", + "pushed_at": "2022-12-23T18:28:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-3106.json b/2017/CVE-2017-3106.json new file mode 100644 index 0000000000..031cec1ec4 --- /dev/null +++ b/2017/CVE-2017-3106.json @@ -0,0 +1,31 @@ +[ + { + "id": 581619197, + "name": "CVE-2017-3106", + "full_name": "Live-Hack-CVE\/CVE-2017-3106", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-3106", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-3106 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:28:39Z", + "updated_at": "2022-12-23T18:28:39Z", + "pushed_at": "2022-12-23T18:28:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7886.json b/2017/CVE-2017-7886.json new file mode 100644 index 0000000000..1ce4f6e367 --- /dev/null +++ b/2017/CVE-2017-7886.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616500, + "name": "CVE-2017-7886", + "full_name": "Live-Hack-CVE\/CVE-2017-7886", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-7886", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-7886 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:17:59Z", + "updated_at": "2022-12-23T18:17:59Z", + "pushed_at": "2022-12-23T18:18:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7887.json b/2017/CVE-2017-7887.json new file mode 100644 index 0000000000..580966f18a --- /dev/null +++ b/2017/CVE-2017-7887.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616420, + "name": "CVE-2017-7887", + "full_name": "Live-Hack-CVE\/CVE-2017-7887", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-7887", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-7887 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:17:40Z", + "updated_at": "2022-12-23T18:17:40Z", + "pushed_at": "2022-12-23T18:17:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2017/CVE-2017-7888.json b/2017/CVE-2017-7888.json new file mode 100644 index 0000000000..20284ad2c5 --- /dev/null +++ b/2017/CVE-2017-7888.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616555, + "name": "CVE-2017-7888", + "full_name": "Live-Hack-CVE\/CVE-2017-7888", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2017-7888", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2017-7888 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:10Z", + "updated_at": "2022-12-23T18:18:10Z", + "pushed_at": "2022-12-23T18:18:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-12207.json b/2018/CVE-2018-12207.json new file mode 100644 index 0000000000..765b2074b9 --- /dev/null +++ b/2018/CVE-2018-12207.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646620, + "name": "CVE-2018-12207", + "full_name": "Live-Hack-CVE\/CVE-2018-12207", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-12207", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-12207 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:17Z", + "updated_at": "2022-12-23T20:30:17Z", + "pushed_at": "2022-12-23T20:30:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-13447.json b/2018/CVE-2018-13447.json new file mode 100644 index 0000000000..dd5fa1b885 --- /dev/null +++ b/2018/CVE-2018-13447.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616794, + "name": "CVE-2018-13447", + "full_name": "Live-Hack-CVE\/CVE-2018-13447", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-13447", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-13447 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:55Z", + "updated_at": "2022-12-23T18:18:55Z", + "pushed_at": "2022-12-23T18:18:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19950.json b/2018/CVE-2018-19950.json new file mode 100644 index 0000000000..bc05cb9496 --- /dev/null +++ b/2018/CVE-2018-19950.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635918, + "name": "CVE-2018-19950", + "full_name": "Live-Hack-CVE\/CVE-2018-19950", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19950", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19950 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:32Z", + "updated_at": "2022-12-23T19:41:32Z", + "pushed_at": "2022-12-23T19:41:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19951.json b/2018/CVE-2018-19951.json new file mode 100644 index 0000000000..d932609778 --- /dev/null +++ b/2018/CVE-2018-19951.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629069, + "name": "CVE-2018-19951", + "full_name": "Live-Hack-CVE\/CVE-2018-19951", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19951", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19951 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:06Z", + "updated_at": "2022-12-23T19:10:06Z", + "pushed_at": "2022-12-23T19:10:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19954.json b/2018/CVE-2018-19954.json new file mode 100644 index 0000000000..68f061acc7 --- /dev/null +++ b/2018/CVE-2018-19954.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629041, + "name": "CVE-2018-19954", + "full_name": "Live-Hack-CVE\/CVE-2018-19954", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19954", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19954 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:59Z", + "updated_at": "2022-12-23T19:09:59Z", + "pushed_at": "2022-12-23T19:10:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19955.json b/2018/CVE-2018-19955.json new file mode 100644 index 0000000000..bf873208e1 --- /dev/null +++ b/2018/CVE-2018-19955.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629025, + "name": "CVE-2018-19955", + "full_name": "Live-Hack-CVE\/CVE-2018-19955", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19955", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19955 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:55Z", + "updated_at": "2022-12-23T19:09:55Z", + "pushed_at": "2022-12-23T19:09:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19956.json b/2018/CVE-2018-19956.json new file mode 100644 index 0000000000..e2557e4b61 --- /dev/null +++ b/2018/CVE-2018-19956.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629008, + "name": "CVE-2018-19956", + "full_name": "Live-Hack-CVE\/CVE-2018-19956", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19956", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19956 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:52Z", + "updated_at": "2022-12-23T19:09:52Z", + "pushed_at": "2022-12-23T19:09:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19993.json b/2018/CVE-2018-19993.json new file mode 100644 index 0000000000..71145aca64 --- /dev/null +++ b/2018/CVE-2018-19993.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616489, + "name": "CVE-2018-19993", + "full_name": "Live-Hack-CVE\/CVE-2018-19993", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19993", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19993 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:17:56Z", + "updated_at": "2022-12-23T18:17:56Z", + "pushed_at": "2022-12-23T18:17:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19994.json b/2018/CVE-2018-19994.json new file mode 100644 index 0000000000..8477d86cdd --- /dev/null +++ b/2018/CVE-2018-19994.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616577, + "name": "CVE-2018-19994", + "full_name": "Live-Hack-CVE\/CVE-2018-19994", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19994", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19994 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:14Z", + "updated_at": "2022-12-23T18:18:14Z", + "pushed_at": "2022-12-23T18:18:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19995.json b/2018/CVE-2018-19995.json new file mode 100644 index 0000000000..2a33fe2347 --- /dev/null +++ b/2018/CVE-2018-19995.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616612, + "name": "CVE-2018-19995", + "full_name": "Live-Hack-CVE\/CVE-2018-19995", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19995", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19995 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:21Z", + "updated_at": "2022-12-23T18:18:21Z", + "pushed_at": "2022-12-23T18:18:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-19998.json b/2018/CVE-2018-19998.json new file mode 100644 index 0000000000..25bac7f0ab --- /dev/null +++ b/2018/CVE-2018-19998.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616626, + "name": "CVE-2018-19998", + "full_name": "Live-Hack-CVE\/CVE-2018-19998", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-19998", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-19998 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:24Z", + "updated_at": "2022-12-23T18:18:24Z", + "pushed_at": "2022-12-23T18:18:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-20432.json b/2018/CVE-2018-20432.json new file mode 100644 index 0000000000..18972ab7ca --- /dev/null +++ b/2018/CVE-2018-20432.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636286, + "name": "CVE-2018-20432", + "full_name": "Live-Hack-CVE\/CVE-2018-20432", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-20432", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-20432 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:00Z", + "updated_at": "2022-12-23T19:43:00Z", + "pushed_at": "2022-12-23T19:43:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-3282.json b/2018/CVE-2018-3282.json new file mode 100644 index 0000000000..dd258b7ccc --- /dev/null +++ b/2018/CVE-2018-3282.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669403, + "name": "CVE-2018-3282", + "full_name": "Live-Hack-CVE\/CVE-2018-3282", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-3282", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-3282 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:44Z", + "updated_at": "2022-12-23T22:30:44Z", + "pushed_at": "2022-12-23T22:30:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 88207f73fd..e758fd2f9e 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -18,13 +18,13 @@ "stargazers_count": 173, "watchers_count": 173, "has_discussions": false, - "forks_count": 34, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 34, + "forks": 33, "watchers": 173, "score": 0 } diff --git a/2018/CVE-2018-6891.json b/2018/CVE-2018-6891.json new file mode 100644 index 0000000000..0fb1b56626 --- /dev/null +++ b/2018/CVE-2018-6891.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646364, + "name": "CVE-2018-6891", + "full_name": "Live-Hack-CVE\/CVE-2018-6891", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2018-6891", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2018-6891 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:03Z", + "updated_at": "2022-12-23T20:29:03Z", + "pushed_at": "2022-12-23T20:29:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index 3e9345239b..f5cf2fb2d2 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -86,35 +86,6 @@ "watchers": 4, "score": 0 }, - { - "id": 223192188, - "name": "CVE-2019-0232", - "full_name": "setrus\/CVE-2019-0232", - "owner": { - "login": "setrus", - "id": 34648357, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34648357?v=4", - "html_url": "https:\/\/github.com\/setrus" - }, - "html_url": "https:\/\/github.com\/setrus\/CVE-2019-0232", - "description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42", - "fork": false, - "created_at": "2019-11-21T14:25:39Z", - "updated_at": "2022-10-22T07:08:06Z", - "pushed_at": "2019-11-21T15:03:15Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 15, - "score": 0 - }, { "id": 340726659, "name": "Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232-", diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 148526908e..2827748dc9 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2283,64 +2283,6 @@ "watchers": 4, "score": 0 }, - { - "id": 198343084, - "name": "bluekeep", - "full_name": "0xeb-bp\/bluekeep", - "owner": { - "login": "0xeb-bp", - "id": 53204152, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4", - "html_url": "https:\/\/github.com\/0xeb-bp" - }, - "html_url": "https:\/\/github.com\/0xeb-bp\/bluekeep", - "description": "Public work for CVE-2019-0708", - "fork": false, - "created_at": "2019-07-23T03:15:53Z", - "updated_at": "2022-08-26T13:16:46Z", - "pushed_at": "2019-11-19T02:43:38Z", - "stargazers_count": 292, - "watchers_count": 292, - "has_discussions": false, - "forks_count": 95, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 95, - "watchers": 292, - "score": 0 - }, - { - "id": 203477227, - "name": "CVE-2019-0708-test", - "full_name": "fade-vivida\/CVE-2019-0708-test", - "owner": { - "login": "fade-vivida", - "id": 38774342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38774342?v=4", - "html_url": "https:\/\/github.com\/fade-vivida" - }, - "html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test", - "description": null, - "fork": false, - "created_at": "2019-08-21T00:48:55Z", - "updated_at": "2021-12-05T21:34:43Z", - "pushed_at": "2019-11-28T01:38:56Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0 - }, { "id": 211942417, "name": "ispy", @@ -2399,35 +2341,6 @@ "watchers": 0, "score": 0 }, - { - "id": 223320391, - "name": "-2-CVE-2019-0708", - "full_name": "ulisesrc\/-2-CVE-2019-0708", - "owner": { - "login": "ulisesrc", - "id": 3741400, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3741400?v=4", - "html_url": "https:\/\/github.com\/ulisesrc" - }, - "html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708", - "description": null, - "fork": false, - "created_at": "2019-11-22T04:00:49Z", - "updated_at": "2021-12-05T21:34:43Z", - "pushed_at": "2019-11-22T04:01:03Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - }, { "id": 226491441, "name": "CVE-2019-0708", diff --git a/2019/CVE-2019-0845.json b/2019/CVE-2019-0845.json new file mode 100644 index 0000000000..7ebd9a9e6e --- /dev/null +++ b/2019/CVE-2019-0845.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638261, + "name": "CVE-2019-0845", + "full_name": "Live-Hack-CVE\/CVE-2019-0845", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-0845", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-0845 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:13Z", + "updated_at": "2022-12-23T19:51:13Z", + "pushed_at": "2022-12-23T19:51:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-1010016.json b/2019/CVE-2019-1010016.json new file mode 100644 index 0000000000..7da7953aa5 --- /dev/null +++ b/2019/CVE-2019-1010016.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617246, + "name": "CVE-2019-1010016", + "full_name": "Live-Hack-CVE\/CVE-2019-1010016", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-1010016", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-1010016 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:52Z", + "updated_at": "2022-12-23T18:20:52Z", + "pushed_at": "2022-12-23T18:20:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-1010054.json b/2019/CVE-2019-1010054.json index f36331f1c5..333ee84511 100644 --- a/2019/CVE-2019-1010054.json +++ b/2019/CVE-2019-1010054.json @@ -27,5 +27,34 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 581617206, + "name": "CVE-2019-1010054", + "full_name": "Live-Hack-CVE\/CVE-2019-1010054", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-1010054", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-1010054 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:41Z", + "updated_at": "2022-12-23T18:20:41Z", + "pushed_at": "2022-12-23T18:20:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-10135.json b/2019/CVE-2019-10135.json new file mode 100644 index 0000000000..5d3c92920d --- /dev/null +++ b/2019/CVE-2019-10135.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676114, + "name": "CVE-2019-10135", + "full_name": "Live-Hack-CVE\/CVE-2019-10135", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-10135", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-10135 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:18Z", + "updated_at": "2022-12-23T23:11:18Z", + "pushed_at": "2022-12-23T23:11:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-10149.json b/2019/CVE-2019-10149.json index adce195c31..eaeaa1a933 100644 --- a/2019/CVE-2019-10149.json +++ b/2019/CVE-2019-10149.json @@ -266,5 +266,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581676209, + "name": "CVE-2019-10149", + "full_name": "Live-Hack-CVE\/CVE-2019-10149", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-10149", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-10149 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:04Z", + "updated_at": "2022-12-23T23:12:04Z", + "pushed_at": "2022-12-23T23:12:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-10206.json b/2019/CVE-2019-10206.json new file mode 100644 index 0000000000..b0fbf11659 --- /dev/null +++ b/2019/CVE-2019-10206.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676075, + "name": "CVE-2019-10206", + "full_name": "Live-Hack-CVE\/CVE-2019-10206", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-10206", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-10206 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:04Z", + "updated_at": "2022-12-23T23:11:04Z", + "pushed_at": "2022-12-23T23:11:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-10210.json b/2019/CVE-2019-10210.json new file mode 100644 index 0000000000..d03a778c32 --- /dev/null +++ b/2019/CVE-2019-10210.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676107, + "name": "CVE-2019-10210", + "full_name": "Live-Hack-CVE\/CVE-2019-10210", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-10210", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-10210 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:15Z", + "updated_at": "2022-12-23T23:11:15Z", + "pushed_at": "2022-12-23T23:11:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-10800.json b/2019/CVE-2019-10800.json new file mode 100644 index 0000000000..e369800a9e --- /dev/null +++ b/2019/CVE-2019-10800.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675523, + "name": "CVE-2019-10800", + "full_name": "Live-Hack-CVE\/CVE-2019-10800", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-10800", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-10800 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:07:50Z", + "updated_at": "2022-12-23T23:07:50Z", + "pushed_at": "2022-12-23T23:07:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 7c7c6eb081..7702b2fa33 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -1,33 +1,4 @@ [ - { - "id": 210457246, - "name": "phuip-fpizdam", - "full_name": "neex\/phuip-fpizdam", - "owner": { - "login": "neex", - "id": 684237, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684237?v=4", - "html_url": "https:\/\/github.com\/neex" - }, - "html_url": "https:\/\/github.com\/neex\/phuip-fpizdam", - "description": "Exploit for CVE-2019-11043", - "fork": false, - "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2022-12-23T17:33:02Z", - "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1752, - "watchers_count": 1752, - "has_discussions": false, - "forks_count": 263, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 263, - "watchers": 1752, - "score": 0 - }, { "id": 217171261, "name": "CVE-2019-11043", @@ -86,100 +57,6 @@ "watchers": 4, "score": 0 }, - { - "id": 220032292, - "name": "CVE-2019-11043", - "full_name": "0th3rs-Security-Team\/CVE-2019-11043", - "owner": { - "login": "0th3rs-Security-Team", - "id": 57450857, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57450857?v=4", - "html_url": "https:\/\/github.com\/0th3rs-Security-Team" - }, - "html_url": "https:\/\/github.com\/0th3rs-Security-Team\/CVE-2019-11043", - "description": "CVE-2019-11043 PHP7.x RCE", - "fork": false, - "created_at": "2019-11-06T15:44:47Z", - "updated_at": "2020-08-26T07:52:56Z", - "pushed_at": "2019-11-06T15:48:18Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 13, - "score": 0 - }, - { - "id": 220966609, - "name": "CVE-2019-11043", - "full_name": "k8gege\/CVE-2019-11043", - "owner": { - "login": "k8gege", - "id": 42312878, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4", - "html_url": "https:\/\/github.com\/k8gege" - }, - "html_url": "https:\/\/github.com\/k8gege\/CVE-2019-11043", - "description": "Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)", - "fork": false, - "created_at": "2019-11-11T11:29:54Z", - "updated_at": "2022-06-29T04:36:03Z", - "pushed_at": "2019-11-11T11:59:52Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 15, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2019-11043", - "ladon", - "ladon-poc", - "ngnix", - "php-fpm", - "poc" - ], - "visibility": "public", - "forks": 15, - "watchers": 17, - "score": 0 - }, - { - "id": 222200768, - "name": "CVE-2019-11043_env", - "full_name": "moniik\/CVE-2019-11043_env", - "owner": { - "login": "moniik", - "id": 40794673, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40794673?v=4", - "html_url": "https:\/\/github.com\/moniik" - }, - "html_url": "https:\/\/github.com\/moniik\/CVE-2019-11043_env", - "description": "remote debug environment for CLion", - "fork": false, - "created_at": "2019-11-17T05:16:02Z", - "updated_at": "2020-09-09T02:32:52Z", - "pushed_at": "2019-11-17T05:19:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 261416297, "name": "CVE-2019-11043", diff --git a/2019/CVE-2019-11089.json b/2019/CVE-2019-11089.json new file mode 100644 index 0000000000..167af2aae9 --- /dev/null +++ b/2019/CVE-2019-11089.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655479, + "name": "CVE-2019-11089", + "full_name": "Live-Hack-CVE\/CVE-2019-11089", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-11089", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-11089 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:14:17Z", + "updated_at": "2022-12-23T21:14:17Z", + "pushed_at": "2022-12-23T21:14:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11111.json b/2019/CVE-2019-11111.json new file mode 100644 index 0000000000..55c7213fd5 --- /dev/null +++ b/2019/CVE-2019-11111.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655493, + "name": "CVE-2019-11111", + "full_name": "Live-Hack-CVE\/CVE-2019-11111", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-11111", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-11111 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:14:20Z", + "updated_at": "2022-12-23T21:14:20Z", + "pushed_at": "2022-12-23T21:14:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11113.json b/2019/CVE-2019-11113.json new file mode 100644 index 0000000000..2476ca0910 --- /dev/null +++ b/2019/CVE-2019-11113.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655501, + "name": "CVE-2019-11113", + "full_name": "Live-Hack-CVE\/CVE-2019-11113", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-11113", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-11113 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:14:23Z", + "updated_at": "2022-12-23T21:14:23Z", + "pushed_at": "2022-12-23T21:14:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11139.json b/2019/CVE-2019-11139.json new file mode 100644 index 0000000000..40a94817cc --- /dev/null +++ b/2019/CVE-2019-11139.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646610, + "name": "CVE-2019-11139", + "full_name": "Live-Hack-CVE\/CVE-2019-11139", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-11139", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-11139 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:13Z", + "updated_at": "2022-12-23T20:30:14Z", + "pushed_at": "2022-12-23T20:30:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11556.json b/2019/CVE-2019-11556.json new file mode 100644 index 0000000000..fd1ff43442 --- /dev/null +++ b/2019/CVE-2019-11556.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636352, + "name": "CVE-2019-11556", + "full_name": "Live-Hack-CVE\/CVE-2019-11556", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-11556", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-11556 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:17Z", + "updated_at": "2022-12-23T19:43:17Z", + "pushed_at": "2022-12-23T19:43:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11581.json b/2019/CVE-2019-11581.json index e68a1784c8..96a7030a49 100644 --- a/2019/CVE-2019-11581.json +++ b/2019/CVE-2019-11581.json @@ -1,33 +1,4 @@ [ - { - "id": 198763431, - "name": "CVE-2019-11581", - "full_name": "kobs0N\/CVE-2019-11581", - "owner": { - "login": "kobs0N", - "id": 23138815, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23138815?v=4", - "html_url": "https:\/\/github.com\/kobs0N" - }, - "html_url": "https:\/\/github.com\/kobs0N\/CVE-2019-11581", - "description": "CVE-2019–11581 PoC", - "fork": false, - "created_at": "2019-07-25T05:29:23Z", - "updated_at": "2022-11-12T01:13:11Z", - "pushed_at": "2019-12-13T13:03:39Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 11, - "score": 0 - }, { "id": 364161354, "name": "CVE-2019-11581", diff --git a/2019/CVE-2019-11823.json b/2019/CVE-2019-11823.json new file mode 100644 index 0000000000..891e4eaa42 --- /dev/null +++ b/2019/CVE-2019-11823.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637243, + "name": "CVE-2019-11823", + "full_name": "Live-Hack-CVE\/CVE-2019-11823", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-11823", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-11823 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:43Z", + "updated_at": "2022-12-23T19:46:43Z", + "pushed_at": "2022-12-23T19:46:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-11931.json b/2019/CVE-2019-11931.json deleted file mode 100644 index 99e50d8ea4..0000000000 --- a/2019/CVE-2019-11931.json +++ /dev/null @@ -1,60 +0,0 @@ -[ - { - "id": 222086842, - "name": "whatsapp-rce-patched", - "full_name": "kasif-dekel\/whatsapp-rce-patched", - "owner": { - "login": "kasif-dekel", - "id": 5827021, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5827021?v=4", - "html_url": "https:\/\/github.com\/kasif-dekel" - }, - "html_url": "https:\/\/github.com\/kasif-dekel\/whatsapp-rce-patched", - "description": "cve-2019-11931", - "fork": false, - "created_at": "2019-11-16T11:06:52Z", - "updated_at": "2022-11-14T07:15:48Z", - "pushed_at": "2019-11-16T11:15:06Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 16, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 16, - "watchers": 35, - "score": 0 - }, - { - "id": 223598650, - "name": "CVE-2019-11931", - "full_name": "nop-team\/CVE-2019-11931", - "owner": { - "login": "nop-team", - "id": 58111818, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58111818?v=4", - "html_url": "https:\/\/github.com\/nop-team" - }, - "html_url": "https:\/\/github.com\/nop-team\/CVE-2019-11931", - "description": null, - "fork": false, - "created_at": "2019-11-23T14:06:13Z", - "updated_at": "2021-12-05T22:06:24Z", - "pushed_at": "2019-11-23T14:06:15Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 1146b27822..8c01ea4c24 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -28,35 +28,6 @@ "watchers": 258, "score": 0 }, - { - "id": 212837105, - "name": "CVE-2019-11932", - "full_name": "awakened1712\/CVE-2019-11932", - "owner": { - "login": "awakened1712", - "id": 628212, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628212?v=4", - "html_url": "https:\/\/github.com\/awakened1712" - }, - "html_url": "https:\/\/github.com\/awakened1712\/CVE-2019-11932", - "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", - "fork": false, - "created_at": "2019-10-04T14:43:57Z", - "updated_at": "2022-12-21T14:31:46Z", - "pushed_at": "2019-11-30T10:28:01Z", - "stargazers_count": 187, - "watchers_count": 187, - "has_discussions": false, - "forks_count": 106, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 106, - "watchers": 187, - "score": 0 - }, { "id": 215635890, "name": "CVE-2019-11932", @@ -86,35 +57,6 @@ "watchers": 7, "score": 0 }, - { - "id": 228222453, - "name": "CVE-2019-11932", - "full_name": "SmoZy92\/CVE-2019-11932", - "owner": { - "login": "SmoZy92", - "id": 58377338, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58377338?v=4", - "html_url": "https:\/\/github.com\/SmoZy92" - }, - "html_url": "https:\/\/github.com\/SmoZy92\/CVE-2019-11932", - "description": null, - "fork": false, - "created_at": "2019-12-15T17:21:26Z", - "updated_at": "2020-09-02T11:23:41Z", - "pushed_at": "2019-12-15T17:40:15Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 6, - "score": 0 - }, { "id": 239654888, "name": "https-github.com-awakened171", diff --git a/2019/CVE-2019-12255.json b/2019/CVE-2019-12255.json deleted file mode 100644 index ed64e60a91..0000000000 --- a/2019/CVE-2019-12255.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 221308311, - "name": "Urgent11-Suricata-LUA-scripts", - "full_name": "sud0woodo\/Urgent11-Suricata-LUA-scripts", - "owner": { - "login": "sud0woodo", - "id": 40278342, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40278342?v=4", - "html_url": "https:\/\/github.com\/sud0woodo" - }, - "html_url": "https:\/\/github.com\/sud0woodo\/Urgent11-Suricata-LUA-scripts", - "description": "Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260", - "fork": false, - "created_at": "2019-11-12T20:43:46Z", - "updated_at": "2022-10-19T20:23:31Z", - "pushed_at": "2019-11-28T20:16:35Z", - "stargazers_count": 19, - "watchers_count": 19, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 19, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12272.json b/2019/CVE-2019-12272.json deleted file mode 100644 index 63f9afa855..0000000000 --- a/2019/CVE-2019-12272.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 226418974, - "name": "lede-17.01.3", - "full_name": "roguedream\/lede-17.01.3", - "owner": { - "login": "roguedream", - "id": 15247135, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15247135?v=4", - "html_url": "https:\/\/github.com\/roguedream" - }, - "html_url": "https:\/\/github.com\/roguedream\/lede-17.01.3", - "description": "Version-contains-cve-2019-12272", - "fork": false, - "created_at": "2019-12-06T22:04:24Z", - "updated_at": "2021-12-05T22:09:42Z", - "pushed_at": "2019-12-06T22:18:38Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12409.json b/2019/CVE-2019-12409.json deleted file mode 100644 index 3215114368..0000000000 --- a/2019/CVE-2019-12409.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 222651199, - "name": "CVE-2019-12409", - "full_name": "jas502n\/CVE-2019-12409", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-12409", - "description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")", - "fork": false, - "created_at": "2019-11-19T08:53:56Z", - "updated_at": "2022-11-09T18:05:18Z", - "pushed_at": "2019-11-19T09:18:00Z", - "stargazers_count": 100, - "watchers_count": 100, - "has_discussions": false, - "forks_count": 36, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 36, - "watchers": 100, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-12840.json b/2019/CVE-2019-12840.json index 593e3cf465..f863d5264a 100644 --- a/2019/CVE-2019-12840.json +++ b/2019/CVE-2019-12840.json @@ -1,33 +1,4 @@ [ - { - "id": 220680650, - "name": "webmin_cve-2019-12840_poc", - "full_name": "KrE80r\/webmin_cve-2019-12840_poc", - "owner": { - "login": "KrE80r", - "id": 13027962, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13027962?v=4", - "html_url": "https:\/\/github.com\/KrE80r" - }, - "html_url": "https:\/\/github.com\/KrE80r\/webmin_cve-2019-12840_poc", - "description": "A standalone POC for CVE-2019-12840", - "fork": false, - "created_at": "2019-11-09T17:48:39Z", - "updated_at": "2022-01-06T03:02:00Z", - "pushed_at": "2019-11-10T13:26:41Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 7, - "score": 0 - }, { "id": 323973616, "name": "webminscan", diff --git a/2019/CVE-2019-12890.json b/2019/CVE-2019-12890.json deleted file mode 100644 index 6abdb480e2..0000000000 --- a/2019/CVE-2019-12890.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 221921802, - "name": "CVE-2019-12890_RedxploitHQ", - "full_name": "EthicalHCOP\/CVE-2019-12890_RedxploitHQ", - "owner": { - "login": "EthicalHCOP", - "id": 33833733, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33833733?v=4", - "html_url": "https:\/\/github.com\/EthicalHCOP" - }, - "html_url": "https:\/\/github.com\/EthicalHCOP\/CVE-2019-12890_RedxploitHQ", - "description": "Use RedxploitHQ to create a new Admin user into redwoodhq and get all the functions on the framework", - "fork": false, - "created_at": "2019-11-15T12:41:19Z", - "updated_at": "2021-12-05T22:13:52Z", - "pushed_at": "2019-11-15T13:02:47Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13024.json b/2019/CVE-2019-13024.json deleted file mode 100644 index 8bd2e404ae..0000000000 --- a/2019/CVE-2019-13024.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 220509225, - "name": "Centreon-RCE", - "full_name": "get-get-get-get\/Centreon-RCE", - "owner": { - "login": "get-get-get-get", - "id": 51015518, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51015518?v=4", - "html_url": "https:\/\/github.com\/get-get-get-get" - }, - "html_url": "https:\/\/github.com\/get-get-get-get\/Centreon-RCE", - "description": "Centreon v.19.04 Remote Code Execution exploit (CVE-2019-13024)", - "fork": false, - "created_at": "2019-11-08T16:46:13Z", - "updated_at": "2021-12-05T22:18:57Z", - "pushed_at": "2019-11-08T17:39:34Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13496.json b/2019/CVE-2019-13496.json deleted file mode 100644 index 31f6dcab0d..0000000000 --- a/2019/CVE-2019-13496.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 219145624, - "name": "CVE-2019-13496", - "full_name": "FurqanKhan1\/CVE-2019-13496", - "owner": { - "login": "FurqanKhan1", - "id": 15893015, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15893015?v=4", - "html_url": "https:\/\/github.com\/FurqanKhan1" - }, - "html_url": "https:\/\/github.com\/FurqanKhan1\/CVE-2019-13496", - "description": null, - "fork": false, - "created_at": "2019-11-02T11:41:25Z", - "updated_at": "2021-12-05T22:14:49Z", - "pushed_at": "2019-11-10T20:59:54Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-13498.json b/2019/CVE-2019-13498.json deleted file mode 100644 index 6d55e6deb8..0000000000 --- a/2019/CVE-2019-13498.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 200299320, - "name": "CVE-2019-13498", - "full_name": "FurqanKhan1\/CVE-2019-13498", - "owner": { - "login": "FurqanKhan1", - "id": 15893015, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15893015?v=4", - "html_url": "https:\/\/github.com\/FurqanKhan1" - }, - "html_url": "https:\/\/github.com\/FurqanKhan1\/CVE-2019-13498", - "description": "CVE-2019-13498", - "fork": false, - "created_at": "2019-08-02T21:22:23Z", - "updated_at": "2021-12-05T22:15:14Z", - "pushed_at": "2019-11-10T20:58:40Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index c0c49a8042..aca4dec91b 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -1,62 +1,4 @@ [ - { - "id": 223103877, - "name": "CVE-2019-1388", - "full_name": "jas502n\/CVE-2019-1388", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-1388", - "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", - "fork": false, - "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2022-11-09T18:05:19Z", - "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 163, - "watchers_count": 163, - "has_discussions": false, - "forks_count": 51, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 51, - "watchers": 163, - "score": 0 - }, - { - "id": 223127146, - "name": "CVE-2019-1388", - "full_name": "jaychouzzk\/CVE-2019-1388", - "owner": { - "login": "jaychouzzk", - "id": 45549315, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4", - "html_url": "https:\/\/github.com\/jaychouzzk" - }, - "html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-1388", - "description": null, - "fork": false, - "created_at": "2019-11-21T08:38:38Z", - "updated_at": "2020-09-06T01:30:25Z", - "pushed_at": "2019-11-21T08:41:23Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0 - }, { "id": 224330054, "name": "CVE-2019-1388", diff --git a/2019/CVE-2019-1402.json b/2019/CVE-2019-1402.json deleted file mode 100644 index 4ad5287249..0000000000 --- a/2019/CVE-2019-1402.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 221768702, - "name": "CorruptQueryAccessWorkaround", - "full_name": "lauxjpn\/CorruptQueryAccessWorkaround", - "owner": { - "login": "lauxjpn", - "id": 14178357, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14178357?v=4", - "html_url": "https:\/\/github.com\/lauxjpn" - }, - "html_url": "https:\/\/github.com\/lauxjpn\/CorruptQueryAccessWorkaround", - "description": "The latest workaround for the \"Query is corrupt\" error introduced with CVE-2019-1402", - "fork": false, - "created_at": "2019-11-14T19:11:27Z", - "updated_at": "2021-12-05T22:16:37Z", - "pushed_at": "2019-12-10T18:51:25Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json deleted file mode 100644 index e01a4e795b..0000000000 --- a/2019/CVE-2019-1405.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 221504958, - "name": "COMahawk", - "full_name": "apt69\/COMahawk", - "owner": { - "login": "apt69", - "id": 55776655, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55776655?v=4", - "html_url": "https:\/\/github.com\/apt69" - }, - "html_url": "https:\/\/github.com\/apt69\/COMahawk", - "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", - "fork": false, - "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2022-12-06T08:10:46Z", - "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 311, - "watchers_count": 311, - "has_discussions": false, - "forks_count": 75, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 75, - "watchers": 311, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-1422.json b/2019/CVE-2019-1422.json deleted file mode 100644 index 995434830b..0000000000 --- a/2019/CVE-2019-1422.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 224766189, - "name": "cve-2019-1422", - "full_name": "ze0r\/cve-2019-1422", - "owner": { - "login": "ze0r", - "id": 43227253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4", - "html_url": "https:\/\/github.com\/ze0r" - }, - "html_url": "https:\/\/github.com\/ze0r\/cve-2019-1422", - "description": null, - "fork": false, - "created_at": "2019-11-29T02:58:32Z", - "updated_at": "2022-11-15T17:43:33Z", - "pushed_at": "2019-11-29T07:26:27Z", - "stargazers_count": 15, - "watchers_count": 15, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 15, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14287.json b/2019/CVE-2019-14287.json index d0fbbd9a7c..30a30ef959 100644 --- a/2019/CVE-2019-14287.json +++ b/2019/CVE-2019-14287.json @@ -60,93 +60,6 @@ "watchers": 3, "score": 0 }, - { - "id": 217958958, - "name": "cve-2019-14287-PPT", - "full_name": "huang919\/cve-2019-14287-PPT", - "owner": { - "login": "huang919", - "id": 54520509, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54520509?v=4", - "html_url": "https:\/\/github.com\/huang919" - }, - "html_url": "https:\/\/github.com\/huang919\/cve-2019-14287-PPT", - "description": null, - "fork": false, - "created_at": "2019-10-28T03:27:23Z", - "updated_at": "2021-12-06T02:50:20Z", - "pushed_at": "2019-11-13T13:21:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 220971939, - "name": "sudo-", - "full_name": "wenyu1999\/sudo-", - "owner": { - "login": "wenyu1999", - "id": 55389198, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55389198?v=4", - "html_url": "https:\/\/github.com\/wenyu1999" - }, - "html_url": "https:\/\/github.com\/wenyu1999\/sudo-", - "description": "cve-2019-14287", - "fork": false, - "created_at": "2019-11-11T12:01:02Z", - "updated_at": "2021-12-06T02:50:27Z", - "pushed_at": "2019-11-11T12:02:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 221210783, - "name": "cve-2019-14287", - "full_name": "Sindadziy\/cve-2019-14287", - "owner": { - "login": "Sindadziy", - "id": 55396899, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55396899?v=4", - "html_url": "https:\/\/github.com\/Sindadziy" - }, - "html_url": "https:\/\/github.com\/Sindadziy\/cve-2019-14287", - "description": null, - "fork": false, - "created_at": "2019-11-12T12:17:48Z", - "updated_at": "2021-12-06T02:50:34Z", - "pushed_at": "2019-11-12T12:18:21Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 221475763, "name": "CVE-2019-14287-CVE-2014-6271", @@ -211,35 +124,6 @@ "watchers": 9, "score": 0 }, - { - "id": 258967892, - "name": "sudo-vulnerability-CVE-2019-14287", - "full_name": "axax002\/sudo-vulnerability-CVE-2019-14287", - "owner": { - "login": "axax002", - "id": 55937601, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55937601?v=4", - "html_url": "https:\/\/github.com\/axax002" - }, - "html_url": "https:\/\/github.com\/axax002\/sudo-vulnerability-CVE-2019-14287", - "description": "Sudo Vulnerability CVE-2019-14287", - "fork": false, - "created_at": "2020-04-26T07:29:44Z", - "updated_at": "2021-04-14T16:06:10Z", - "pushed_at": "2019-12-04T07:25:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 263100309, "name": "Exploit-CVE-2019-14287", diff --git a/2019/CVE-2019-14574.json b/2019/CVE-2019-14574.json new file mode 100644 index 0000000000..d0ae01df88 --- /dev/null +++ b/2019/CVE-2019-14574.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655513, + "name": "CVE-2019-14574", + "full_name": "Live-Hack-CVE\/CVE-2019-14574", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14574", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14574 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:14:27Z", + "updated_at": "2022-12-23T21:14:27Z", + "pushed_at": "2022-12-23T21:14:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14590.json b/2019/CVE-2019-14590.json new file mode 100644 index 0000000000..7ec8b116ef --- /dev/null +++ b/2019/CVE-2019-14590.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655527, + "name": "CVE-2019-14590", + "full_name": "Live-Hack-CVE\/CVE-2019-14590", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14590", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14590 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:14:30Z", + "updated_at": "2022-12-23T21:14:30Z", + "pushed_at": "2022-12-23T21:14:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14591.json b/2019/CVE-2019-14591.json new file mode 100644 index 0000000000..a9e4480230 --- /dev/null +++ b/2019/CVE-2019-14591.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655535, + "name": "CVE-2019-14591", + "full_name": "Live-Hack-CVE\/CVE-2019-14591", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14591", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14591 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:14:34Z", + "updated_at": "2022-12-23T21:14:34Z", + "pushed_at": "2022-12-23T21:14:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-1476.json b/2019/CVE-2019-1476.json deleted file mode 100644 index df649c770a..0000000000 --- a/2019/CVE-2019-1476.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 226188349, - "name": "CVE-2019-1476", - "full_name": "sgabe\/CVE-2019-1476", - "owner": { - "login": "sgabe", - "id": 5206619, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206619?v=4", - "html_url": "https:\/\/github.com\/sgabe" - }, - "html_url": "https:\/\/github.com\/sgabe\/CVE-2019-1476", - "description": "AppXSvc Arbitrary File Overwrite DoS", - "fork": false, - "created_at": "2019-12-05T21:00:16Z", - "updated_at": "2022-07-22T10:51:55Z", - "pushed_at": "2019-12-10T18:12:43Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "dos-attack", - "exploit", - "proof-of-concept", - "vulnerability", - "windows10" - ], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-14818.json b/2019/CVE-2019-14818.json new file mode 100644 index 0000000000..7c9f6f8638 --- /dev/null +++ b/2019/CVE-2019-14818.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676064, + "name": "CVE-2019-14818", + "full_name": "Live-Hack-CVE\/CVE-2019-14818", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14818", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14818 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:01Z", + "updated_at": "2022-12-23T23:11:01Z", + "pushed_at": "2022-12-23T23:11:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14825.json b/2019/CVE-2019-14825.json new file mode 100644 index 0000000000..3e7b49d27e --- /dev/null +++ b/2019/CVE-2019-14825.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675818, + "name": "CVE-2019-14825", + "full_name": "Live-Hack-CVE\/CVE-2019-14825", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14825", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14825 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:34Z", + "updated_at": "2022-12-23T23:09:34Z", + "pushed_at": "2022-12-23T23:09:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14855.json b/2019/CVE-2019-14855.json new file mode 100644 index 0000000000..d20224456c --- /dev/null +++ b/2019/CVE-2019-14855.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675745, + "name": "CVE-2019-14855", + "full_name": "Live-Hack-CVE\/CVE-2019-14855", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14855", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14855 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:05Z", + "updated_at": "2022-12-23T23:09:05Z", + "pushed_at": "2022-12-23T23:09:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14885.json b/2019/CVE-2019-14885.json new file mode 100644 index 0000000000..4d2655db27 --- /dev/null +++ b/2019/CVE-2019-14885.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675811, + "name": "CVE-2019-14885", + "full_name": "Live-Hack-CVE\/CVE-2019-14885", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14885", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14885 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:31Z", + "updated_at": "2022-12-23T23:09:31Z", + "pushed_at": "2022-12-23T23:09:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14886.json b/2019/CVE-2019-14886.json new file mode 100644 index 0000000000..cab711ab4e --- /dev/null +++ b/2019/CVE-2019-14886.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675800, + "name": "CVE-2019-14886", + "full_name": "Live-Hack-CVE\/CVE-2019-14886", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14886", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14886 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:28Z", + "updated_at": "2022-12-23T23:09:28Z", + "pushed_at": "2022-12-23T23:09:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-14907.json b/2019/CVE-2019-14907.json new file mode 100644 index 0000000000..8cf2809871 --- /dev/null +++ b/2019/CVE-2019-14907.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637337, + "name": "CVE-2019-14907", + "full_name": "Live-Hack-CVE\/CVE-2019-14907", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-14907", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-14907 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:03Z", + "updated_at": "2022-12-23T19:47:03Z", + "pushed_at": "2022-12-23T19:47:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-15062.json b/2019/CVE-2019-15062.json new file mode 100644 index 0000000000..9f85d09e1a --- /dev/null +++ b/2019/CVE-2019-15062.json @@ -0,0 +1,31 @@ +[ + { + "id": 581617063, + "name": "CVE-2019-15062", + "full_name": "Live-Hack-CVE\/CVE-2019-15062", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-15062", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-15062 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:20:04Z", + "updated_at": "2022-12-23T18:20:04Z", + "pushed_at": "2022-12-23T18:20:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index 1575fed4f0..9ab079ea8f 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -1,33 +1,4 @@ [ - { - "id": 228190849, - "name": "CVE-2019-15107", - "full_name": "ianxtianxt\/CVE-2019-15107", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-15107", - "description": null, - "fork": false, - "created_at": "2019-12-15T13:42:28Z", - "updated_at": "2020-07-03T03:58:55Z", - "pushed_at": "2019-12-15T13:42:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 230108996, "name": "webminex", diff --git a/2019/CVE-2019-15120.json b/2019/CVE-2019-15120.json deleted file mode 100644 index a8ba2be149..0000000000 --- a/2019/CVE-2019-15120.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 210601259, - "name": "CVE-2019-15120", - "full_name": "h3llraiser\/CVE-2019-15120", - "owner": { - "login": "h3llraiser", - "id": 52741391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52741391?v=4", - "html_url": "https:\/\/github.com\/h3llraiser" - }, - "html_url": "https:\/\/github.com\/h3llraiser\/CVE-2019-15120", - "description": "Exploit for XSS via BBCode on Kunena extension before 5.1.14 for Joomla!", - "fork": false, - "created_at": "2019-09-24T12:47:09Z", - "updated_at": "2022-11-24T11:10:57Z", - "pushed_at": "2019-11-16T17:11:28Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15505.json b/2019/CVE-2019-15505.json new file mode 100644 index 0000000000..aa57e9f82b --- /dev/null +++ b/2019/CVE-2019-15505.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636363, + "name": "CVE-2019-15505", + "full_name": "Live-Hack-CVE\/CVE-2019-15505", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-15505", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-15505 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:20Z", + "updated_at": "2022-12-23T19:43:20Z", + "pushed_at": "2022-12-23T19:43:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-15511.json b/2019/CVE-2019-15511.json deleted file mode 100644 index 9b6eb8739e..0000000000 --- a/2019/CVE-2019-15511.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 203594549, - "name": "CVE-2019-15511", - "full_name": "adenkiewicz\/CVE-2019-15511", - "owner": { - "login": "adenkiewicz", - "id": 1060275, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4", - "html_url": "https:\/\/github.com\/adenkiewicz" - }, - "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2019-15511", - "description": "GOG Galaxy Exploit for CVE-2019-15511", - "fork": false, - "created_at": "2019-08-21T13:52:13Z", - "updated_at": "2022-11-24T11:10:49Z", - "pushed_at": "2019-11-15T14:50:47Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-15604.json b/2019/CVE-2019-15604.json new file mode 100644 index 0000000000..bc0ba822ff --- /dev/null +++ b/2019/CVE-2019-15604.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637381, + "name": "CVE-2019-15604", + "full_name": "Live-Hack-CVE\/CVE-2019-15604", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-15604", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-15604 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:13Z", + "updated_at": "2022-12-23T19:47:13Z", + "pushed_at": "2022-12-23T19:47:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-15605.json b/2019/CVE-2019-15605.json index cfbf4c4793..9906dceb9c 100644 --- a/2019/CVE-2019-15605.json +++ b/2019/CVE-2019-15605.json @@ -27,5 +27,34 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 581637406, + "name": "CVE-2019-15605", + "full_name": "Live-Hack-CVE\/CVE-2019-15605", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-15605", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-15605 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:20Z", + "updated_at": "2022-12-23T19:47:20Z", + "pushed_at": "2022-12-23T19:47:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-15691.json b/2019/CVE-2019-15691.json new file mode 100644 index 0000000000..ce007cdfd3 --- /dev/null +++ b/2019/CVE-2019-15691.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661684, + "name": "CVE-2019-15691", + "full_name": "Live-Hack-CVE\/CVE-2019-15691", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-15691", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-15691 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:22Z", + "updated_at": "2022-12-23T21:47:22Z", + "pushed_at": "2022-12-23T21:47:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-15972.json b/2019/CVE-2019-15972.json deleted file mode 100644 index 780d4a9a21..0000000000 --- a/2019/CVE-2019-15972.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 222742364, - "name": "Cisco-UCM-SQLi-Scripts", - "full_name": "FSecureLABS\/Cisco-UCM-SQLi-Scripts", - "owner": { - "login": "FSecureLABS", - "id": 1469843, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1469843?v=4", - "html_url": "https:\/\/github.com\/FSecureLABS" - }, - "html_url": "https:\/\/github.com\/FSecureLABS\/Cisco-UCM-SQLi-Scripts", - "description": "Scripts that can be used to exploit CVE-2019-15972 which was an Authenticated SQLi issue in Cisco Unified Call Manager (UCM).", - "fork": false, - "created_at": "2019-11-19T16:38:39Z", - "updated_at": "2022-04-12T11:44:06Z", - "pushed_at": "2019-11-20T15:05:54Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16097.json b/2019/CVE-2019-16097.json deleted file mode 100644 index 51c0bbd537..0000000000 --- a/2019/CVE-2019-16097.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 221669111, - "name": "CVE-2019-16097", - "full_name": "luckybool1020\/CVE-2019-16097", - "owner": { - "login": "luckybool1020", - "id": 16422202, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16422202?v=4", - "html_url": "https:\/\/github.com\/luckybool1020" - }, - "html_url": "https:\/\/github.com\/luckybool1020\/CVE-2019-16097", - "description": "Harbor 未授权创建管理员漏洞原理 docker及poc[基于pocsuite框架]", - "fork": false, - "created_at": "2019-11-14T10:19:47Z", - "updated_at": "2022-11-24T11:11:09Z", - "pushed_at": "2019-11-14T10:22:23Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16197.json b/2019/CVE-2019-16197.json new file mode 100644 index 0000000000..a45d7fce4d --- /dev/null +++ b/2019/CVE-2019-16197.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616823, + "name": "CVE-2019-16197", + "full_name": "Live-Hack-CVE\/CVE-2019-16197", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-16197", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-16197 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:19:02Z", + "updated_at": "2022-12-23T18:19:02Z", + "pushed_at": "2022-12-23T18:19:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-16278.json b/2019/CVE-2019-16278.json index ec0d86637b..076301d2c2 100644 --- a/2019/CVE-2019-16278.json +++ b/2019/CVE-2019-16278.json @@ -28,64 +28,6 @@ "watchers": 3, "score": 0 }, - { - "id": 223463242, - "name": "CVE-2019-16278", - "full_name": "AnubisSec\/CVE-2019-16278", - "owner": { - "login": "AnubisSec", - "id": 38790814, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4", - "html_url": "https:\/\/github.com\/AnubisSec" - }, - "html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278", - "description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ", - "fork": false, - "created_at": "2019-11-22T18:35:14Z", - "updated_at": "2022-11-09T18:05:19Z", - "pushed_at": "2019-11-22T18:57:29Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 6, - "score": 0 - }, - { - "id": 224208624, - "name": "CVE-2019-16278-Nostromo_1.9.6-RCE", - "full_name": "theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", - "owner": { - "login": "theRealFr13nd", - "id": 36172640, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4", - "html_url": "https:\/\/github.com\/theRealFr13nd" - }, - "html_url": "https:\/\/github.com\/theRealFr13nd\/CVE-2019-16278-Nostromo_1.9.6-RCE", - "description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.", - "fork": false, - "created_at": "2019-11-26T14:15:44Z", - "updated_at": "2022-03-05T13:09:13Z", - "pushed_at": "2019-11-26T14:26:03Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 7, - "score": 0 - }, { "id": 231114950, "name": "cve-2019-16278", diff --git a/2019/CVE-2019-16662.json b/2019/CVE-2019-16662.json deleted file mode 100644 index cea65f5479..0000000000 --- a/2019/CVE-2019-16662.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 220831587, - "name": "CVE-2019-16662", - "full_name": "mhaskar\/CVE-2019-16662", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-16662", - "description": "The official exploit for rConfig 3.9.2 Pre-auth Remote Code Execution CVE-2019-16662", - "fork": false, - "created_at": "2019-11-10T18:26:25Z", - "updated_at": "2022-11-09T18:05:11Z", - "pushed_at": "2019-11-10T18:27:02Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 12, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16663.json b/2019/CVE-2019-16663.json deleted file mode 100644 index e2538fe8b0..0000000000 --- a/2019/CVE-2019-16663.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 220831806, - "name": "CVE-2019-16663", - "full_name": "mhaskar\/CVE-2019-16663", - "owner": { - "login": "mhaskar", - "id": 6861215, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", - "html_url": "https:\/\/github.com\/mhaskar" - }, - "html_url": "https:\/\/github.com\/mhaskar\/CVE-2019-16663", - "description": "The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663", - "fork": false, - "created_at": "2019-11-10T18:28:11Z", - "updated_at": "2022-11-09T18:05:11Z", - "pushed_at": "2019-11-10T18:28:40Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-16685.json b/2019/CVE-2019-16685.json new file mode 100644 index 0000000000..ef9c7e70c3 --- /dev/null +++ b/2019/CVE-2019-16685.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616664, + "name": "CVE-2019-16685", + "full_name": "Live-Hack-CVE\/CVE-2019-16685", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-16685", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-16685 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:31Z", + "updated_at": "2022-12-23T18:18:31Z", + "pushed_at": "2022-12-23T18:18:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-16686.json b/2019/CVE-2019-16686.json new file mode 100644 index 0000000000..bd1f17c10e --- /dev/null +++ b/2019/CVE-2019-16686.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616696, + "name": "CVE-2019-16686", + "full_name": "Live-Hack-CVE\/CVE-2019-16686", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-16686", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-16686 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:38Z", + "updated_at": "2022-12-23T18:18:38Z", + "pushed_at": "2022-12-23T18:18:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-16687.json b/2019/CVE-2019-16687.json new file mode 100644 index 0000000000..56af756ca4 --- /dev/null +++ b/2019/CVE-2019-16687.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616736, + "name": "CVE-2019-16687", + "full_name": "Live-Hack-CVE\/CVE-2019-16687", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-16687", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-16687 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:44Z", + "updated_at": "2022-12-23T18:18:44Z", + "pushed_at": "2022-12-23T18:18:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-16688.json b/2019/CVE-2019-16688.json new file mode 100644 index 0000000000..08b3378fb7 --- /dev/null +++ b/2019/CVE-2019-16688.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616648, + "name": "CVE-2019-16688", + "full_name": "Live-Hack-CVE\/CVE-2019-16688", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-16688", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-16688 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:18:28Z", + "updated_at": "2022-12-23T18:18:28Z", + "pushed_at": "2022-12-23T18:18:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-17026.json b/2019/CVE-2019-17026.json index 0da7498b96..f588820b64 100644 --- a/2019/CVE-2019-17026.json +++ b/2019/CVE-2019-17026.json @@ -56,5 +56,34 @@ "forks": 1, "watchers": 3, "score": 0 + }, + { + "id": 581637391, + "name": "CVE-2019-17026", + "full_name": "Live-Hack-CVE\/CVE-2019-17026", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-17026", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-17026 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:16Z", + "updated_at": "2022-12-23T19:47:16Z", + "pushed_at": "2022-12-23T19:47:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17424.json b/2019/CVE-2019-17424.json deleted file mode 100644 index bf2811796a..0000000000 --- a/2019/CVE-2019-17424.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 216429041, - "name": "CVE-2019-17424", - "full_name": "guywhataguy\/CVE-2019-17424", - "owner": { - "login": "guywhataguy", - "id": 33753158, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33753158?v=4", - "html_url": "https:\/\/github.com\/guywhataguy" - }, - "html_url": "https:\/\/github.com\/guywhataguy\/CVE-2019-17424", - "description": "RCE Exploit For CVE-2019-17424 (nipper-ng 0.11.10)", - "fork": false, - "created_at": "2019-10-20T21:20:28Z", - "updated_at": "2020-04-20T05:07:36Z", - "pushed_at": "2019-11-16T09:47:12Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "exploit", - "rce", - "stackoverflow", - "vulnerability" - ], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-17576.json b/2019/CVE-2019-17576.json new file mode 100644 index 0000000000..bd6272b2a1 --- /dev/null +++ b/2019/CVE-2019-17576.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616408, + "name": "CVE-2019-17576", + "full_name": "Live-Hack-CVE\/CVE-2019-17576", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-17576", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-17576 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:17:37Z", + "updated_at": "2022-12-23T18:17:37Z", + "pushed_at": "2022-12-23T18:17:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-17578.json b/2019/CVE-2019-17578.json new file mode 100644 index 0000000000..f6da75c3fa --- /dev/null +++ b/2019/CVE-2019-17578.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616475, + "name": "CVE-2019-17578", + "full_name": "Live-Hack-CVE\/CVE-2019-17578", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-17578", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-17578 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:17:52Z", + "updated_at": "2022-12-23T18:17:52Z", + "pushed_at": "2022-12-23T18:17:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-17670.json b/2019/CVE-2019-17670.json new file mode 100644 index 0000000000..5be9301132 --- /dev/null +++ b/2019/CVE-2019-17670.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676203, + "name": "CVE-2019-17670", + "full_name": "Live-Hack-CVE\/CVE-2019-17670", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-17670", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-17670 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:00Z", + "updated_at": "2022-12-23T23:12:00Z", + "pushed_at": "2022-12-23T23:12:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-18218.json b/2019/CVE-2019-18218.json new file mode 100644 index 0000000000..873f211a25 --- /dev/null +++ b/2019/CVE-2019-18218.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662288, + "name": "CVE-2019-18218", + "full_name": "Live-Hack-CVE\/CVE-2019-18218", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-18218", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-18218 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:14Z", + "updated_at": "2022-12-23T21:50:14Z", + "pushed_at": "2022-12-23T21:50:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-18873.json b/2019/CVE-2019-18873.json deleted file mode 100644 index 556274abc9..0000000000 --- a/2019/CVE-2019-18873.json +++ /dev/null @@ -1,34 +0,0 @@ -[ - { - "id": 217798293, - "name": "FUDforum-XSS-RCE", - "full_name": "fuzzlove\/FUDforum-XSS-RCE", - "owner": { - "login": "fuzzlove", - "id": 44779781, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44779781?v=4", - "html_url": "https:\/\/github.com\/fuzzlove" - }, - "html_url": "https:\/\/github.com\/fuzzlove\/FUDforum-XSS-RCE", - "description": "FUDForum 3.0.9 - XSS \/ Remote Code Execution (CVE-2019-18873, CVE-2019-18839)", - "fork": false, - "created_at": "2019-10-27T03:07:26Z", - "updated_at": "2022-07-16T22:03:47Z", - "pushed_at": "2019-11-13T20:56:14Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "exploit", - "penetration-testing" - ], - "visibility": "public", - "forks": 4, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-18898.json b/2019/CVE-2019-18898.json new file mode 100644 index 0000000000..d76b44c52a --- /dev/null +++ b/2019/CVE-2019-18898.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654951, + "name": "CVE-2019-18898", + "full_name": "Live-Hack-CVE\/CVE-2019-18898", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-18898", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-18898 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:46Z", + "updated_at": "2022-12-23T21:11:46Z", + "pushed_at": "2022-12-23T21:11:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-18899.json b/2019/CVE-2019-18899.json new file mode 100644 index 0000000000..49c19d5805 --- /dev/null +++ b/2019/CVE-2019-18899.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675630, + "name": "CVE-2019-18899", + "full_name": "Live-Hack-CVE\/CVE-2019-18899", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-18899", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-18899 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:23Z", + "updated_at": "2022-12-23T23:08:24Z", + "pushed_at": "2022-12-23T23:08:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-18901.json b/2019/CVE-2019-18901.json new file mode 100644 index 0000000000..f7f86ed3f8 --- /dev/null +++ b/2019/CVE-2019-18901.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637032, + "name": "CVE-2019-18901", + "full_name": "Live-Hack-CVE\/CVE-2019-18901", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-18901", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-18901 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:55Z", + "updated_at": "2022-12-23T19:45:55Z", + "pushed_at": "2022-12-23T19:45:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19012.json b/2019/CVE-2019-19012.json deleted file mode 100644 index 415f4500c0..0000000000 --- a/2019/CVE-2019-19012.json +++ /dev/null @@ -1,60 +0,0 @@ -[ - { - "id": 222906322, - "name": "CVE-2019-19012", - "full_name": "ManhNDd\/CVE-2019-19012", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-19012", - "description": "Integer overflow in Oniguruma", - "fork": false, - "created_at": "2019-11-20T10:00:18Z", - "updated_at": "2019-12-03T08:44:25Z", - "pushed_at": "2019-11-20T15:53:38Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 222956814, - "name": "CVE-2019-19012", - "full_name": "tarantula-team\/CVE-2019-19012", - "owner": { - "login": "tarantula-team", - "id": 51333391, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51333391?v=4", - "html_url": "https:\/\/github.com\/tarantula-team" - }, - "html_url": "https:\/\/github.com\/tarantula-team\/CVE-2019-19012", - "description": "An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read", - "fork": false, - "created_at": "2019-11-20T14:32:23Z", - "updated_at": "2019-11-20T15:24:36Z", - "pushed_at": "2019-11-20T15:24:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19033.json b/2019/CVE-2019-19033.json deleted file mode 100644 index a56dfe7844..0000000000 --- a/2019/CVE-2019-19033.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 222300876, - "name": "CVE-2019-19033", - "full_name": "ricardojoserf\/CVE-2019-19033", - "owner": { - "login": "ricardojoserf", - "id": 11477353, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11477353?v=4", - "html_url": "https:\/\/github.com\/ricardojoserf" - }, - "html_url": "https:\/\/github.com\/ricardojoserf\/CVE-2019-19033", - "description": "CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)", - "fork": false, - "created_at": "2019-11-17T19:32:10Z", - "updated_at": "2021-11-14T00:45:55Z", - "pushed_at": "2019-12-03T19:22:32Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2019-19033", - "jalios", - "vulnerability", - "webdav" - ], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19044.json b/2019/CVE-2019-19044.json new file mode 100644 index 0000000000..7ed5046fa8 --- /dev/null +++ b/2019/CVE-2019-19044.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676901, + "name": "CVE-2019-19044", + "full_name": "Live-Hack-CVE\/CVE-2019-19044", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19044", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19044 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:30Z", + "updated_at": "2022-12-23T23:16:30Z", + "pushed_at": "2022-12-23T23:16:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19051.json b/2019/CVE-2019-19051.json new file mode 100644 index 0000000000..b6a90d6d72 --- /dev/null +++ b/2019/CVE-2019-19051.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676947, + "name": "CVE-2019-19051", + "full_name": "Live-Hack-CVE\/CVE-2019-19051", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19051", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19051 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:52Z", + "updated_at": "2022-12-23T23:16:52Z", + "pushed_at": "2022-12-23T23:16:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19052.json b/2019/CVE-2019-19052.json new file mode 100644 index 0000000000..38c1dd05e7 --- /dev/null +++ b/2019/CVE-2019-19052.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675720, + "name": "CVE-2019-19052", + "full_name": "Live-Hack-CVE\/CVE-2019-19052", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19052", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19052 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:54Z", + "updated_at": "2022-12-23T23:08:54Z", + "pushed_at": "2022-12-23T23:08:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19053.json b/2019/CVE-2019-19053.json new file mode 100644 index 0000000000..84af243623 --- /dev/null +++ b/2019/CVE-2019-19053.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676863, + "name": "CVE-2019-19053", + "full_name": "Live-Hack-CVE\/CVE-2019-19053", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19053", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19053 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:16Z", + "updated_at": "2022-12-23T23:16:16Z", + "pushed_at": "2022-12-23T23:16:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19054.json b/2019/CVE-2019-19054.json new file mode 100644 index 0000000000..6547f6f27a --- /dev/null +++ b/2019/CVE-2019-19054.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670647, + "name": "CVE-2019-19054", + "full_name": "Live-Hack-CVE\/CVE-2019-19054", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19054", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19054 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:42Z", + "updated_at": "2022-12-23T22:37:42Z", + "pushed_at": "2022-12-23T22:37:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19057.json b/2019/CVE-2019-19057.json new file mode 100644 index 0000000000..4dce8b1970 --- /dev/null +++ b/2019/CVE-2019-19057.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676889, + "name": "CVE-2019-19057", + "full_name": "Live-Hack-CVE\/CVE-2019-19057", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19057", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19057 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:26Z", + "updated_at": "2022-12-23T23:16:26Z", + "pushed_at": "2022-12-23T23:16:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19060.json b/2019/CVE-2019-19060.json new file mode 100644 index 0000000000..79398dae4f --- /dev/null +++ b/2019/CVE-2019-19060.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675699, + "name": "CVE-2019-19060", + "full_name": "Live-Hack-CVE\/CVE-2019-19060", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19060", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19060 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:46Z", + "updated_at": "2022-12-23T23:08:46Z", + "pushed_at": "2022-12-23T23:08:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19061.json b/2019/CVE-2019-19061.json new file mode 100644 index 0000000000..2559498a62 --- /dev/null +++ b/2019/CVE-2019-19061.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675710, + "name": "CVE-2019-19061", + "full_name": "Live-Hack-CVE\/CVE-2019-19061", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19061", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19061 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:51Z", + "updated_at": "2022-12-23T23:08:51Z", + "pushed_at": "2022-12-23T23:08:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19063.json b/2019/CVE-2019-19063.json new file mode 100644 index 0000000000..01d69e562d --- /dev/null +++ b/2019/CVE-2019-19063.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676742, + "name": "CVE-2019-19063", + "full_name": "Live-Hack-CVE\/CVE-2019-19063", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19063", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19063 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:28Z", + "updated_at": "2022-12-23T23:15:28Z", + "pushed_at": "2022-12-23T23:15:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19203.json b/2019/CVE-2019-19203.json index 73a85ee829..baa9ee0de2 100644 --- a/2019/CVE-2019-19203.json +++ b/2019/CVE-2019-19203.json @@ -1,33 +1,4 @@ [ - { - "id": 223278825, - "name": "CVE-2019-19203", - "full_name": "ManhNDd\/CVE-2019-19203", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-19203", - "description": "Heap-buffer-overflow in Oniguruma (function gb18030_mbc_enc_len)", - "fork": false, - "created_at": "2019-11-21T22:43:34Z", - "updated_at": "2021-01-04T16:55:17Z", - "pushed_at": "2019-11-22T00:04:51Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 229900382, "name": "CVE-2019-19203", diff --git a/2019/CVE-2019-19204.json b/2019/CVE-2019-19204.json index d8c7666cae..d8738ff5da 100644 --- a/2019/CVE-2019-19204.json +++ b/2019/CVE-2019-19204.json @@ -1,33 +1,4 @@ [ - { - "id": 223286619, - "name": "CVE-2019-19204", - "full_name": "ManhNDd\/CVE-2019-19204", - "owner": { - "login": "ManhNDd", - "id": 18594865, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18594865?v=4", - "html_url": "https:\/\/github.com\/ManhNDd" - }, - "html_url": "https:\/\/github.com\/ManhNDd\/CVE-2019-19204", - "description": "Heap-buffer-overflow in Oniguruma (function fetch_interval_quantifier)", - "fork": false, - "created_at": "2019-11-21T23:53:16Z", - "updated_at": "2022-10-05T22:57:34Z", - "pushed_at": "2019-11-22T00:04:37Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 229901564, "name": "CVE-2019-19204", diff --git a/2019/CVE-2019-19206.json b/2019/CVE-2019-19206.json new file mode 100644 index 0000000000..dd80047182 --- /dev/null +++ b/2019/CVE-2019-19206.json @@ -0,0 +1,31 @@ +[ + { + "id": 581616399, + "name": "CVE-2019-19206", + "full_name": "Live-Hack-CVE\/CVE-2019-19206", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19206", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19206 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:17:33Z", + "updated_at": "2022-12-23T18:17:33Z", + "pushed_at": "2022-12-23T18:17:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-19268.json b/2019/CVE-2019-19268.json deleted file mode 100644 index b917f514c4..0000000000 --- a/2019/CVE-2019-19268.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 223930097, - "name": "CVE-2019-19268", - "full_name": "TheCyberGeek\/CVE-2019-19268", - "owner": { - "login": "TheCyberGeek", - "id": 52138157, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52138157?v=4", - "html_url": "https:\/\/github.com\/TheCyberGeek" - }, - "html_url": "https:\/\/github.com\/TheCyberGeek\/CVE-2019-19268", - "description": "New Found 0-days!", - "fork": false, - "created_at": "2019-11-25T11:14:26Z", - "updated_at": "2022-06-28T16:20:58Z", - "pushed_at": "2019-12-04T10:14:51Z", - "stargazers_count": 37, - "watchers_count": 37, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 37, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19634.json b/2019/CVE-2019-19634.json deleted file mode 100644 index 0300376ad3..0000000000 --- a/2019/CVE-2019-19634.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 226651675, - "name": "CVE-2019-19634", - "full_name": "jra89\/CVE-2019-19634", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19634", - "description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4", - "fork": false, - "created_at": "2019-12-08T10:44:51Z", - "updated_at": "2022-07-06T21:45:25Z", - "pushed_at": "2019-12-08T17:55:01Z", - "stargazers_count": 36, - "watchers_count": 36, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 36, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19651.json b/2019/CVE-2019-19651.json deleted file mode 100644 index 5e0e7d0639..0000000000 --- a/2019/CVE-2019-19651.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 227379066, - "name": "CVE-2019-19651", - "full_name": "jra89\/CVE-2019-19651", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19651", - "description": "Chevereto reflected XSS in Website Name - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core", - "fork": false, - "created_at": "2019-12-11T14:00:32Z", - "updated_at": "2020-08-27T17:38:10Z", - "pushed_at": "2019-12-11T14:11:56Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19652.json b/2019/CVE-2019-19652.json deleted file mode 100644 index 0da61a85b6..0000000000 --- a/2019/CVE-2019-19652.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 227375117, - "name": "CVE-2019-19652", - "full_name": "jra89\/CVE-2019-19652", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19652", - "description": "Chevereto downgrade attack - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core", - "fork": false, - "created_at": "2019-12-11T13:42:18Z", - "updated_at": "2020-01-11T13:36:18Z", - "pushed_at": "2019-12-11T14:41:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19658.json b/2019/CVE-2019-19658.json deleted file mode 100644 index 5a99d16ecd..0000000000 --- a/2019/CVE-2019-19658.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 227381894, - "name": "CVE-2019-19658", - "full_name": "jra89\/CVE-2019-19658", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19658", - "description": "Chevereto stored XSS in profile page - 1.0.0 - 1.1.4 Free, <= 3.13.5 Core", - "fork": false, - "created_at": "2019-12-11T14:13:51Z", - "updated_at": "2020-01-11T13:35:52Z", - "pushed_at": "2019-12-12T12:07:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19732.json b/2019/CVE-2019-19732.json deleted file mode 100644 index 63c4e5fcd4..0000000000 --- a/2019/CVE-2019-19732.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 227598056, - "name": "CVE-2019-19732", - "full_name": "jra89\/CVE-2019-19732", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19732", - "description": "Yetishare SQL Injection (sSortDir_0) - v3.5.2 - v4.5.3", - "fork": false, - "created_at": "2019-12-12T12:08:49Z", - "updated_at": "2020-02-15T22:37:58Z", - "pushed_at": "2019-12-12T14:30:01Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19734.json b/2019/CVE-2019-19734.json deleted file mode 100644 index 834ff0e85c..0000000000 --- a/2019/CVE-2019-19734.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 227626239, - "name": "CVE-2019-19734", - "full_name": "jra89\/CVE-2019-19734", - "owner": { - "login": "jra89", - "id": 2511696, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2511696?v=4", - "html_url": "https:\/\/github.com\/jra89" - }, - "html_url": "https:\/\/github.com\/jra89\/CVE-2019-19734", - "description": "YetiShare SQL Injection in the fileIds parameter in _account_move_file_in_folder.ajax.php - v3.5.2", - "fork": false, - "created_at": "2019-12-12T14:31:49Z", - "updated_at": "2019-12-23T08:52:10Z", - "pushed_at": "2019-12-12T14:34:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-19947.json b/2019/CVE-2019-19947.json new file mode 100644 index 0000000000..c7677e6a94 --- /dev/null +++ b/2019/CVE-2019-19947.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661366, + "name": "CVE-2019-19947", + "full_name": "Live-Hack-CVE\/CVE-2019-19947", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-19947", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-19947 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:34Z", + "updated_at": "2022-12-23T21:45:34Z", + "pushed_at": "2022-12-23T21:45:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-20434.json b/2019/CVE-2019-20434.json new file mode 100644 index 0000000000..d6ab8ba477 --- /dev/null +++ b/2019/CVE-2019-20434.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654938, + "name": "CVE-2019-20434", + "full_name": "Live-Hack-CVE\/CVE-2019-20434", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-20434", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-20434 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:42Z", + "updated_at": "2022-12-23T21:11:42Z", + "pushed_at": "2022-12-23T21:11:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-20435.json b/2019/CVE-2019-20435.json new file mode 100644 index 0000000000..bac9c49b21 --- /dev/null +++ b/2019/CVE-2019-20435.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654912, + "name": "CVE-2019-20435", + "full_name": "Live-Hack-CVE\/CVE-2019-20435", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-20435", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-20435 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:36Z", + "updated_at": "2022-12-23T21:11:36Z", + "pushed_at": "2022-12-23T21:11:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-20436.json b/2019/CVE-2019-20436.json new file mode 100644 index 0000000000..c0773d7b9a --- /dev/null +++ b/2019/CVE-2019-20436.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654889, + "name": "CVE-2019-20436", + "full_name": "Live-Hack-CVE\/CVE-2019-20436", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-20436", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-20436 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:29Z", + "updated_at": "2022-12-23T21:11:29Z", + "pushed_at": "2022-12-23T21:11:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-20437.json b/2019/CVE-2019-20437.json new file mode 100644 index 0000000000..31797b9dca --- /dev/null +++ b/2019/CVE-2019-20437.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654901, + "name": "CVE-2019-20437", + "full_name": "Live-Hack-CVE\/CVE-2019-20437", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-20437", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-20437 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:33Z", + "updated_at": "2022-12-23T21:11:33Z", + "pushed_at": "2022-12-23T21:11:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-20439.json b/2019/CVE-2019-20439.json new file mode 100644 index 0000000000..814c5be55d --- /dev/null +++ b/2019/CVE-2019-20439.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654875, + "name": "CVE-2019-20439", + "full_name": "Live-Hack-CVE\/CVE-2019-20439", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-20439", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-20439 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:26Z", + "updated_at": "2022-12-23T21:11:26Z", + "pushed_at": "2022-12-23T21:11:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-20790.json b/2019/CVE-2019-20790.json new file mode 100644 index 0000000000..0e60d1c0f8 --- /dev/null +++ b/2019/CVE-2019-20790.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637218, + "name": "CVE-2019-20790", + "full_name": "Live-Hack-CVE\/CVE-2019-20790", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-20790", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-20790 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:36Z", + "updated_at": "2022-12-23T19:46:36Z", + "pushed_at": "2022-12-23T19:46:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 22d28a128a..ca7f304900 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -1,33 +1,4 @@ [ - { - "id": 212750414, - "name": "CVE-2019-2215", - "full_name": "timwr\/CVE-2019-2215", - "owner": { - "login": "timwr", - "id": 684924, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", - "html_url": "https:\/\/github.com\/timwr" - }, - "html_url": "https:\/\/github.com\/timwr\/CVE-2019-2215", - "description": null, - "fork": false, - "created_at": "2019-10-04T06:32:08Z", - "updated_at": "2022-11-09T18:04:49Z", - "pushed_at": "2019-11-12T03:58:00Z", - "stargazers_count": 69, - "watchers_count": 69, - "has_discussions": false, - "forks_count": 31, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 31, - "watchers": 69, - "score": 0 - }, { "id": 215531522, "name": "CVE-2019-2215", diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 095ce58d74..9c12fcefe2 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -115,35 +115,6 @@ "watchers": 847, "score": 0 }, - { - "id": 222606343, - "name": "cve-2019-2618", - "full_name": "ianxtianxt\/cve-2019-2618", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/cve-2019-2618", - "description": "cve-2019-2618 需要用户名密码", - "fork": false, - "created_at": "2019-11-19T04:12:39Z", - "updated_at": "2020-07-03T04:04:02Z", - "pushed_at": "2019-11-19T04:13:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 1, - "score": 0 - }, { "id": 233997916, "name": "weblogicScanner", diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 5d219ac452..9090694bea 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -376,35 +376,6 @@ "watchers": 67, "score": 0 }, - { - "id": 227509207, - "name": "CVE-2019-2725-POC", - "full_name": "N0b1e6\/CVE-2019-2725-POC", - "owner": { - "login": "N0b1e6", - "id": 46476997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46476997?v=4", - "html_url": "https:\/\/github.com\/N0b1e6" - }, - "html_url": "https:\/\/github.com\/N0b1e6\/CVE-2019-2725-POC", - "description": "CVE-2019-2725-POC", - "fork": false, - "created_at": "2019-12-12T03:09:23Z", - "updated_at": "2019-12-12T03:11:14Z", - "pushed_at": "2019-12-12T03:11:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 232495610, "name": "weblogic_2019_2725_wls_batch", diff --git a/2019/CVE-2019-2729.json b/2019/CVE-2019-2729.json index bb34857913..54e5c3f041 100644 --- a/2019/CVE-2019-2729.json +++ b/2019/CVE-2019-2729.json @@ -114,5 +114,34 @@ "forks": 0, "watchers": 2, "score": 0 + }, + { + "id": 581655000, + "name": "CVE-2019-2729", + "full_name": "Live-Hack-CVE\/CVE-2019-2729", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-2729", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-2729 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:00Z", + "updated_at": "2022-12-23T21:12:00Z", + "pushed_at": "2022-12-23T21:12:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-2890.json b/2019/CVE-2019-2890.json index 7c9fc9fedb..fa5f251d3c 100644 --- a/2019/CVE-2019-2890.json +++ b/2019/CVE-2019-2890.json @@ -1,91 +1,4 @@ [ - { - "id": 226284594, - "name": "CVE-2019-2890", - "full_name": "SukaraLin\/CVE-2019-2890", - "owner": { - "login": "SukaraLin", - "id": 27796303, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27796303?v=4", - "html_url": "https:\/\/github.com\/SukaraLin" - }, - "html_url": "https:\/\/github.com\/SukaraLin\/CVE-2019-2890", - "description": null, - "fork": false, - "created_at": "2019-12-06T08:46:31Z", - "updated_at": "2022-11-09T18:05:26Z", - "pushed_at": "2019-12-06T09:18:56Z", - "stargazers_count": 87, - "watchers_count": 87, - "has_discussions": false, - "forks_count": 26, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 26, - "watchers": 87, - "score": 0 - }, - { - "id": 226617297, - "name": "CVE-2019-2890", - "full_name": "jas502n\/CVE-2019-2890", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-2890", - "description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞", - "fork": false, - "created_at": "2019-12-08T05:03:32Z", - "updated_at": "2022-11-18T03:43:58Z", - "pushed_at": "2019-12-08T05:50:42Z", - "stargazers_count": 40, - "watchers_count": 40, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 40, - "score": 0 - }, - { - "id": 227987309, - "name": "CVE-2019-2890", - "full_name": "ianxtianxt\/CVE-2019-2890", - "owner": { - "login": "ianxtianxt", - "id": 45796484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4", - "html_url": "https:\/\/github.com\/ianxtianxt" - }, - "html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-2890", - "description": "0-sec.org", - "fork": false, - "created_at": "2019-12-14T08:01:53Z", - "updated_at": "2020-07-03T03:59:12Z", - "pushed_at": "2019-12-14T08:04:01Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 5, - "score": 0 - }, { "id": 286429427, "name": "Weblogic_Vuln", diff --git a/2019/CVE-2019-3396.json b/2019/CVE-2019-3396.json index 27855294c0..307b96d2f8 100644 --- a/2019/CVE-2019-3396.json +++ b/2019/CVE-2019-3396.json @@ -294,64 +294,6 @@ "watchers": 0, "score": 0 }, - { - "id": 223076925, - "name": "CVE-2019-3396", - "full_name": "am6539\/CVE-2019-3396", - "owner": { - "login": "am6539", - "id": 19407692, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19407692?v=4", - "html_url": "https:\/\/github.com\/am6539" - }, - "html_url": "https:\/\/github.com\/am6539\/CVE-2019-3396", - "description": null, - "fork": false, - "created_at": "2019-11-21T03:07:08Z", - "updated_at": "2019-11-21T03:18:13Z", - "pushed_at": "2019-11-21T03:18:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 227548353, - "name": "CVE-2019-3396", - "full_name": "W2Ning\/CVE-2019-3396", - "owner": { - "login": "W2Ning", - "id": 33406415, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33406415?v=4", - "html_url": "https:\/\/github.com\/W2Ning" - }, - "html_url": "https:\/\/github.com\/W2Ning\/CVE-2019-3396", - "description": "For test", - "fork": false, - "created_at": "2019-12-12T07:40:22Z", - "updated_at": "2019-12-13T08:59:05Z", - "pushed_at": "2019-12-13T08:59:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 313479621, "name": "cve-2019-3396", diff --git a/2019/CVE-2019-3692.json b/2019/CVE-2019-3692.json new file mode 100644 index 0000000000..7ae80662cd --- /dev/null +++ b/2019/CVE-2019-3692.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637350, + "name": "CVE-2019-3692", + "full_name": "Live-Hack-CVE\/CVE-2019-3692", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3692", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3692 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:06Z", + "updated_at": "2022-12-23T19:47:06Z", + "pushed_at": "2022-12-23T19:47:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3693.json b/2019/CVE-2019-3693.json new file mode 100644 index 0000000000..337c6b078c --- /dev/null +++ b/2019/CVE-2019-3693.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654960, + "name": "CVE-2019-3693", + "full_name": "Live-Hack-CVE\/CVE-2019-3693", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3693", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3693 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:49Z", + "updated_at": "2022-12-23T21:11:49Z", + "pushed_at": "2022-12-23T21:11:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3694.json b/2019/CVE-2019-3694.json new file mode 100644 index 0000000000..e11a9e0167 --- /dev/null +++ b/2019/CVE-2019-3694.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654924, + "name": "CVE-2019-3694", + "full_name": "Live-Hack-CVE\/CVE-2019-3694", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3694", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3694 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:39Z", + "updated_at": "2022-12-23T21:11:39Z", + "pushed_at": "2022-12-23T21:11:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3804.json b/2019/CVE-2019-3804.json new file mode 100644 index 0000000000..e14d3817b1 --- /dev/null +++ b/2019/CVE-2019-3804.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676287, + "name": "CVE-2019-3804", + "full_name": "Live-Hack-CVE\/CVE-2019-3804", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3804", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3804 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:31Z", + "updated_at": "2022-12-23T23:12:31Z", + "pushed_at": "2022-12-23T23:12:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3810.json b/2019/CVE-2019-3810.json index d31a384e30..35a262af81 100644 --- a/2019/CVE-2019-3810.json +++ b/2019/CVE-2019-3810.json @@ -27,5 +27,34 @@ "forks": 2, "watchers": 18, "score": 0 + }, + { + "id": 581676298, + "name": "CVE-2019-3810", + "full_name": "Live-Hack-CVE\/CVE-2019-3810", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3810", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3810 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:35Z", + "updated_at": "2022-12-23T23:12:35Z", + "pushed_at": "2022-12-23T23:12:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-3816.json b/2019/CVE-2019-3816.json new file mode 100644 index 0000000000..59ea486c08 --- /dev/null +++ b/2019/CVE-2019-3816.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676322, + "name": "CVE-2019-3816", + "full_name": "Live-Hack-CVE\/CVE-2019-3816", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3816", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3816 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:44Z", + "updated_at": "2022-12-23T23:12:44Z", + "pushed_at": "2022-12-23T23:12:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3847.json b/2019/CVE-2019-3847.json index e84d91c952..b2dae04e30 100644 --- a/2019/CVE-2019-3847.json +++ b/2019/CVE-2019-3847.json @@ -27,5 +27,34 @@ "forks": 0, "watchers": 5, "score": 0 + }, + { + "id": 581676228, + "name": "CVE-2019-3847", + "full_name": "Live-Hack-CVE\/CVE-2019-3847", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3847", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3847 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:11Z", + "updated_at": "2022-12-23T23:12:11Z", + "pushed_at": "2022-12-23T23:12:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-3848.json b/2019/CVE-2019-3848.json new file mode 100644 index 0000000000..dcf435ac11 --- /dev/null +++ b/2019/CVE-2019-3848.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676251, + "name": "CVE-2019-3848", + "full_name": "Live-Hack-CVE\/CVE-2019-3848", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3848", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3848 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:18Z", + "updated_at": "2022-12-23T23:12:18Z", + "pushed_at": "2022-12-23T23:12:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3881.json b/2019/CVE-2019-3881.json new file mode 100644 index 0000000000..6609eb91a9 --- /dev/null +++ b/2019/CVE-2019-3881.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669299, + "name": "CVE-2019-3881", + "full_name": "Live-Hack-CVE\/CVE-2019-3881", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3881", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3881 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:13Z", + "updated_at": "2022-12-23T22:30:14Z", + "pushed_at": "2022-12-23T22:30:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3886.json b/2019/CVE-2019-3886.json new file mode 100644 index 0000000000..d08c17467a --- /dev/null +++ b/2019/CVE-2019-3886.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655031, + "name": "CVE-2019-3886", + "full_name": "Live-Hack-CVE\/CVE-2019-3886", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3886", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3886 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:07Z", + "updated_at": "2022-12-23T21:12:07Z", + "pushed_at": "2022-12-23T21:12:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3887.json b/2019/CVE-2019-3887.json new file mode 100644 index 0000000000..23bc2fcef3 --- /dev/null +++ b/2019/CVE-2019-3887.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676098, + "name": "CVE-2019-3887", + "full_name": "Live-Hack-CVE\/CVE-2019-3887", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-3887", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-3887 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:11Z", + "updated_at": "2022-12-23T23:11:11Z", + "pushed_at": "2022-12-23T23:11:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-3929.json b/2019/CVE-2019-3929.json deleted file mode 100644 index 096939b617..0000000000 --- a/2019/CVE-2019-3929.json +++ /dev/null @@ -1,37 +0,0 @@ -[ - { - "id": 209102630, - "name": "CVE-2019-3929", - "full_name": "xfox64x\/CVE-2019-3929", - "owner": { - "login": "xfox64x", - "id": 11416821, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416821?v=4", - "html_url": "https:\/\/github.com\/xfox64x" - }, - "html_url": "https:\/\/github.com\/xfox64x\/CVE-2019-3929", - "description": "Crestron\/Barco\/Extron\/InFocus\/TeqAV Remote Command Injection (CVE-2019-3929) Metasploit Module", - "fork": false, - "created_at": "2019-09-17T16:23:04Z", - "updated_at": "2019-11-25T21:43:58Z", - "pushed_at": "2019-11-25T21:17:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "command-injection", - "crestron", - "crestron-devices", - "metasploit", - "metasploit-modules" - ], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-5418.json b/2019/CVE-2019-5418.json index dcd1d17476..427c76e18d 100644 --- a/2019/CVE-2019-5418.json +++ b/2019/CVE-2019-5418.json @@ -181,35 +181,6 @@ "watchers": 1, "score": 0 }, - { - "id": 222660643, - "name": "CVE-2019-5418", - "full_name": "random-robbie\/CVE-2019-5418", - "owner": { - "login": "random-robbie", - "id": 4902869, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4", - "html_url": "https:\/\/github.com\/random-robbie" - }, - "html_url": "https:\/\/github.com\/random-robbie\/CVE-2019-5418", - "description": null, - "fork": false, - "created_at": "2019-11-19T09:40:06Z", - "updated_at": "2021-04-26T19:41:51Z", - "pushed_at": "2019-11-19T09:41:18Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 5, - "score": 0 - }, { "id": 552810113, "name": "CVE-2019-5418", diff --git a/2019/CVE-2019-5700.json b/2019/CVE-2019-5700.json deleted file mode 100644 index 2dfa68fc9e..0000000000 --- a/2019/CVE-2019-5700.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 226178220, - "name": "CVE-2019-5700", - "full_name": "oscardagrach\/CVE-2019-5700", - "owner": { - "login": "oscardagrach", - "id": 17905072, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17905072?v=4", - "html_url": "https:\/\/github.com\/oscardagrach" - }, - "html_url": "https:\/\/github.com\/oscardagrach\/CVE-2019-5700", - "description": "CVE-2019-5700", - "fork": false, - "created_at": "2019-12-05T19:54:33Z", - "updated_at": "2021-08-11T05:11:10Z", - "pushed_at": "2019-12-05T21:36:42Z", - "stargazers_count": 11, - "watchers_count": 11, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 11, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 9c8631aaa4..c02005242b 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -410,64 +410,6 @@ "watchers": 0, "score": 0 }, - { - "id": 214599324, - "name": "cve-2019-5736-poc", - "full_name": "chosam2\/cve-2019-5736-poc", - "owner": { - "login": "chosam2", - "id": 40632767, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40632767?v=4", - "html_url": "https:\/\/github.com\/chosam2" - }, - "html_url": "https:\/\/github.com\/chosam2\/cve-2019-5736-poc", - "description": null, - "fork": false, - "created_at": "2019-10-12T07:22:57Z", - "updated_at": "2019-11-16T09:01:20Z", - "pushed_at": "2019-11-16T09:01:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 227655174, - "name": "Docker-Escape-Miner", - "full_name": "epsteina16\/Docker-Escape-Miner", - "owner": { - "login": "epsteina16", - "id": 14108788, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14108788?v=4", - "html_url": "https:\/\/github.com\/epsteina16" - }, - "html_url": "https:\/\/github.com\/epsteina16\/Docker-Escape-Miner", - "description": "Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.", - "fork": false, - "created_at": "2019-12-12T16:57:13Z", - "updated_at": "2022-01-04T13:01:30Z", - "pushed_at": "2019-12-12T16:58:18Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - }, { "id": 232528693, "name": "CVE-2019-5736", diff --git a/2019/CVE-2019-5825.json b/2019/CVE-2019-5825.json deleted file mode 100644 index 995d248e7b..0000000000 --- a/2019/CVE-2019-5825.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 223578530, - "name": "CVE-2019-5825", - "full_name": "timwr\/CVE-2019-5825", - "owner": { - "login": "timwr", - "id": 684924, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4", - "html_url": "https:\/\/github.com\/timwr" - }, - "html_url": "https:\/\/github.com\/timwr\/CVE-2019-5825", - "description": null, - "fork": false, - "created_at": "2019-11-23T11:35:34Z", - "updated_at": "2022-10-05T05:25:44Z", - "pushed_at": "2019-11-25T06:09:35Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-6706.json b/2019/CVE-2019-6706.json new file mode 100644 index 0000000000..be95593e95 --- /dev/null +++ b/2019/CVE-2019-6706.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670315, + "name": "CVE-2019-6706", + "full_name": "Live-Hack-CVE\/CVE-2019-6706", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-6706", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-6706 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:47Z", + "updated_at": "2022-12-23T22:35:47Z", + "pushed_at": "2022-12-23T22:35:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-6715.json b/2019/CVE-2019-6715.json deleted file mode 100644 index 837e1bf0c2..0000000000 --- a/2019/CVE-2019-6715.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 221241280, - "name": "cve-2019-6715", - "full_name": "random-robbie\/cve-2019-6715", - "owner": { - "login": "random-robbie", - "id": 4902869, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4", - "html_url": "https:\/\/github.com\/random-robbie" - }, - "html_url": "https:\/\/github.com\/random-robbie\/cve-2019-6715", - "description": null, - "fork": false, - "created_at": "2019-11-12T14:47:25Z", - "updated_at": "2021-04-26T19:41:57Z", - "pushed_at": "2019-11-12T14:54:10Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index 275d247b75..eb81960878 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -64,35 +64,6 @@ "watchers": 138, "score": 0 }, - { - "id": 225175128, - "name": "CVE-2019-7609", - "full_name": "hekadan\/CVE-2019-7609", - "owner": { - "login": "hekadan", - "id": 57190788, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57190788?v=4", - "html_url": "https:\/\/github.com\/hekadan" - }, - "html_url": "https:\/\/github.com\/hekadan\/CVE-2019-7609", - "description": null, - "fork": false, - "created_at": "2019-12-01T14:29:22Z", - "updated_at": "2022-06-25T03:46:49Z", - "pushed_at": "2019-12-01T14:34:37Z", - "stargazers_count": 21, - "watchers_count": 21, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 21, - "score": 0 - }, { "id": 252699702, "name": "CVE-2019-7609", diff --git a/2019/CVE-2019-8921.json b/2019/CVE-2019-8921.json new file mode 100644 index 0000000000..5b402e96b4 --- /dev/null +++ b/2019/CVE-2019-8921.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676625, + "name": "CVE-2019-8921", + "full_name": "Live-Hack-CVE\/CVE-2019-8921", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-8921", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-8921 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:41Z", + "updated_at": "2022-12-23T23:14:41Z", + "pushed_at": "2022-12-23T23:14:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-8922.json b/2019/CVE-2019-8922.json new file mode 100644 index 0000000000..4a49661302 --- /dev/null +++ b/2019/CVE-2019-8922.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676306, + "name": "CVE-2019-8922", + "full_name": "Live-Hack-CVE\/CVE-2019-8922", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-8922", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2019-8922 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:38Z", + "updated_at": "2022-12-23T23:12:38Z", + "pushed_at": "2022-12-23T23:12:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-9745.json b/2019/CVE-2019-9745.json deleted file mode 100644 index 75bc56daa6..0000000000 --- a/2019/CVE-2019-9745.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 215005621, - "name": "CVE-2019-9745", - "full_name": "KPN-CISO\/CVE-2019-9745", - "owner": { - "login": "KPN-CISO", - "id": 6069290, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6069290?v=4", - "html_url": "https:\/\/github.com\/KPN-CISO" - }, - "html_url": "https:\/\/github.com\/KPN-CISO\/CVE-2019-9745", - "description": "Write-up on the CVE-2019-9745 vulnerability.", - "fork": false, - "created_at": "2019-10-14T09:44:44Z", - "updated_at": "2019-11-07T14:36:56Z", - "pushed_at": "2019-11-07T14:36:54Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json index 802ef941b9..333f4b5c88 100644 --- a/2020/CVE-2020-0022.json +++ b/2020/CVE-2020-0022.json @@ -115,35 +115,6 @@ "watchers": 30, "score": 0 }, - { - "id": 321889394, - "name": "cve-2020-0022", - "full_name": "5k1l\/cve-2020-0022", - "owner": { - "login": "5k1l", - "id": 51367843, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51367843?v=4", - "html_url": "https:\/\/github.com\/5k1l" - }, - "html_url": "https:\/\/github.com\/5k1l\/cve-2020-0022", - "description": "cve-2020-0022相关的一些东西", - "fork": false, - "created_at": "2020-12-16T06:25:41Z", - "updated_at": "2022-08-24T08:17:30Z", - "pushed_at": "2020-12-16T07:17:45Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0 - }, { "id": 341906494, "name": "CVE-2020-0022", diff --git a/2020/CVE-2020-0113.json b/2020/CVE-2020-0113.json deleted file mode 100644 index 9ded5b905d..0000000000 --- a/2020/CVE-2020-0113.json +++ /dev/null @@ -1,34 +0,0 @@ -[ - { - "id": 319039566, - "name": "ServiceCheater", - "full_name": "XDo0\/ServiceCheater", - "owner": { - "login": "XDo0", - "id": 30046447, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30046447?v=4", - "html_url": "https:\/\/github.com\/XDo0" - }, - "html_url": "https:\/\/github.com\/XDo0\/ServiceCheater", - "description": "Poc of CVE-2020-0113 & CVE-2020-0108", - "fork": false, - "created_at": "2020-12-06T13:27:33Z", - "updated_at": "2021-04-03T14:41:27Z", - "pushed_at": "2020-12-10T06:15:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "android", - "cve" - ], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 8d1b5f163f..affb5c12f5 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -28,64 +28,6 @@ "watchers": 650, "score": 0 }, - { - "id": 320526580, - "name": "CVE-2020-0787", - "full_name": "MasterSploit\/CVE-2020-0787", - "owner": { - "login": "MasterSploit", - "id": 74764997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74764997?v=4", - "html_url": "https:\/\/github.com\/MasterSploit" - }, - "html_url": "https:\/\/github.com\/MasterSploit\/CVE-2020-0787", - "description": null, - "fork": false, - "created_at": "2020-12-11T09:27:34Z", - "updated_at": "2020-12-11T09:27:34Z", - "pushed_at": "2020-12-11T09:27:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 320527396, - "name": "CVE-2020-0787-BitsArbitraryFileMove-master", - "full_name": "MasterSploit\/CVE-2020-0787-BitsArbitraryFileMove-master", - "owner": { - "login": "MasterSploit", - "id": 74764997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74764997?v=4", - "html_url": "https:\/\/github.com\/MasterSploit" - }, - "html_url": "https:\/\/github.com\/MasterSploit\/CVE-2020-0787-BitsArbitraryFileMove-master", - "description": null, - "fork": false, - "created_at": "2020-12-11T09:31:06Z", - "updated_at": "2020-12-11T09:31:06Z", - "pushed_at": "2020-12-11T09:31:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 428621250, "name": "CVE-2020-0787", diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index b06af5bcfe..cbf2cd7f7b 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1767,35 +1767,6 @@ "watchers": 1, "score": 0 }, - { - "id": 314499390, - "name": "LPE---CVE-2020-0796", - "full_name": "MasterSploit\/LPE---CVE-2020-0796", - "owner": { - "login": "MasterSploit", - "id": 74764997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74764997?v=4", - "html_url": "https:\/\/github.com\/MasterSploit" - }, - "html_url": "https:\/\/github.com\/MasterSploit\/LPE---CVE-2020-0796", - "description": null, - "fork": false, - "created_at": "2020-11-20T09:00:08Z", - "updated_at": "2022-02-08T17:19:05Z", - "pushed_at": "2020-11-20T13:47:47Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": true, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 328551475, "name": "CVE-2020-0796", diff --git a/2020/CVE-2020-10684.json b/2020/CVE-2020-10684.json new file mode 100644 index 0000000000..6ab9245226 --- /dev/null +++ b/2020/CVE-2020-10684.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675730, + "name": "CVE-2020-10684", + "full_name": "Live-Hack-CVE\/CVE-2020-10684", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10684", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10684 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:58Z", + "updated_at": "2022-12-23T23:08:58Z", + "pushed_at": "2022-12-23T23:09:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10699.json b/2020/CVE-2020-10699.json new file mode 100644 index 0000000000..3ad5f18009 --- /dev/null +++ b/2020/CVE-2020-10699.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637302, + "name": "CVE-2020-10699", + "full_name": "Live-Hack-CVE\/CVE-2020-10699", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10699", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10699 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:56Z", + "updated_at": "2022-12-23T19:46:56Z", + "pushed_at": "2022-12-23T19:46:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10713.json b/2020/CVE-2020-10713.json new file mode 100644 index 0000000000..5134210a98 --- /dev/null +++ b/2020/CVE-2020-10713.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636612, + "name": "CVE-2020-10713", + "full_name": "Live-Hack-CVE\/CVE-2020-10713", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10713", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10713 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:15Z", + "updated_at": "2022-12-23T19:44:15Z", + "pushed_at": "2022-12-23T19:44:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10714.json b/2020/CVE-2020-10714.json new file mode 100644 index 0000000000..e0ad2ebd46 --- /dev/null +++ b/2020/CVE-2020-10714.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670211, + "name": "CVE-2020-10714", + "full_name": "Live-Hack-CVE\/CVE-2020-10714", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10714", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10714 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:13Z", + "updated_at": "2022-12-23T22:35:13Z", + "pushed_at": "2022-12-23T22:35:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10717.json b/2020/CVE-2020-10717.json new file mode 100644 index 0000000000..967e8a8927 --- /dev/null +++ b/2020/CVE-2020-10717.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637134, + "name": "CVE-2020-10717", + "full_name": "Live-Hack-CVE\/CVE-2020-10717", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10717", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10717 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:19Z", + "updated_at": "2022-12-23T19:46:19Z", + "pushed_at": "2022-12-23T19:46:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10732.json b/2020/CVE-2020-10732.json new file mode 100644 index 0000000000..64ccbb30ac --- /dev/null +++ b/2020/CVE-2020-10732.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669290, + "name": "CVE-2020-10732", + "full_name": "Live-Hack-CVE\/CVE-2020-10732", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10732", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10732 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:10Z", + "updated_at": "2022-12-23T22:30:10Z", + "pushed_at": "2022-12-23T22:30:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10735.json b/2020/CVE-2020-10735.json new file mode 100644 index 0000000000..4d8736ceb5 --- /dev/null +++ b/2020/CVE-2020-10735.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646284, + "name": "CVE-2020-10735", + "full_name": "Live-Hack-CVE\/CVE-2020-10735", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10735", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10735 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:38Z", + "updated_at": "2022-12-23T20:28:38Z", + "pushed_at": "2022-12-23T20:28:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10761.json b/2020/CVE-2020-10761.json new file mode 100644 index 0000000000..1adbd64a23 --- /dev/null +++ b/2020/CVE-2020-10761.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636939, + "name": "CVE-2020-10761", + "full_name": "Live-Hack-CVE\/CVE-2020-10761", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10761", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10761 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:35Z", + "updated_at": "2022-12-23T19:45:35Z", + "pushed_at": "2022-12-23T19:45:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10770.json b/2020/CVE-2020-10770.json index 7aeac7c2e4..0558e728c3 100644 --- a/2020/CVE-2020-10770.json +++ b/2020/CVE-2020-10770.json @@ -27,5 +27,34 @@ "forks": 6, "watchers": 5, "score": 0 + }, + { + "id": 581655159, + "name": "CVE-2020-10770", + "full_name": "Live-Hack-CVE\/CVE-2020-10770", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10770", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10770 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:45Z", + "updated_at": "2022-12-23T21:12:45Z", + "pushed_at": "2022-12-23T21:12:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-10781.json b/2020/CVE-2020-10781.json new file mode 100644 index 0000000000..bb1b4b14cd --- /dev/null +++ b/2020/CVE-2020-10781.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675994, + "name": "CVE-2020-10781", + "full_name": "Live-Hack-CVE\/CVE-2020-10781", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10781", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10781 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:35Z", + "updated_at": "2022-12-23T23:10:35Z", + "pushed_at": "2022-12-23T23:10:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10802.json b/2020/CVE-2020-10802.json new file mode 100644 index 0000000000..aed091007d --- /dev/null +++ b/2020/CVE-2020-10802.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637199, + "name": "CVE-2020-10802", + "full_name": "Live-Hack-CVE\/CVE-2020-10802", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10802", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10802 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:33Z", + "updated_at": "2022-12-23T19:46:33Z", + "pushed_at": "2022-12-23T19:46:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10803.json b/2020/CVE-2020-10803.json new file mode 100644 index 0000000000..b93ee018e9 --- /dev/null +++ b/2020/CVE-2020-10803.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636681, + "name": "CVE-2020-10803", + "full_name": "Live-Hack-CVE\/CVE-2020-10803", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10803", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10803 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:36Z", + "updated_at": "2022-12-23T19:44:36Z", + "pushed_at": "2022-12-23T19:44:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10804.json b/2020/CVE-2020-10804.json new file mode 100644 index 0000000000..d5afe2fbf1 --- /dev/null +++ b/2020/CVE-2020-10804.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637368, + "name": "CVE-2020-10804", + "full_name": "Live-Hack-CVE\/CVE-2020-10804", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10804", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10804 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:09Z", + "updated_at": "2022-12-23T19:47:09Z", + "pushed_at": "2022-12-23T19:47:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10936.json b/2020/CVE-2020-10936.json new file mode 100644 index 0000000000..2cd92bdc3e --- /dev/null +++ b/2020/CVE-2020-10936.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670553, + "name": "CVE-2020-10936", + "full_name": "Live-Hack-CVE\/CVE-2020-10936", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-10936", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-10936 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:12Z", + "updated_at": "2022-12-23T22:37:12Z", + "pushed_at": "2022-12-23T22:37:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json index e51d69ab14..ec8255d43d 100644 --- a/2020/CVE-2020-10977.json +++ b/2020/CVE-2020-10977.json @@ -62,35 +62,6 @@ "watchers": 64, "score": 0 }, - { - "id": 316070312, - "name": "CVE-2020-10977.py", - "full_name": "JustMichi\/CVE-2020-10977.py", - "owner": { - "login": "JustMichi", - "id": 10670516, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10670516?v=4", - "html_url": "https:\/\/github.com\/JustMichi" - }, - "html_url": "https:\/\/github.com\/JustMichi\/CVE-2020-10977.py", - "description": "authenticated arbitrary file read for Gitlab (CVE-2020-10977)", - "fork": false, - "created_at": "2020-11-25T22:48:26Z", - "updated_at": "2020-11-26T19:40:32Z", - "pushed_at": "2020-11-26T19:40:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 332278953, "name": "cve-2020-10977", diff --git a/2020/CVE-2020-11651.json b/2020/CVE-2020-11651.json index f756e81f01..ce14423f42 100644 --- a/2020/CVE-2020-11651.json +++ b/2020/CVE-2020-11651.json @@ -331,35 +331,6 @@ "watchers": 0, "score": 0 }, - { - "id": 317171675, - "name": "salt-rce-scanner-CVE-2020-11651-CVE-2020-11652", - "full_name": "appcheck-ng\/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652", - "owner": { - "login": "appcheck-ng", - "id": 72451531, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72451531?v=4", - "html_url": "https:\/\/github.com\/appcheck-ng" - }, - "html_url": "https:\/\/github.com\/appcheck-ng\/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652", - "description": "Scanning tool to test for SaltStack vulnerabilities CVE-2020-11651 & CVE-2020-11652.", - "fork": false, - "created_at": "2020-11-30T09:23:23Z", - "updated_at": "2020-11-30T09:48:22Z", - "pushed_at": "2020-11-30T09:26:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 412501071, "name": "cve-2020-11651", diff --git a/2020/CVE-2020-11759.json b/2020/CVE-2020-11759.json new file mode 100644 index 0000000000..7bf7890349 --- /dev/null +++ b/2020/CVE-2020-11759.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645756, + "name": "CVE-2020-11759", + "full_name": "Live-Hack-CVE\/CVE-2020-11759", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11759", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11759 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:13Z", + "updated_at": "2022-12-23T20:26:13Z", + "pushed_at": "2022-12-23T20:26:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11760.json b/2020/CVE-2020-11760.json new file mode 100644 index 0000000000..946e2739af --- /dev/null +++ b/2020/CVE-2020-11760.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645380, + "name": "CVE-2020-11760", + "full_name": "Live-Hack-CVE\/CVE-2020-11760", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11760", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11760 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:27Z", + "updated_at": "2022-12-23T20:24:27Z", + "pushed_at": "2022-12-23T20:24:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11761.json b/2020/CVE-2020-11761.json new file mode 100644 index 0000000000..9b6160fe66 --- /dev/null +++ b/2020/CVE-2020-11761.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645731, + "name": "CVE-2020-11761", + "full_name": "Live-Hack-CVE\/CVE-2020-11761", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11761", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11761 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:06Z", + "updated_at": "2022-12-23T20:26:07Z", + "pushed_at": "2022-12-23T20:26:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11762.json b/2020/CVE-2020-11762.json new file mode 100644 index 0000000000..8f054746d2 --- /dev/null +++ b/2020/CVE-2020-11762.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645849, + "name": "CVE-2020-11762", + "full_name": "Live-Hack-CVE\/CVE-2020-11762", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11762", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11762 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:39Z", + "updated_at": "2022-12-23T20:26:39Z", + "pushed_at": "2022-12-23T20:26:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11763.json b/2020/CVE-2020-11763.json new file mode 100644 index 0000000000..9fcd78616d --- /dev/null +++ b/2020/CVE-2020-11763.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645309, + "name": "CVE-2020-11763", + "full_name": "Live-Hack-CVE\/CVE-2020-11763", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11763", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11763 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:05Z", + "updated_at": "2022-12-23T20:24:05Z", + "pushed_at": "2022-12-23T20:24:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11764.json b/2020/CVE-2020-11764.json new file mode 100644 index 0000000000..c0016d4720 --- /dev/null +++ b/2020/CVE-2020-11764.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645319, + "name": "CVE-2020-11764", + "full_name": "Live-Hack-CVE\/CVE-2020-11764", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11764", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11764 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:08Z", + "updated_at": "2022-12-23T20:24:08Z", + "pushed_at": "2022-12-23T20:24:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11853.json b/2020/CVE-2020-11853.json new file mode 100644 index 0000000000..a6ccd53327 --- /dev/null +++ b/2020/CVE-2020-11853.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628905, + "name": "CVE-2020-11853", + "full_name": "Live-Hack-CVE\/CVE-2020-11853", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11853", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11853 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:24Z", + "updated_at": "2022-12-23T19:09:24Z", + "pushed_at": "2022-12-23T19:09:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11858.json b/2020/CVE-2020-11858.json new file mode 100644 index 0000000000..974b0a40c4 --- /dev/null +++ b/2020/CVE-2020-11858.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628994, + "name": "CVE-2020-11858", + "full_name": "Live-Hack-CVE\/CVE-2020-11858", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-11858", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-11858 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:48Z", + "updated_at": "2022-12-23T19:09:49Z", + "pushed_at": "2022-12-23T19:09:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-11975.json b/2020/CVE-2020-11975.json deleted file mode 100644 index c0a0b22fa6..0000000000 --- a/2020/CVE-2020-11975.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 315527204, - "name": "unomi_exploit", - "full_name": "1135\/unomi_exploit", - "owner": { - "login": "1135", - "id": 19515911, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19515911?v=4", - "html_url": "https:\/\/github.com\/1135" - }, - "html_url": "https:\/\/github.com\/1135\/unomi_exploit", - "description": "CVE-2020-11975 CVE-2020-13942", - "fork": false, - "created_at": "2020-11-24T05:23:42Z", - "updated_at": "2022-04-05T03:23:53Z", - "pushed_at": "2020-12-01T08:25:06Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-12137.json b/2020/CVE-2020-12137.json new file mode 100644 index 0000000000..6c533b2856 --- /dev/null +++ b/2020/CVE-2020-12137.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637261, + "name": "CVE-2020-12137", + "full_name": "Live-Hack-CVE\/CVE-2020-12137", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12137", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12137 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:46Z", + "updated_at": "2022-12-23T19:46:46Z", + "pushed_at": "2022-12-23T19:46:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12272.json b/2020/CVE-2020-12272.json new file mode 100644 index 0000000000..e685f9b1b8 --- /dev/null +++ b/2020/CVE-2020-12272.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637187, + "name": "CVE-2020-12272", + "full_name": "Live-Hack-CVE\/CVE-2020-12272", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12272", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12272 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:29Z", + "updated_at": "2022-12-23T19:46:29Z", + "pushed_at": "2022-12-23T19:46:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12507.json b/2020/CVE-2020-12507.json new file mode 100644 index 0000000000..337a1b5536 --- /dev/null +++ b/2020/CVE-2020-12507.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618324, + "name": "CVE-2020-12507", + "full_name": "Live-Hack-CVE\/CVE-2020-12507", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12507", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12507 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:25:06Z", + "updated_at": "2022-12-23T18:25:06Z", + "pushed_at": "2022-12-23T18:25:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12508.json b/2020/CVE-2020-12508.json new file mode 100644 index 0000000000..6ba265961d --- /dev/null +++ b/2020/CVE-2020-12508.json @@ -0,0 +1,31 @@ +[ + { + "id": 581618435, + "name": "CVE-2020-12508", + "full_name": "Live-Hack-CVE\/CVE-2020-12508", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12508", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12508 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:25:30Z", + "updated_at": "2022-12-23T18:25:30Z", + "pushed_at": "2022-12-23T18:25:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12509.json b/2020/CVE-2020-12509.json new file mode 100644 index 0000000000..bd04a99cf3 --- /dev/null +++ b/2020/CVE-2020-12509.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670390, + "name": "CVE-2020-12509", + "full_name": "Live-Hack-CVE\/CVE-2020-12509", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12509", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12509 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:10Z", + "updated_at": "2022-12-23T22:36:10Z", + "pushed_at": "2022-12-23T22:36:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12672.json b/2020/CVE-2020-12672.json new file mode 100644 index 0000000000..f823db308b --- /dev/null +++ b/2020/CVE-2020-12672.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645748, + "name": "CVE-2020-12672", + "full_name": "Live-Hack-CVE\/CVE-2020-12672", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12672", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12672 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:10Z", + "updated_at": "2022-12-23T20:26:10Z", + "pushed_at": "2022-12-23T20:26:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12762.json b/2020/CVE-2020-12762.json new file mode 100644 index 0000000000..049e0aea5e --- /dev/null +++ b/2020/CVE-2020-12762.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645423, + "name": "CVE-2020-12762", + "full_name": "Live-Hack-CVE\/CVE-2020-12762", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12762", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12762 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:37Z", + "updated_at": "2022-12-23T20:24:37Z", + "pushed_at": "2022-12-23T20:24:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12783.json b/2020/CVE-2020-12783.json new file mode 100644 index 0000000000..07a99e82e3 --- /dev/null +++ b/2020/CVE-2020-12783.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637228, + "name": "CVE-2020-12783", + "full_name": "Live-Hack-CVE\/CVE-2020-12783", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12783", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12783 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:39Z", + "updated_at": "2022-12-23T19:46:39Z", + "pushed_at": "2022-12-23T19:46:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12862.json b/2020/CVE-2020-12862.json new file mode 100644 index 0000000000..4671db9e29 --- /dev/null +++ b/2020/CVE-2020-12862.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670585, + "name": "CVE-2020-12862", + "full_name": "Live-Hack-CVE\/CVE-2020-12862", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12862", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12862 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:22Z", + "updated_at": "2022-12-23T22:37:22Z", + "pushed_at": "2022-12-23T22:37:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12863.json b/2020/CVE-2020-12863.json new file mode 100644 index 0000000000..317c8c6fd4 --- /dev/null +++ b/2020/CVE-2020-12863.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670601, + "name": "CVE-2020-12863", + "full_name": "Live-Hack-CVE\/CVE-2020-12863", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12863", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12863 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:28Z", + "updated_at": "2022-12-23T22:37:28Z", + "pushed_at": "2022-12-23T22:37:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12865.json b/2020/CVE-2020-12865.json new file mode 100644 index 0000000000..3c42f48861 --- /dev/null +++ b/2020/CVE-2020-12865.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670609, + "name": "CVE-2020-12865", + "full_name": "Live-Hack-CVE\/CVE-2020-12865", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12865", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12865 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:31Z", + "updated_at": "2022-12-23T22:37:31Z", + "pushed_at": "2022-12-23T22:37:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12867.json b/2020/CVE-2020-12867.json new file mode 100644 index 0000000000..1b01d0b181 --- /dev/null +++ b/2020/CVE-2020-12867.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636821, + "name": "CVE-2020-12867", + "full_name": "Live-Hack-CVE\/CVE-2020-12867", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12867", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12867 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:09Z", + "updated_at": "2022-12-23T19:45:09Z", + "pushed_at": "2022-12-23T19:45:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-12888.json b/2020/CVE-2020-12888.json new file mode 100644 index 0000000000..972f7dc333 --- /dev/null +++ b/2020/CVE-2020-12888.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645412, + "name": "CVE-2020-12888", + "full_name": "Live-Hack-CVE\/CVE-2020-12888", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-12888", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-12888 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:34Z", + "updated_at": "2022-12-23T20:24:34Z", + "pushed_at": "2022-12-23T20:24:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13249.json b/2020/CVE-2020-13249.json new file mode 100644 index 0000000000..897b79d058 --- /dev/null +++ b/2020/CVE-2020-13249.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636844, + "name": "CVE-2020-13249", + "full_name": "Live-Hack-CVE\/CVE-2020-13249", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13249", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13249 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:15Z", + "updated_at": "2022-12-23T19:45:15Z", + "pushed_at": "2022-12-23T19:45:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13285.json b/2020/CVE-2020-13285.json new file mode 100644 index 0000000000..aa4c519ac3 --- /dev/null +++ b/2020/CVE-2020-13285.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636584, + "name": "CVE-2020-13285", + "full_name": "Live-Hack-CVE\/CVE-2020-13285", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13285", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13285 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:08Z", + "updated_at": "2022-12-23T19:44:08Z", + "pushed_at": "2022-12-23T19:44:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13410.json b/2020/CVE-2020-13410.json new file mode 100644 index 0000000000..35000a4476 --- /dev/null +++ b/2020/CVE-2020-13410.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681881, + "name": "CVE-2020-13410", + "full_name": "Live-Hack-CVE\/CVE-2020-13410", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13410", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13410 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:17Z", + "updated_at": "2022-12-23T23:50:17Z", + "pushed_at": "2022-12-23T23:50:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13422.json b/2020/CVE-2020-13422.json new file mode 100644 index 0000000000..ef67389ec6 --- /dev/null +++ b/2020/CVE-2020-13422.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681863, + "name": "CVE-2020-13422", + "full_name": "Live-Hack-CVE\/CVE-2020-13422", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13422", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13422 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:11Z", + "updated_at": "2022-12-23T23:50:11Z", + "pushed_at": "2022-12-23T23:50:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13614.json b/2020/CVE-2020-13614.json new file mode 100644 index 0000000000..ea8b20d4ef --- /dev/null +++ b/2020/CVE-2020-13614.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645302, + "name": "CVE-2020-13614", + "full_name": "Live-Hack-CVE\/CVE-2020-13614", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13614", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13614 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:01Z", + "updated_at": "2022-12-23T20:24:01Z", + "pushed_at": "2022-12-23T20:24:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13659.json b/2020/CVE-2020-13659.json new file mode 100644 index 0000000000..600bafe46b --- /dev/null +++ b/2020/CVE-2020-13659.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636980, + "name": "CVE-2020-13659", + "full_name": "Live-Hack-CVE\/CVE-2020-13659", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13659", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13659 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:44Z", + "updated_at": "2022-12-23T19:45:44Z", + "pushed_at": "2022-12-23T19:45:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13882.json b/2020/CVE-2020-13882.json new file mode 100644 index 0000000000..a978416f63 --- /dev/null +++ b/2020/CVE-2020-13882.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677026, + "name": "CVE-2020-13882", + "full_name": "Live-Hack-CVE\/CVE-2020-13882", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13882", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13882 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:25Z", + "updated_at": "2022-12-23T23:17:25Z", + "pushed_at": "2022-12-23T23:17:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-13942.json b/2020/CVE-2020-13942.json index c3e834b96f..8c2ec9276b 100644 --- a/2020/CVE-2020-13942.json +++ b/2020/CVE-2020-13942.json @@ -1,149 +1,4 @@ [ - { - "id": 313899657, - "name": "CVE-2020-13942", - "full_name": "lp008\/CVE-2020-13942", - "owner": { - "login": "lp008", - "id": 11436275, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4", - "html_url": "https:\/\/github.com\/lp008" - }, - "html_url": "https:\/\/github.com\/lp008\/CVE-2020-13942", - "description": null, - "fork": false, - "created_at": "2020-11-18T10:29:47Z", - "updated_at": "2022-10-27T09:32:41Z", - "pushed_at": "2020-11-19T01:57:11Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 6, - "score": 0 - }, - { - "id": 314181474, - "name": "CVE-2020-13942", - "full_name": "eugenebmx\/CVE-2020-13942", - "owner": { - "login": "eugenebmx", - "id": 35716373, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35716373?v=4", - "html_url": "https:\/\/github.com\/eugenebmx" - }, - "html_url": "https:\/\/github.com\/eugenebmx\/CVE-2020-13942", - "description": "CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection", - "fork": false, - "created_at": "2020-11-19T08:22:17Z", - "updated_at": "2022-11-09T18:10:09Z", - "pushed_at": "2020-12-21T12:48:48Z", - "stargazers_count": 28, - "watchers_count": 28, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 28, - "score": 0 - }, - { - "id": 314692880, - "name": "CVE-2020-13942-POC-", - "full_name": "shifa123\/CVE-2020-13942-POC-", - "owner": { - "login": "shifa123", - "id": 18241082, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18241082?v=4", - "html_url": "https:\/\/github.com\/shifa123" - }, - "html_url": "https:\/\/github.com\/shifa123\/CVE-2020-13942-POC-", - "description": "CVE-2020-13942 POC + Automation Script", - "fork": false, - "created_at": "2020-11-20T23:25:44Z", - "updated_at": "2022-11-09T18:10:11Z", - "pushed_at": "2020-11-23T10:48:34Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 9, - "score": 0 - }, - { - "id": 314769989, - "name": "CVE-2020-13942", - "full_name": "blackmarketer\/CVE-2020-13942", - "owner": { - "login": "blackmarketer", - "id": 48115305, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48115305?v=4", - "html_url": "https:\/\/github.com\/blackmarketer" - }, - "html_url": "https:\/\/github.com\/blackmarketer\/CVE-2020-13942", - "description": null, - "fork": false, - "created_at": "2020-11-21T08:48:46Z", - "updated_at": "2021-01-15T02:51:15Z", - "pushed_at": "2022-10-12T16:32:58Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 4, - "score": 0 - }, - { - "id": 323504939, - "name": "Unomi-CVE-2020-13942", - "full_name": "yaunsky\/Unomi-CVE-2020-13942", - "owner": { - "login": "yaunsky", - "id": 48243087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4", - "html_url": "https:\/\/github.com\/yaunsky" - }, - "html_url": "https:\/\/github.com\/yaunsky\/Unomi-CVE-2020-13942", - "description": "CVE-2020-13942 Apache Unomi 远程代码执行漏洞脚getshell", - "fork": false, - "created_at": "2020-12-22T02:57:50Z", - "updated_at": "2020-12-22T03:30:18Z", - "pushed_at": "2020-12-22T02:58:55Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0 - }, { "id": 328714228, "name": "apche_unomi_rce", diff --git a/2020/CVE-2020-13963.json b/2020/CVE-2020-13963.json new file mode 100644 index 0000000000..b85ce4142a --- /dev/null +++ b/2020/CVE-2020-13963.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681875, + "name": "CVE-2020-13963", + "full_name": "Live-Hack-CVE\/CVE-2020-13963", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-13963", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-13963 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:14Z", + "updated_at": "2022-12-23T23:50:14Z", + "pushed_at": "2022-12-23T23:50:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14004.json b/2020/CVE-2020-14004.json new file mode 100644 index 0000000000..da495181e7 --- /dev/null +++ b/2020/CVE-2020-14004.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636833, + "name": "CVE-2020-14004", + "full_name": "Live-Hack-CVE\/CVE-2020-14004", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14004", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14004 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:12Z", + "updated_at": "2022-12-23T19:45:12Z", + "pushed_at": "2022-12-23T19:45:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14295.json b/2020/CVE-2020-14295.json index c0b60c3c02..8e14507c3c 100644 --- a/2020/CVE-2020-14295.json +++ b/2020/CVE-2020-14295.json @@ -56,5 +56,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581636784, + "name": "CVE-2020-14295", + "full_name": "Live-Hack-CVE\/CVE-2020-14295", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14295", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14295 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:59Z", + "updated_at": "2022-12-23T19:44:59Z", + "pushed_at": "2022-12-23T19:45:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14306.json b/2020/CVE-2020-14306.json new file mode 100644 index 0000000000..888d3068e4 --- /dev/null +++ b/2020/CVE-2020-14306.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676037, + "name": "CVE-2020-14306", + "full_name": "Live-Hack-CVE\/CVE-2020-14306", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14306", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14306 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:51Z", + "updated_at": "2022-12-23T23:10:51Z", + "pushed_at": "2022-12-23T23:10:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14307.json b/2020/CVE-2020-14307.json new file mode 100644 index 0000000000..f1b01e6161 --- /dev/null +++ b/2020/CVE-2020-14307.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669236, + "name": "CVE-2020-14307", + "full_name": "Live-Hack-CVE\/CVE-2020-14307", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14307", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14307 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:54Z", + "updated_at": "2022-12-23T22:29:55Z", + "pushed_at": "2022-12-23T22:29:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14330.json b/2020/CVE-2020-14330.json new file mode 100644 index 0000000000..cc4d473543 --- /dev/null +++ b/2020/CVE-2020-14330.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646580, + "name": "CVE-2020-14330", + "full_name": "Live-Hack-CVE\/CVE-2020-14330", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14330", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14330 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:07Z", + "updated_at": "2022-12-23T20:30:07Z", + "pushed_at": "2022-12-23T20:30:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14334.json b/2020/CVE-2020-14334.json new file mode 100644 index 0000000000..723d11b2ab --- /dev/null +++ b/2020/CVE-2020-14334.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670591, + "name": "CVE-2020-14334", + "full_name": "Live-Hack-CVE\/CVE-2020-14334", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14334", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14334 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:25Z", + "updated_at": "2022-12-23T22:37:25Z", + "pushed_at": "2022-12-23T22:37:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14339.json b/2020/CVE-2020-14339.json new file mode 100644 index 0000000000..0e1bdcc2ae --- /dev/null +++ b/2020/CVE-2020-14339.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676399, + "name": "CVE-2020-14339", + "full_name": "Live-Hack-CVE\/CVE-2020-14339", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14339", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14339 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:15Z", + "updated_at": "2022-12-23T23:13:15Z", + "pushed_at": "2022-12-23T23:13:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14342.json b/2020/CVE-2020-14342.json new file mode 100644 index 0000000000..d70a365487 --- /dev/null +++ b/2020/CVE-2020-14342.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636131, + "name": "CVE-2020-14342", + "full_name": "Live-Hack-CVE\/CVE-2020-14342", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14342", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14342 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:28Z", + "updated_at": "2022-12-23T19:42:28Z", + "pushed_at": "2022-12-23T19:42:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14346.json b/2020/CVE-2020-14346.json new file mode 100644 index 0000000000..52edf0e19f --- /dev/null +++ b/2020/CVE-2020-14346.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669251, + "name": "CVE-2020-14346", + "full_name": "Live-Hack-CVE\/CVE-2020-14346", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14346", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14346 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:01Z", + "updated_at": "2022-12-23T22:30:01Z", + "pushed_at": "2022-12-23T22:30:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14364.json b/2020/CVE-2020-14364.json index 40f974b3c4..3987966879 100644 --- a/2020/CVE-2020-14364.json +++ b/2020/CVE-2020-14364.json @@ -56,5 +56,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581636401, + "name": "CVE-2020-14364", + "full_name": "Live-Hack-CVE\/CVE-2020-14364", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14364", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14364 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:27Z", + "updated_at": "2022-12-23T19:43:27Z", + "pushed_at": "2022-12-23T19:43:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14370.json b/2020/CVE-2020-14370.json new file mode 100644 index 0000000000..7a5bf18fa1 --- /dev/null +++ b/2020/CVE-2020-14370.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676007, + "name": "CVE-2020-14370", + "full_name": "Live-Hack-CVE\/CVE-2020-14370", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14370", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14370 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:38Z", + "updated_at": "2022-12-23T23:10:38Z", + "pushed_at": "2022-12-23T23:10:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14378.json b/2020/CVE-2020-14378.json new file mode 100644 index 0000000000..0ae5faffd4 --- /dev/null +++ b/2020/CVE-2020-14378.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676047, + "name": "CVE-2020-14378", + "full_name": "Live-Hack-CVE\/CVE-2020-14378", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14378", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14378 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:54Z", + "updated_at": "2022-12-23T23:10:54Z", + "pushed_at": "2022-12-23T23:10:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14389.json b/2020/CVE-2020-14389.json new file mode 100644 index 0000000000..10eeefa737 --- /dev/null +++ b/2020/CVE-2020-14389.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635851, + "name": "CVE-2020-14389", + "full_name": "Live-Hack-CVE\/CVE-2020-14389", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14389", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14389 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:15Z", + "updated_at": "2022-12-23T19:41:15Z", + "pushed_at": "2022-12-23T19:41:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14444.json b/2020/CVE-2020-14444.json new file mode 100644 index 0000000000..d942c5dbaa --- /dev/null +++ b/2020/CVE-2020-14444.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636719, + "name": "CVE-2020-14444", + "full_name": "Live-Hack-CVE\/CVE-2020-14444", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14444", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14444 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:46Z", + "updated_at": "2022-12-23T19:44:46Z", + "pushed_at": "2022-12-23T19:44:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14445.json b/2020/CVE-2020-14445.json new file mode 100644 index 0000000000..1148433262 --- /dev/null +++ b/2020/CVE-2020-14445.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636711, + "name": "CVE-2020-14445", + "full_name": "Live-Hack-CVE\/CVE-2020-14445", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14445", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14445 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:42Z", + "updated_at": "2022-12-23T19:44:42Z", + "pushed_at": "2022-12-23T19:44:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14446.json b/2020/CVE-2020-14446.json new file mode 100644 index 0000000000..bbf1c986b0 --- /dev/null +++ b/2020/CVE-2020-14446.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636796, + "name": "CVE-2020-14446", + "full_name": "Live-Hack-CVE\/CVE-2020-14446", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-14446", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-14446 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:02Z", + "updated_at": "2022-12-23T19:50:18Z", + "pushed_at": "2022-12-23T19:45:04Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-14645.json b/2020/CVE-2020-14645.json index e55fec9e71..222df29214 100644 --- a/2020/CVE-2020-14645.json +++ b/2020/CVE-2020-14645.json @@ -1,33 +1,4 @@ [ - { - "id": 305992602, - "name": "CVE-2020-14645-code", - "full_name": "HYWZ36\/CVE-2020-14645-code", - "owner": { - "login": "HYWZ36", - "id": 27775281, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27775281?v=4", - "html_url": "https:\/\/github.com\/HYWZ36" - }, - "html_url": "https:\/\/github.com\/HYWZ36\/CVE-2020-14645-code", - "description": null, - "fork": false, - "created_at": "2020-10-21T10:47:07Z", - "updated_at": "2020-11-16T02:32:15Z", - "pushed_at": "2020-11-16T02:32:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 324076751, "name": "CVE-2020-14645", diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 2a0e9db730..a92a6ad726 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -202,35 +202,6 @@ "watchers": 0, "score": 0 }, - { - "id": 299264416, - "name": "CVE-2020-1472", - "full_name": "Whippet0\/CVE-2020-1472", - "owner": { - "login": "Whippet0", - "id": 46486374, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46486374?v=4", - "html_url": "https:\/\/github.com\/Whippet0" - }, - "html_url": "https:\/\/github.com\/Whippet0\/CVE-2020-1472", - "description": "CVE-2020-1472", - "fork": false, - "created_at": "2020-09-28T09:54:31Z", - "updated_at": "2020-11-17T06:01:36Z", - "pushed_at": "2020-11-17T06:01:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 304764704, "name": "CVE-2020-1472_ZeroLogonChecker", @@ -289,93 +260,6 @@ "watchers": 1, "score": 0 }, - { - "id": 311800203, - "name": "The_big_Zero", - "full_name": "JayP232\/The_big_Zero", - "owner": { - "login": "JayP232", - "id": 40582783, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40582783?v=4", - "html_url": "https:\/\/github.com\/JayP232" - }, - "html_url": "https:\/\/github.com\/JayP232\/The_big_Zero", - "description": "The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DC", - "fork": false, - "created_at": "2020-11-10T22:29:56Z", - "updated_at": "2020-12-04T21:08:46Z", - "pushed_at": "2020-12-04T21:08:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 313376422, - "name": "CVE-2020-1472", - "full_name": "b1ack0wl\/CVE-2020-1472", - "owner": { - "login": "b1ack0wl", - "id": 14972026, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14972026?v=4", - "html_url": "https:\/\/github.com\/b1ack0wl" - }, - "html_url": "https:\/\/github.com\/b1ack0wl\/CVE-2020-1472", - "description": null, - "fork": false, - "created_at": "2020-11-16T17:24:25Z", - "updated_at": "2022-11-27T19:24:21Z", - "pushed_at": "2020-11-16T17:38:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 323842467, - "name": "CVE-2020-1472", - "full_name": "SaharAttackit\/CVE-2020-1472", - "owner": { - "login": "SaharAttackit", - "id": 76513483, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76513483?v=4", - "html_url": "https:\/\/github.com\/SaharAttackit" - }, - "html_url": "https:\/\/github.com\/SaharAttackit\/CVE-2020-1472", - "description": null, - "fork": false, - "created_at": "2020-12-23T08:12:21Z", - "updated_at": "2020-12-23T08:24:12Z", - "pushed_at": "2020-12-23T08:13:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 325937253, "name": "zerologon", diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 306ae7e410..7c3dbc3e05 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -48,93 +48,6 @@ "watchers": 3644, "score": 0 }, - { - "id": 307998445, - "name": "CVE-2020-14882", - "full_name": "jas502n\/CVE-2020-14882", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882", - "description": "CVE-2020–14882、CVE-2020–14883", - "fork": false, - "created_at": "2020-10-28T11:43:37Z", - "updated_at": "2022-12-14T15:41:48Z", - "pushed_at": "2020-11-16T04:23:09Z", - "stargazers_count": 268, - "watchers_count": 268, - "has_discussions": false, - "forks_count": 58, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 58, - "watchers": 268, - "score": 0 - }, - { - "id": 308184758, - "name": "-Patched-McMaster-University-Blind-Command-Injection", - "full_name": "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection", - "owner": { - "login": "Umarovm", - "id": 25722145, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722145?v=4", - "html_url": "https:\/\/github.com\/Umarovm" - }, - "html_url": "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection", - "description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.", - "fork": false, - "created_at": "2020-10-29T01:28:41Z", - "updated_at": "2020-12-04T02:16:03Z", - "pushed_at": "2020-12-04T02:16:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 308782228, - "name": "CVE-2020-14882_POC", - "full_name": "GGyao\/CVE-2020-14882_POC", - "owner": { - "login": "GGyao", - "id": 38530938, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4", - "html_url": "https:\/\/github.com\/GGyao" - }, - "html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC", - "description": "CVE-2020-14882批量验证工具。", - "fork": false, - "created_at": "2020-10-31T01:43:54Z", - "updated_at": "2022-09-05T15:26:08Z", - "pushed_at": "2020-12-01T05:05:24Z", - "stargazers_count": 13, - "watchers_count": 13, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 13, - "score": 0 - }, { "id": 309655403, "name": "CVE-2020-14882_ALL", @@ -164,93 +77,6 @@ "watchers": 127, "score": 0 }, - { - "id": 312193698, - "name": "CVE-2020-14882-weblogicRCE", - "full_name": "corelight\/CVE-2020-14882-weblogicRCE", - "owner": { - "login": "corelight", - "id": 21672558, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", - "html_url": "https:\/\/github.com\/corelight" - }, - "html_url": "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE", - "description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750", - "fork": false, - "created_at": "2020-11-12T06:59:54Z", - "updated_at": "2022-07-13T18:57:55Z", - "pushed_at": "2020-12-02T21:43:52Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 7, - "score": 0 - }, - { - "id": 312256179, - "name": "CVE-2020-14882", - "full_name": "xfiftyone\/CVE-2020-14882", - "owner": { - "login": "xfiftyone", - "id": 45651912, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45651912?v=4", - "html_url": "https:\/\/github.com\/xfiftyone" - }, - "html_url": "https:\/\/github.com\/xfiftyone\/CVE-2020-14882", - "description": null, - "fork": false, - "created_at": "2020-11-12T11:27:39Z", - "updated_at": "2021-07-08T07:02:26Z", - "pushed_at": "2020-11-13T03:35:44Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0 - }, - { - "id": 313643357, - "name": "CVE-2020-14882", - "full_name": "BabyTeam1024\/CVE-2020-14882", - "owner": { - "login": "BabyTeam1024", - "id": 74447452, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4", - "html_url": "https:\/\/github.com\/BabyTeam1024" - }, - "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882", - "description": null, - "fork": false, - "created_at": "2020-11-17T14:23:23Z", - "updated_at": "2020-11-17T14:23:23Z", - "pushed_at": "2020-11-17T14:23:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 325429279, "name": "CodeTest", diff --git a/2020/CVE-2020-15002.json b/2020/CVE-2020-15002.json deleted file mode 100644 index a8f2c330e0..0000000000 --- a/2020/CVE-2020-15002.json +++ /dev/null @@ -1,60 +0,0 @@ -[ - { - "id": 321271734, - "name": "Blind-SSRF-CVE-2020-15002", - "full_name": "skr0x1c0\/Blind-SSRF-CVE-2020-15002", - "owner": { - "login": "skr0x1c0", - "id": 75971916, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75971916?v=4", - "html_url": "https:\/\/github.com\/skr0x1c0" - }, - "html_url": "https:\/\/github.com\/skr0x1c0\/Blind-SSRF-CVE-2020-15002", - "description": "https:\/\/hackerone.com\/reports\/865652", - "fork": false, - "created_at": "2020-12-14T07:48:44Z", - "updated_at": "2020-12-14T07:52:11Z", - "pushed_at": "2020-12-14T07:49:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 321272199, - "name": "SSRF-CVE-2020-15002", - "full_name": "skr0x1c0\/SSRF-CVE-2020-15002", - "owner": { - "login": "skr0x1c0", - "id": 75971916, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75971916?v=4", - "html_url": "https:\/\/github.com\/skr0x1c0" - }, - "html_url": "https:\/\/github.com\/skr0x1c0\/SSRF-CVE-2020-15002", - "description": "https:\/\/hackerone.com\/reports\/863553", - "fork": false, - "created_at": "2020-12-14T07:50:45Z", - "updated_at": "2020-12-14T07:57:57Z", - "pushed_at": "2020-12-14T07:56:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-15166.json b/2020/CVE-2020-15166.json new file mode 100644 index 0000000000..b0f4f1ebf6 --- /dev/null +++ b/2020/CVE-2020-15166.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636337, + "name": "CVE-2020-15166", + "full_name": "Live-Hack-CVE\/CVE-2020-15166", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15166", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15166 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:13Z", + "updated_at": "2022-12-23T19:43:13Z", + "pushed_at": "2022-12-23T19:43:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15227.json b/2020/CVE-2020-15227.json index 7a096b4c74..73028b8102 100644 --- a/2020/CVE-2020-15227.json +++ b/2020/CVE-2020-15227.json @@ -1,35 +1,4 @@ [ - { - "id": 313061696, - "name": "CVE-2020-15227", - "full_name": "filipsedivy\/CVE-2020-15227", - "owner": { - "login": "filipsedivy", - "id": 5647591, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5647591?v=4", - "html_url": "https:\/\/github.com\/filipsedivy" - }, - "html_url": "https:\/\/github.com\/filipsedivy\/CVE-2020-15227", - "description": "CVE-2020-15227 checker", - "fork": false, - "created_at": "2020-11-15T15:30:01Z", - "updated_at": "2020-11-16T20:29:13Z", - "pushed_at": "2020-11-15T21:49:09Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "vulnerability-scanners" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 333728980, "name": "cve-2020-15227", diff --git a/2020/CVE-2020-15228.json b/2020/CVE-2020-15228.json deleted file mode 100644 index 4ee15e72e3..0000000000 --- a/2020/CVE-2020-15228.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 312263531, - "name": "fix-CVE-2020-15228", - "full_name": "guettli\/fix-CVE-2020-15228", - "owner": { - "login": "guettli", - "id": 414336, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/414336?v=4", - "html_url": "https:\/\/github.com\/guettli" - }, - "html_url": "https:\/\/github.com\/guettli\/fix-CVE-2020-15228", - "description": "Fix CVE-2020-15228 (set-env, add-path in Github-Actions)", - "fork": false, - "created_at": "2020-11-12T11:59:47Z", - "updated_at": "2022-06-30T18:12:56Z", - "pushed_at": "2020-11-16T10:31:51Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 6, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-15229.json b/2020/CVE-2020-15229.json new file mode 100644 index 0000000000..52a0a2819a --- /dev/null +++ b/2020/CVE-2020-15229.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629179, + "name": "CVE-2020-15229", + "full_name": "Live-Hack-CVE\/CVE-2020-15229", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15229", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15229 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:34Z", + "updated_at": "2022-12-23T19:10:34Z", + "pushed_at": "2022-12-23T19:10:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15309.json b/2020/CVE-2020-15309.json new file mode 100644 index 0000000000..ce35849843 --- /dev/null +++ b/2020/CVE-2020-15309.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636497, + "name": "CVE-2020-15309", + "full_name": "Live-Hack-CVE\/CVE-2020-15309", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15309", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15309 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:51Z", + "updated_at": "2022-12-23T19:43:51Z", + "pushed_at": "2022-12-23T19:43:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15349.json b/2020/CVE-2020-15349.json deleted file mode 100644 index 48ef70e73f..0000000000 --- a/2020/CVE-2020-15349.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 312567868, - "name": "Forklift_LPE", - "full_name": "Traxes\/Forklift_LPE", - "owner": { - "login": "Traxes", - "id": 6783032, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6783032?v=4", - "html_url": "https:\/\/github.com\/Traxes" - }, - "html_url": "https:\/\/github.com\/Traxes\/Forklift_LPE", - "description": "Vulnerability Description of CVE-2020-15349", - "fork": false, - "created_at": "2020-11-13T12:20:07Z", - "updated_at": "2022-07-21T09:18:36Z", - "pushed_at": "2020-11-13T13:41:42Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 9, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-15395.json b/2020/CVE-2020-15395.json new file mode 100644 index 0000000000..3ce3295277 --- /dev/null +++ b/2020/CVE-2020-15395.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636810, + "name": "CVE-2020-15395", + "full_name": "Live-Hack-CVE\/CVE-2020-15395", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15395", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15395 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:05Z", + "updated_at": "2022-12-23T19:45:05Z", + "pushed_at": "2022-12-23T19:45:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15500.json b/2020/CVE-2020-15500.json new file mode 100644 index 0000000000..0eab8de3ca --- /dev/null +++ b/2020/CVE-2020-15500.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655147, + "name": "CVE-2020-15500", + "full_name": "Live-Hack-CVE\/CVE-2020-15500", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15500", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15500 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:41Z", + "updated_at": "2022-12-23T21:12:41Z", + "pushed_at": "2022-12-23T21:12:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15676.json b/2020/CVE-2020-15676.json new file mode 100644 index 0000000000..57745d27f7 --- /dev/null +++ b/2020/CVE-2020-15676.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636003, + "name": "CVE-2020-15676", + "full_name": "Live-Hack-CVE\/CVE-2020-15676", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15676", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15676 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:56Z", + "updated_at": "2022-12-23T19:41:56Z", + "pushed_at": "2022-12-23T19:41:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15677.json b/2020/CVE-2020-15677.json new file mode 100644 index 0000000000..f9a70f2bac --- /dev/null +++ b/2020/CVE-2020-15677.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635935, + "name": "CVE-2020-15677", + "full_name": "Live-Hack-CVE\/CVE-2020-15677", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15677", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15677 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:39Z", + "updated_at": "2022-12-23T19:41:39Z", + "pushed_at": "2022-12-23T19:41:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15678.json b/2020/CVE-2020-15678.json new file mode 100644 index 0000000000..f476d3f0fc --- /dev/null +++ b/2020/CVE-2020-15678.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629202, + "name": "CVE-2020-15678", + "full_name": "Live-Hack-CVE\/CVE-2020-15678", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15678", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15678 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:41Z", + "updated_at": "2022-12-23T19:10:41Z", + "pushed_at": "2022-12-23T19:10:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15706.json b/2020/CVE-2020-15706.json new file mode 100644 index 0000000000..7fd6bd75f7 --- /dev/null +++ b/2020/CVE-2020-15706.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636698, + "name": "CVE-2020-15706", + "full_name": "Live-Hack-CVE\/CVE-2020-15706", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15706", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15706 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:39Z", + "updated_at": "2022-12-23T19:44:39Z", + "pushed_at": "2022-12-23T19:44:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15802.json b/2020/CVE-2020-15802.json index cdb1e38ad9..365c441efd 100644 --- a/2020/CVE-2020-15802.json +++ b/2020/CVE-2020-15802.json @@ -32,5 +32,34 @@ "forks": 3, "watchers": 6, "score": 0 + }, + { + "id": 581635928, + "name": "CVE-2020-15802", + "full_name": "Live-Hack-CVE\/CVE-2020-15802", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15802", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15802 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:35Z", + "updated_at": "2022-12-23T19:41:35Z", + "pushed_at": "2022-12-23T19:41:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-15902.json b/2020/CVE-2020-15902.json new file mode 100644 index 0000000000..2664bed521 --- /dev/null +++ b/2020/CVE-2020-15902.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636765, + "name": "CVE-2020-15902", + "full_name": "Live-Hack-CVE\/CVE-2020-15902", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15902", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15902 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:55Z", + "updated_at": "2022-12-23T19:44:55Z", + "pushed_at": "2022-12-23T19:44:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-15917.json b/2020/CVE-2020-15917.json new file mode 100644 index 0000000000..eaec4304db --- /dev/null +++ b/2020/CVE-2020-15917.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636749, + "name": "CVE-2020-15917", + "full_name": "Live-Hack-CVE\/CVE-2020-15917", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-15917", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-15917 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:52Z", + "updated_at": "2022-12-23T19:44:52Z", + "pushed_at": "2022-12-23T19:44:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-16150.json b/2020/CVE-2020-16150.json new file mode 100644 index 0000000000..af1774693b --- /dev/null +++ b/2020/CVE-2020-16150.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636164, + "name": "CVE-2020-16150", + "full_name": "Live-Hack-CVE\/CVE-2020-16150", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-16150", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-16150 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:35Z", + "updated_at": "2022-12-23T19:42:35Z", + "pushed_at": "2022-12-23T19:42:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-16947.json b/2020/CVE-2020-16947.json index 2d3a99cf25..50e2159290 100644 --- a/2020/CVE-2020-16947.json +++ b/2020/CVE-2020-16947.json @@ -1,33 +1,4 @@ [ - { - "id": 314771487, - "name": "CVE-2020-16947", - "full_name": "MasterSploit\/CVE-2020-16947", - "owner": { - "login": "MasterSploit", - "id": 74764997, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74764997?v=4", - "html_url": "https:\/\/github.com\/MasterSploit" - }, - "html_url": "https:\/\/github.com\/MasterSploit\/CVE-2020-16947", - "description": "Outlook 2019 Remote Command Execution", - "fork": false, - "created_at": "2020-11-21T08:58:32Z", - "updated_at": "2020-11-25T16:33:09Z", - "pushed_at": "2020-11-21T09:09:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 581585043, "name": "CVE-2020-16947", diff --git a/2020/CVE-2020-17057.json b/2020/CVE-2020-17057.json index 3683c5c46b..3f489e03c0 100644 --- a/2020/CVE-2020-17057.json +++ b/2020/CVE-2020-17057.json @@ -1,33 +1,4 @@ [ - { - "id": 323866440, - "name": "cve-2020-17057", - "full_name": "ze0r\/cve-2020-17057", - "owner": { - "login": "ze0r", - "id": 43227253, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4", - "html_url": "https:\/\/github.com\/ze0r" - }, - "html_url": "https:\/\/github.com\/ze0r\/cve-2020-17057", - "description": "cve-2020-17057 poc", - "fork": false, - "created_at": "2020-12-23T10:02:47Z", - "updated_at": "2022-11-09T18:10:33Z", - "pushed_at": "2020-12-23T10:08:16Z", - "stargazers_count": 29, - "watchers_count": 29, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 29, - "score": 0 - }, { "id": 341907101, "name": "CVE-2020-17057", diff --git a/2020/CVE-2020-1706.json b/2020/CVE-2020-1706.json new file mode 100644 index 0000000000..ca86c70dfb --- /dev/null +++ b/2020/CVE-2020-1706.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675770, + "name": "CVE-2020-1706", + "full_name": "Live-Hack-CVE\/CVE-2020-1706", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-1706", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-1706 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:18Z", + "updated_at": "2022-12-23T23:09:18Z", + "pushed_at": "2022-12-23T23:09:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-1707.json b/2020/CVE-2020-1707.json new file mode 100644 index 0000000000..23ec4fdc91 --- /dev/null +++ b/2020/CVE-2020-1707.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675761, + "name": "CVE-2020-1707", + "full_name": "Live-Hack-CVE\/CVE-2020-1707", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-1707", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-1707 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:14Z", + "updated_at": "2022-12-23T23:09:14Z", + "pushed_at": "2022-12-23T23:09:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index 9058edbcb4..23af6eb99d 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -1,33 +1,4 @@ [ - { - "id": 316112234, - "name": "CVE-2020-17087", - "full_name": "revengsh\/CVE-2020-17087", - "owner": { - "login": "revengsh", - "id": 49122088, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49122088?v=4", - "html_url": "https:\/\/github.com\/revengsh" - }, - "html_url": "https:\/\/github.com\/revengsh\/CVE-2020-17087", - "description": "A CVE-2020-17087 PoC.", - "fork": false, - "created_at": "2020-11-26T03:21:34Z", - "updated_at": "2022-06-13T22:21:30Z", - "pushed_at": "2020-11-26T04:21:20Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0 - }, { "id": 371444911, "name": "OHTS_IE6052-CVE-2020-17087", diff --git a/2020/CVE-2020-1709.json b/2020/CVE-2020-1709.json new file mode 100644 index 0000000000..a9da7f7805 --- /dev/null +++ b/2020/CVE-2020-1709.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675749, + "name": "CVE-2020-1709", + "full_name": "Live-Hack-CVE\/CVE-2020-1709", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-1709", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-1709 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:08Z", + "updated_at": "2022-12-23T23:09:08Z", + "pushed_at": "2022-12-23T23:09:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-17144.json b/2020/CVE-2020-17144.json index 81a8cb58e1..3a1bb255a6 100644 --- a/2020/CVE-2020-17144.json +++ b/2020/CVE-2020-17144.json @@ -27,34 +27,5 @@ "forks": 43, "watchers": 153, "score": 0 - }, - { - "id": 320077749, - "name": "CVE-2020-17144", - "full_name": "zcgonvh\/CVE-2020-17144", - "owner": { - "login": "zcgonvh", - "id": 25787677, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4", - "html_url": "https:\/\/github.com\/zcgonvh" - }, - "html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-17144", - "description": "weaponized tool for CVE-2020-17144", - "fork": false, - "created_at": "2020-12-09T20:57:16Z", - "updated_at": "2022-12-15T15:09:10Z", - "pushed_at": "2020-12-09T20:57:32Z", - "stargazers_count": 148, - "watchers_count": 148, - "has_discussions": false, - "forks_count": 28, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 28, - "watchers": 148, - "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1730.json b/2020/CVE-2020-1730.json new file mode 100644 index 0000000000..8f6148a04a --- /dev/null +++ b/2020/CVE-2020-1730.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669222, + "name": "CVE-2020-1730", + "full_name": "Live-Hack-CVE\/CVE-2020-1730", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-1730", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-1730 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:51Z", + "updated_at": "2022-12-23T22:29:51Z", + "pushed_at": "2022-12-23T22:29:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-17373.json b/2020/CVE-2020-17373.json new file mode 100644 index 0000000000..d0422aac42 --- /dev/null +++ b/2020/CVE-2020-17373.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636669, + "name": "CVE-2020-17373", + "full_name": "Live-Hack-CVE\/CVE-2020-17373", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-17373", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-17373 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:33Z", + "updated_at": "2022-12-23T19:44:33Z", + "pushed_at": "2022-12-23T19:44:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-1744.json b/2020/CVE-2020-1744.json new file mode 100644 index 0000000000..f86f145515 --- /dev/null +++ b/2020/CVE-2020-1744.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637288, + "name": "CVE-2020-1744", + "full_name": "Live-Hack-CVE\/CVE-2020-1744", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-1744", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-1744 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:52Z", + "updated_at": "2022-12-23T19:46:52Z", + "pushed_at": "2022-12-23T19:46:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-17530.json b/2020/CVE-2020-17530.json index cd89eca54e..678edca490 100644 --- a/2020/CVE-2020-17530.json +++ b/2020/CVE-2020-17530.json @@ -1,152 +1,4 @@ [ - { - "id": 319912115, - "name": "CVE-2020-17530", - "full_name": "ka1n4t\/CVE-2020-17530", - "owner": { - "login": "ka1n4t", - "id": 22983012, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22983012?v=4", - "html_url": "https:\/\/github.com\/ka1n4t" - }, - "html_url": "https:\/\/github.com\/ka1n4t\/CVE-2020-17530", - "description": null, - "fork": false, - "created_at": "2020-12-09T09:53:08Z", - "updated_at": "2022-04-15T01:43:32Z", - "pushed_at": "2020-12-09T09:57:45Z", - "stargazers_count": 64, - "watchers_count": 64, - "has_discussions": false, - "forks_count": 15, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 15, - "watchers": 64, - "score": 0 - }, - { - "id": 320346242, - "name": "CVE-2020-17530", - "full_name": "wuzuowei\/CVE-2020-17530", - "owner": { - "login": "wuzuowei", - "id": 26717790, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26717790?v=4", - "html_url": "https:\/\/github.com\/wuzuowei" - }, - "html_url": "https:\/\/github.com\/wuzuowei\/CVE-2020-17530", - "description": "S2-061 的payload,以及对应简单的PoC\/Exp", - "fork": false, - "created_at": "2020-12-10T17:42:37Z", - "updated_at": "2022-10-20T16:05:36Z", - "pushed_at": "2020-12-18T00:57:50Z", - "stargazers_count": 46, - "watchers_count": 46, - "has_discussions": false, - "forks_count": 26, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 26, - "watchers": 46, - "score": 0 - }, - { - "id": 321044044, - "name": "CVE-2020-17530", - "full_name": "Al1ex\/CVE-2020-17530", - "owner": { - "login": "Al1ex", - "id": 38161463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", - "html_url": "https:\/\/github.com\/Al1ex" - }, - "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-17530", - "description": "S2-061 CVE-2020-17530", - "fork": false, - "created_at": "2020-12-13T11:02:15Z", - "updated_at": "2022-11-23T07:20:29Z", - "pushed_at": "2020-12-22T15:27:51Z", - "stargazers_count": 30, - "watchers_count": 30, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2020-17530", - "s2-061" - ], - "visibility": "public", - "forks": 10, - "watchers": 30, - "score": 0 - }, - { - "id": 321259848, - "name": "CVE-2020-17530-strust2-061", - "full_name": "fengziHK\/CVE-2020-17530-strust2-061", - "owner": { - "login": "fengziHK", - "id": 26290583, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26290583?v=4", - "html_url": "https:\/\/github.com\/fengziHK" - }, - "html_url": "https:\/\/github.com\/fengziHK\/CVE-2020-17530-strust2-061", - "description": "CVE-2020-17530-strust2-061", - "fork": false, - "created_at": "2020-12-14T06:54:57Z", - "updated_at": "2021-03-12T23:53:51Z", - "pushed_at": "2020-12-14T06:57:07Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 5, - "score": 0 - }, - { - "id": 322516511, - "name": "freemarker_RCE_struts2_s2-061", - "full_name": "ludy-dev\/freemarker_RCE_struts2_s2-061", - "owner": { - "login": "ludy-dev", - "id": 70466565, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4", - "html_url": "https:\/\/github.com\/ludy-dev" - }, - "html_url": "https:\/\/github.com\/ludy-dev\/freemarker_RCE_struts2_s2-061", - "description": "(cve-2020-17530) struts2_s2-061 freemarker_RCE testscript", - "fork": false, - "created_at": "2020-12-18T07:03:57Z", - "updated_at": "2020-12-18T07:05:31Z", - "pushed_at": "2020-12-18T07:05:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0 - }, { "id": 325608497, "name": "CVE-2020-17530", diff --git a/2020/CVE-2020-17531.json b/2020/CVE-2020-17531.json index 2e5e6a6cce..12d3c46cec 100644 --- a/2020/CVE-2020-17531.json +++ b/2020/CVE-2020-17531.json @@ -1,33 +1,4 @@ [ - { - "id": 319884337, - "name": "CVE-2020-17531", - "full_name": "154802388\/CVE-2020-17531", - "owner": { - "login": "154802388", - "id": 44390729, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44390729?v=4", - "html_url": "https:\/\/github.com\/154802388" - }, - "html_url": "https:\/\/github.com\/154802388\/CVE-2020-17531", - "description": "Apache Struts2框架是一个用于开发Java EE网络应用程序的Web框架。Apache Struts于2020年12月08日披露 S2-061 Struts 远程代码执行漏洞(CVE-2020-17530),在使用某些tag等情况下可能存在OGNL表达式注入漏洞,从而造成远程代码执行,风险极大。提醒我校Apache Struts用户尽快采取安全措施阻止漏洞攻击。", - "fork": false, - "created_at": "2020-12-09T08:01:10Z", - "updated_at": "2020-12-24T03:29:48Z", - "pushed_at": "2020-12-09T03:10:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - }, { "id": 581513327, "name": "CVE-2020-17531", diff --git a/2020/CVE-2020-17533.json b/2020/CVE-2020-17533.json deleted file mode 100644 index 74f2f14b66..0000000000 --- a/2020/CVE-2020-17533.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 319951353, - "name": "CVE-2020-17533", - "full_name": "pazeray\/CVE-2020-17533", - "owner": { - "login": "pazeray", - "id": 75724257, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75724257?v=4", - "html_url": "https:\/\/github.com\/pazeray" - }, - "html_url": "https:\/\/github.com\/pazeray\/CVE-2020-17533", - "description": null, - "fork": false, - "created_at": "2020-12-09T12:34:54Z", - "updated_at": "2021-09-09T13:27:49Z", - "pushed_at": "2020-12-09T00:42:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-17541.json b/2020/CVE-2020-17541.json new file mode 100644 index 0000000000..d2d3ddc1eb --- /dev/null +++ b/2020/CVE-2020-17541.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676977, + "name": "CVE-2020-17541", + "full_name": "Live-Hack-CVE\/CVE-2020-17541", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-17541", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-17541 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:05Z", + "updated_at": "2022-12-23T23:17:05Z", + "pushed_at": "2022-12-23T23:17:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 42167c0b45..f9cec68e53 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -614,35 +614,6 @@ "watchers": 1, "score": 0 }, - { - "id": 312827286, - "name": "cve-2020-1938", - "full_name": "kukudechen-chen\/cve-2020-1938", - "owner": { - "login": "kukudechen-chen", - "id": 70738932, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70738932?v=4", - "html_url": "https:\/\/github.com\/kukudechen-chen" - }, - "html_url": "https:\/\/github.com\/kukudechen-chen\/cve-2020-1938", - "description": null, - "fork": false, - "created_at": "2020-11-14T13:55:58Z", - "updated_at": "2020-11-14T13:56:03Z", - "pushed_at": "2020-11-14T13:56:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 334802810, "name": "CVE-2020-1938-MSF-MODULE", diff --git a/2020/CVE-2020-1971.json b/2020/CVE-2020-1971.json deleted file mode 100644 index 67d5d9b623..0000000000 --- a/2020/CVE-2020-1971.json +++ /dev/null @@ -1,38 +0,0 @@ -[ - { - "id": 320084650, - "name": "CVE-2020-1971", - "full_name": "MBHudson\/CVE-2020-1971", - "owner": { - "login": "MBHudson", - "id": 59308634, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59308634?v=4", - "html_url": "https:\/\/github.com\/MBHudson" - }, - "html_url": "https:\/\/github.com\/MBHudson\/CVE-2020-1971", - "description": "CVE-2020-1971 Auto Scan & Remote Exploit Script. Auto Local Scan & Patch Script.", - "fork": false, - "created_at": "2020-12-09T21:32:15Z", - "updated_at": "2022-11-01T14:38:15Z", - "pushed_at": "2020-12-10T02:27:02Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2020-1971", - "exploit", - "fix", - "hack", - "opensll", - "patch" - ], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-19716.json b/2020/CVE-2020-19716.json new file mode 100644 index 0000000000..1fb34f0580 --- /dev/null +++ b/2020/CVE-2020-19716.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653546, + "name": "CVE-2020-19716", + "full_name": "Live-Hack-CVE\/CVE-2020-19716", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-19716", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-19716 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:59Z", + "updated_at": "2022-12-23T21:04:59Z", + "pushed_at": "2022-12-23T21:05:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-20213.json b/2020/CVE-2020-20213.json new file mode 100644 index 0000000000..88c0642224 --- /dev/null +++ b/2020/CVE-2020-20213.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676989, + "name": "CVE-2020-20213", + "full_name": "Live-Hack-CVE\/CVE-2020-20213", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-20213", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-20213 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:08Z", + "updated_at": "2022-12-23T23:17:08Z", + "pushed_at": "2022-12-23T23:17:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-20217.json b/2020/CVE-2020-20217.json new file mode 100644 index 0000000000..f85279ef37 --- /dev/null +++ b/2020/CVE-2020-20217.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676996, + "name": "CVE-2020-20217", + "full_name": "Live-Hack-CVE\/CVE-2020-20217", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-20217", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-20217 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:12Z", + "updated_at": "2022-12-23T23:17:12Z", + "pushed_at": "2022-12-23T23:17:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-20248.json b/2020/CVE-2020-20248.json new file mode 100644 index 0000000000..57b22d1032 --- /dev/null +++ b/2020/CVE-2020-20248.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677000, + "name": "CVE-2020-20248", + "full_name": "Live-Hack-CVE\/CVE-2020-20248", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-20248", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-20248 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:15Z", + "updated_at": "2022-12-23T23:17:15Z", + "pushed_at": "2022-12-23T23:17:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-2026.json b/2020/CVE-2020-2026.json new file mode 100644 index 0000000000..5dfe2405ef --- /dev/null +++ b/2020/CVE-2020-2026.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636956, + "name": "CVE-2020-2026", + "full_name": "Live-Hack-CVE\/CVE-2020-2026", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-2026", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-2026 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:38Z", + "updated_at": "2022-12-23T19:45:38Z", + "pushed_at": "2022-12-23T19:45:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-2091.json b/2020/CVE-2020-2091.json new file mode 100644 index 0000000000..316697787c --- /dev/null +++ b/2020/CVE-2020-2091.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675641, + "name": "CVE-2020-2091", + "full_name": "Live-Hack-CVE\/CVE-2020-2091", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-2091", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-2091 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:27Z", + "updated_at": "2022-12-23T23:08:27Z", + "pushed_at": "2022-12-23T23:08:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-21365.json b/2020/CVE-2020-21365.json new file mode 100644 index 0000000000..e745525ac7 --- /dev/null +++ b/2020/CVE-2020-21365.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676553, + "name": "CVE-2020-21365", + "full_name": "Live-Hack-CVE\/CVE-2020-21365", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-21365", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-21365 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:18Z", + "updated_at": "2022-12-23T23:14:18Z", + "pushed_at": "2022-12-23T23:14:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-21675.json b/2020/CVE-2020-21675.json new file mode 100644 index 0000000000..aaa299b6f9 --- /dev/null +++ b/2020/CVE-2020-21675.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663145, + "name": "CVE-2020-21675", + "full_name": "Live-Hack-CVE\/CVE-2020-21675", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-21675", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-21675 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:04Z", + "updated_at": "2022-12-23T21:55:04Z", + "pushed_at": "2022-12-23T21:55:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-23036.json b/2020/CVE-2020-23036.json new file mode 100644 index 0000000000..4e1ab501b0 --- /dev/null +++ b/2020/CVE-2020-23036.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681820, + "name": "CVE-2020-23036", + "full_name": "Live-Hack-CVE\/CVE-2020-23036", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-23036", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-23036 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:57Z", + "updated_at": "2022-12-23T23:49:57Z", + "pushed_at": "2022-12-23T23:49:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-23050.json b/2020/CVE-2020-23050.json new file mode 100644 index 0000000000..eefd0f505e --- /dev/null +++ b/2020/CVE-2020-23050.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681776, + "name": "CVE-2020-23050", + "full_name": "Live-Hack-CVE\/CVE-2020-23050", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-23050", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-23050 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:35Z", + "updated_at": "2022-12-23T23:49:35Z", + "pushed_at": "2022-12-23T23:49:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-23533.json b/2020/CVE-2020-23533.json new file mode 100644 index 0000000000..53711d618e --- /dev/null +++ b/2020/CVE-2020-23533.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681827, + "name": "CVE-2020-23533", + "full_name": "Live-Hack-CVE\/CVE-2020-23533", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-23533", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-23533 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:00Z", + "updated_at": "2022-12-23T23:50:00Z", + "pushed_at": "2022-12-23T23:50:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24223.json b/2020/CVE-2020-24223.json new file mode 100644 index 0000000000..6e16d62ce3 --- /dev/null +++ b/2020/CVE-2020-24223.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670564, + "name": "CVE-2020-24223", + "full_name": "Live-Hack-CVE\/CVE-2020-24223", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24223", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24223 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:15Z", + "updated_at": "2022-12-23T22:37:15Z", + "pushed_at": "2022-12-23T22:37:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24227.json b/2020/CVE-2020-24227.json deleted file mode 100644 index 249a5539f0..0000000000 --- a/2020/CVE-2020-24227.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 314812045, - "name": "CVE-2020-24227", - "full_name": "nathunandwani\/CVE-2020-24227", - "owner": { - "login": "nathunandwani", - "id": 11877783, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11877783?v=4", - "html_url": "https:\/\/github.com\/nathunandwani" - }, - "html_url": "https:\/\/github.com\/nathunandwani\/CVE-2020-24227", - "description": "Playground Sessions - Storing User Credentials in Plaintext", - "fork": false, - "created_at": "2020-11-21T12:55:42Z", - "updated_at": "2021-11-16T03:17:17Z", - "pushed_at": "2020-11-21T13:18:01Z", - "stargazers_count": 9, - "watchers_count": 9, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 9, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-24373.json b/2020/CVE-2020-24373.json new file mode 100644 index 0000000000..309287c1d7 --- /dev/null +++ b/2020/CVE-2020-24373.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636323, + "name": "CVE-2020-24373", + "full_name": "Live-Hack-CVE\/CVE-2020-24373", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24373", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24373 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:10Z", + "updated_at": "2022-12-23T19:43:10Z", + "pushed_at": "2022-12-23T19:43:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24374.json b/2020/CVE-2020-24374.json new file mode 100644 index 0000000000..00551a9b4f --- /dev/null +++ b/2020/CVE-2020-24374.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636470, + "name": "CVE-2020-24374", + "full_name": "Live-Hack-CVE\/CVE-2020-24374", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24374", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24374 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:44Z", + "updated_at": "2022-12-23T19:43:44Z", + "pushed_at": "2022-12-23T19:43:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24377.json b/2020/CVE-2020-24377.json new file mode 100644 index 0000000000..fdae98934c --- /dev/null +++ b/2020/CVE-2020-24377.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636385, + "name": "CVE-2020-24377", + "full_name": "Live-Hack-CVE\/CVE-2020-24377", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24377", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24377 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:24Z", + "updated_at": "2022-12-23T19:43:24Z", + "pushed_at": "2022-12-23T19:43:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24771.json b/2020/CVE-2020-24771.json new file mode 100644 index 0000000000..764e6df39f --- /dev/null +++ b/2020/CVE-2020-24771.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677037, + "name": "CVE-2020-24771", + "full_name": "Live-Hack-CVE\/CVE-2020-24771", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24771", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24771 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:28Z", + "updated_at": "2022-12-23T23:17:28Z", + "pushed_at": "2022-12-23T23:17:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24972.json b/2020/CVE-2020-24972.json new file mode 100644 index 0000000000..c9a7ec095f --- /dev/null +++ b/2020/CVE-2020-24972.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636017, + "name": "CVE-2020-24972", + "full_name": "Live-Hack-CVE\/CVE-2020-24972", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24972", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24972 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:59Z", + "updated_at": "2022-12-23T19:41:59Z", + "pushed_at": "2022-12-23T19:42:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-24987.json b/2020/CVE-2020-24987.json new file mode 100644 index 0000000000..c300ee1695 --- /dev/null +++ b/2020/CVE-2020-24987.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677015, + "name": "CVE-2020-24987", + "full_name": "Live-Hack-CVE\/CVE-2020-24987", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-24987", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-24987 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:22Z", + "updated_at": "2022-12-23T23:17:22Z", + "pushed_at": "2022-12-23T23:17:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25015.json b/2020/CVE-2020-25015.json new file mode 100644 index 0000000000..63a7ed77aa --- /dev/null +++ b/2020/CVE-2020-25015.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636294, + "name": "CVE-2020-25015", + "full_name": "Live-Hack-CVE\/CVE-2020-25015", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25015", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25015 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:04Z", + "updated_at": "2022-12-23T19:43:04Z", + "pushed_at": "2022-12-23T19:43:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25211.json b/2020/CVE-2020-25211.json new file mode 100644 index 0000000000..e6d14a92ac --- /dev/null +++ b/2020/CVE-2020-25211.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636153, + "name": "CVE-2020-25211", + "full_name": "Live-Hack-CVE\/CVE-2020-25211", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25211", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25211 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:32Z", + "updated_at": "2022-12-23T19:42:32Z", + "pushed_at": "2022-12-23T19:42:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25213.json b/2020/CVE-2020-25213.json index b5519b5d98..a9105c0ad0 100644 --- a/2020/CVE-2020-25213.json +++ b/2020/CVE-2020-25213.json @@ -1,33 +1,4 @@ [ - { - "id": 312602621, - "name": "WPKiller", - "full_name": "kakamband\/WPKiller", - "owner": { - "login": "kakamband", - "id": 70383870, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70383870?v=4", - "html_url": "https:\/\/github.com\/kakamband" - }, - "html_url": "https:\/\/github.com\/kakamband\/WPKiller", - "description": "CVE-2020-25213 Wordpress File Manager 6.7 Plugin 0day exploit", - "fork": false, - "created_at": "2020-11-13T14:47:27Z", - "updated_at": "2022-11-04T22:30:24Z", - "pushed_at": "2020-11-13T14:46:18Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 2, - "score": 0 - }, { "id": 335841666, "name": "CVE-2020-25213-Wordpress", diff --git a/2020/CVE-2020-25265.json b/2020/CVE-2020-25265.json deleted file mode 100644 index 5e241b9d49..0000000000 --- a/2020/CVE-2020-25265.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 296434593, - "name": "CVE-2020-25265-25266", - "full_name": "refi64\/CVE-2020-25265-25266", - "owner": { - "login": "refi64", - "id": 1690697, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1690697?v=4", - "html_url": "https:\/\/github.com\/refi64" - }, - "html_url": "https:\/\/github.com\/refi64\/CVE-2020-25265-25266", - "description": null, - "fork": false, - "created_at": "2020-09-17T20:25:02Z", - "updated_at": "2020-12-08T02:57:29Z", - "pushed_at": "2020-12-08T02:57:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-25637.json b/2020/CVE-2020-25637.json index 79a5e156d6..ca22530498 100644 --- a/2020/CVE-2020-25637.json +++ b/2020/CVE-2020-25637.json @@ -1,20 +1,20 @@ [ { - "id": 318489452, - "name": "CVE-2020-25637-libvirt-double-free", - "full_name": "brahmiboudjema\/CVE-2020-25637-libvirt-double-free", + "id": 581676607, + "name": "CVE-2020-25637", + "full_name": "Live-Hack-CVE\/CVE-2020-25637", "owner": { - "login": "brahmiboudjema", - "id": 47785164, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47785164?v=4", - "html_url": "https:\/\/github.com\/brahmiboudjema" + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" }, - "html_url": "https:\/\/github.com\/brahmiboudjema\/CVE-2020-25637-libvirt-double-free", - "description": "Double Free", + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25637", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25637 Made by Sn0wAlice. ❤️", "fork": false, - "created_at": "2020-12-04T11:01:29Z", - "updated_at": "2020-12-11T17:27:10Z", - "pushed_at": "2020-12-11T17:27:08Z", + "created_at": "2022-12-23T23:14:35Z", + "updated_at": "2022-12-23T23:14:35Z", + "pushed_at": "2022-12-23T23:14:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-25644.json b/2020/CVE-2020-25644.json new file mode 100644 index 0000000000..fae91b2cf0 --- /dev/null +++ b/2020/CVE-2020-25644.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676028, + "name": "CVE-2020-25644", + "full_name": "Live-Hack-CVE\/CVE-2020-25644", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25644", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25644 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:48Z", + "updated_at": "2022-12-23T23:10:48Z", + "pushed_at": "2022-12-23T23:10:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25662.json b/2020/CVE-2020-25662.json new file mode 100644 index 0000000000..8e27e4a890 --- /dev/null +++ b/2020/CVE-2020-25662.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628974, + "name": "CVE-2020-25662", + "full_name": "Live-Hack-CVE\/CVE-2020-25662", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25662", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25662 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:42Z", + "updated_at": "2022-12-23T19:09:42Z", + "pushed_at": "2022-12-23T19:09:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25689.json b/2020/CVE-2020-25689.json new file mode 100644 index 0000000000..27c80d79b5 --- /dev/null +++ b/2020/CVE-2020-25689.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676018, + "name": "CVE-2020-25689", + "full_name": "Live-Hack-CVE\/CVE-2020-25689", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25689", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25689 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:45Z", + "updated_at": "2022-12-23T23:10:45Z", + "pushed_at": "2022-12-23T23:10:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25699.json b/2020/CVE-2020-25699.json new file mode 100644 index 0000000000..070e6c83c1 --- /dev/null +++ b/2020/CVE-2020-25699.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676011, + "name": "CVE-2020-25699", + "full_name": "Live-Hack-CVE\/CVE-2020-25699", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25699", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25699 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:42Z", + "updated_at": "2022-12-23T23:10:42Z", + "pushed_at": "2022-12-23T23:10:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25705.json b/2020/CVE-2020-25705.json index 1ee97a0452..9890982237 100644 --- a/2020/CVE-2020-25705.json +++ b/2020/CVE-2020-25705.json @@ -1,33 +1,4 @@ [ - { - "id": 312779884, - "name": "CVE-2020-25705", - "full_name": "tdwyer\/CVE-2020-25705", - "owner": { - "login": "tdwyer", - "id": 3000070, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3000070?v=4", - "html_url": "https:\/\/github.com\/tdwyer" - }, - "html_url": "https:\/\/github.com\/tdwyer\/CVE-2020-25705", - "description": "PoC for CVE-2020-25705 POC-2020-25705", - "fork": false, - "created_at": "2020-11-14T08:53:13Z", - "updated_at": "2022-07-22T18:50:48Z", - "pushed_at": "2020-11-14T08:55:26Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 5, - "score": 0 - }, { "id": 475802420, "name": "linux-4.19.72_CVE-2020-25705", diff --git a/2020/CVE-2020-25711.json b/2020/CVE-2020-25711.json new file mode 100644 index 0000000000..b3fc259b43 --- /dev/null +++ b/2020/CVE-2020-25711.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654977, + "name": "CVE-2020-25711", + "full_name": "Live-Hack-CVE\/CVE-2020-25711", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25711", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25711 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:53Z", + "updated_at": "2022-12-23T21:11:53Z", + "pushed_at": "2022-12-23T21:11:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25718.json b/2020/CVE-2020-25718.json new file mode 100644 index 0000000000..c8882ae851 --- /dev/null +++ b/2020/CVE-2020-25718.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676450, + "name": "CVE-2020-25718", + "full_name": "Live-Hack-CVE\/CVE-2020-25718", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25718", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25718 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:35Z", + "updated_at": "2022-12-23T23:13:35Z", + "pushed_at": "2022-12-23T23:13:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-25769.json b/2020/CVE-2020-25769.json deleted file mode 100644 index feb3b2afb1..0000000000 --- a/2020/CVE-2020-25769.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 312644639, - "name": "CVE-2020-25769", - "full_name": "lagartojuancho\/CVE-2020-25769", - "owner": { - "login": "lagartojuancho", - "id": 59481050, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59481050?v=4", - "html_url": "https:\/\/github.com\/lagartojuancho" - }, - "html_url": "https:\/\/github.com\/lagartojuancho\/CVE-2020-25769", - "description": "GOG Galaxy Local Privilege Escalation", - "fork": false, - "created_at": "2020-11-13T17:42:40Z", - "updated_at": "2020-11-13T18:51:41Z", - "pushed_at": "2020-11-13T18:51:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-25790.json b/2020/CVE-2020-25790.json index 4733f86a52..f57556659e 100644 --- a/2020/CVE-2020-25790.json +++ b/2020/CVE-2020-25790.json @@ -27,5 +27,34 @@ "forks": 0, "watchers": 4, "score": 0 + }, + { + "id": 581636031, + "name": "CVE-2020-25790", + "full_name": "Live-Hack-CVE\/CVE-2020-25790", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-25790", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-25790 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:02Z", + "updated_at": "2022-12-23T19:42:02Z", + "pushed_at": "2022-12-23T19:42:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-26117.json b/2020/CVE-2020-26117.json new file mode 100644 index 0000000000..c97719483e --- /dev/null +++ b/2020/CVE-2020-26117.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636308, + "name": "CVE-2020-26117", + "full_name": "Live-Hack-CVE\/CVE-2020-26117", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-26117", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-26117 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:07Z", + "updated_at": "2022-12-23T19:43:07Z", + "pushed_at": "2022-12-23T19:43:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-26217.json b/2020/CVE-2020-26217.json index c3c191bf4a..727557c9dc 100644 --- a/2020/CVE-2020-26217.json +++ b/2020/CVE-2020-26217.json @@ -1,33 +1,4 @@ [ - { - "id": 319567021, - "name": "CVE-2020-26217-XStream-RCE-POC", - "full_name": "novysodope\/CVE-2020-26217-XStream-RCE-POC", - "owner": { - "login": "novysodope", - "id": 45167857, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45167857?v=4", - "html_url": "https:\/\/github.com\/novysodope" - }, - "html_url": "https:\/\/github.com\/novysodope\/CVE-2020-26217-XStream-RCE-POC", - "description": "CVE-2020-26217 XStream RCE POC", - "fork": false, - "created_at": "2020-12-08T07:58:41Z", - "updated_at": "2022-06-08T03:10:21Z", - "pushed_at": "2020-12-08T08:02:40Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0 - }, { "id": 331904602, "name": "CVE-2020-26217", diff --git a/2020/CVE-2020-26259.json b/2020/CVE-2020-26259.json index 3fa5bc1a77..240f9c9c2b 100644 --- a/2020/CVE-2020-26259.json +++ b/2020/CVE-2020-26259.json @@ -1,33 +1,4 @@ [ - { - "id": 321122801, - "name": "CVE-2020-26259", - "full_name": "jas502n\/CVE-2020-26259", - "owner": { - "login": "jas502n", - "id": 16593068, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", - "html_url": "https:\/\/github.com\/jas502n" - }, - "html_url": "https:\/\/github.com\/jas502n\/CVE-2020-26259", - "description": "CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.", - "fork": false, - "created_at": "2020-12-13T17:39:11Z", - "updated_at": "2022-01-03T08:14:12Z", - "pushed_at": "2020-12-13T19:12:34Z", - "stargazers_count": 27, - "watchers_count": 27, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 27, - "score": 0 - }, { "id": 331896682, "name": "CVE-2020-26259", diff --git a/2020/CVE-2020-26558.json b/2020/CVE-2020-26558.json new file mode 100644 index 0000000000..2c4f1f0e76 --- /dev/null +++ b/2020/CVE-2020-26558.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628947, + "name": "CVE-2020-26558", + "full_name": "Live-Hack-CVE\/CVE-2020-26558", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-26558", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-26558 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:35Z", + "updated_at": "2022-12-23T19:09:35Z", + "pushed_at": "2022-12-23T19:09:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-26880.json b/2020/CVE-2020-26880.json new file mode 100644 index 0000000000..ad1c2dd8aa --- /dev/null +++ b/2020/CVE-2020-26880.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636228, + "name": "CVE-2020-26880", + "full_name": "Live-Hack-CVE\/CVE-2020-26880", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-26880", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-26880 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:48Z", + "updated_at": "2022-12-23T19:42:48Z", + "pushed_at": "2022-12-23T19:42:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-26932.json b/2020/CVE-2020-26932.json new file mode 100644 index 0000000000..a9fea2738b --- /dev/null +++ b/2020/CVE-2020-26932.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670218, + "name": "CVE-2020-26932", + "full_name": "Live-Hack-CVE\/CVE-2020-26932", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-26932", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-26932 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:16Z", + "updated_at": "2022-12-23T22:35:16Z", + "pushed_at": "2022-12-23T22:35:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-27190.json b/2020/CVE-2020-27190.json deleted file mode 100644 index 6bbb050da1..0000000000 --- a/2020/CVE-2020-27190.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 321257850, - "name": "x-CVE-2020-27190", - "full_name": "qlh831\/x-CVE-2020-27190", - "owner": { - "login": "qlh831", - "id": 73090087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73090087?v=4", - "html_url": "https:\/\/github.com\/qlh831" - }, - "html_url": "https:\/\/github.com\/qlh831\/x-CVE-2020-27190", - "description": null, - "fork": false, - "created_at": "2020-12-14T06:44:37Z", - "updated_at": "2020-12-14T06:44:57Z", - "pushed_at": "2020-12-14T06:44:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-27652.json b/2020/CVE-2020-27652.json new file mode 100644 index 0000000000..7b7688de63 --- /dev/null +++ b/2020/CVE-2020-27652.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635892, + "name": "CVE-2020-27652", + "full_name": "Live-Hack-CVE\/CVE-2020-27652", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-27652", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-27652 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:25Z", + "updated_at": "2022-12-23T19:41:25Z", + "pushed_at": "2022-12-23T19:41:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-27653.json b/2020/CVE-2020-27653.json new file mode 100644 index 0000000000..a468d0f829 --- /dev/null +++ b/2020/CVE-2020-27653.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629163, + "name": "CVE-2020-27653", + "full_name": "Live-Hack-CVE\/CVE-2020-27653", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-27653", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-27653 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:31Z", + "updated_at": "2022-12-23T19:10:31Z", + "pushed_at": "2022-12-23T19:10:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-27654.json b/2020/CVE-2020-27654.json new file mode 100644 index 0000000000..92952c0ee4 --- /dev/null +++ b/2020/CVE-2020-27654.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629150, + "name": "CVE-2020-27654", + "full_name": "Live-Hack-CVE\/CVE-2020-27654", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-27654", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-27654 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:27Z", + "updated_at": "2022-12-23T19:10:27Z", + "pushed_at": "2022-12-23T19:10:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-27655.json b/2020/CVE-2020-27655.json new file mode 100644 index 0000000000..9e0a40b50f --- /dev/null +++ b/2020/CVE-2020-27655.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635907, + "name": "CVE-2020-27655", + "full_name": "Live-Hack-CVE\/CVE-2020-27655", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-27655", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-27655 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:29Z", + "updated_at": "2022-12-23T19:41:29Z", + "pushed_at": "2022-12-23T19:41:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-27751.json b/2020/CVE-2020-27751.json new file mode 100644 index 0000000000..6ec41f2aa3 --- /dev/null +++ b/2020/CVE-2020-27751.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628964, + "name": "CVE-2020-27751", + "full_name": "Live-Hack-CVE\/CVE-2020-27751", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-27751", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-27751 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:38Z", + "updated_at": "2022-12-23T19:09:38Z", + "pushed_at": "2022-12-23T19:09:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-27935.json b/2020/CVE-2020-27935.json deleted file mode 100644 index fcc11075ef..0000000000 --- a/2020/CVE-2020-27935.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 322620609, - "name": "SnatchBox", - "full_name": "LIJI32\/SnatchBox", - "owner": { - "login": "LIJI32", - "id": 2345928, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2345928?v=4", - "html_url": "https:\/\/github.com\/LIJI32" - }, - "html_url": "https:\/\/github.com\/LIJI32\/SnatchBox", - "description": "SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x", - "fork": false, - "created_at": "2020-12-18T14:39:28Z", - "updated_at": "2022-11-09T18:10:30Z", - "pushed_at": "2020-12-18T14:41:09Z", - "stargazers_count": 29, - "watchers_count": 29, - "has_discussions": false, - "forks_count": 5, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 5, - "watchers": 29, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-27949.json b/2020/CVE-2020-27949.json deleted file mode 100644 index 7a86bfe7b7..0000000000 --- a/2020/CVE-2020-27949.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 321454015, - "name": "dtrace-memaccess_cve-2020-27949", - "full_name": "seemoo-lab\/dtrace-memaccess_cve-2020-27949", - "owner": { - "login": "seemoo-lab", - "id": 7370084, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7370084?v=4", - "html_url": "https:\/\/github.com\/seemoo-lab" - }, - "html_url": "https:\/\/github.com\/seemoo-lab\/dtrace-memaccess_cve-2020-27949", - "description": null, - "fork": false, - "created_at": "2020-12-14T19:39:42Z", - "updated_at": "2022-01-03T07:13:02Z", - "pushed_at": "2020-12-20T17:29:07Z", - "stargazers_count": 33, - "watchers_count": 33, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 10, - "watchers": 33, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-27950.json b/2020/CVE-2020-27950.json deleted file mode 100644 index d067726900..0000000000 --- a/2020/CVE-2020-27950.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 317590228, - "name": "CVE-2020-27950", - "full_name": "synacktiv\/CVE-2020-27950", - "owner": { - "login": "synacktiv", - "id": 50145679, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4", - "html_url": "https:\/\/github.com\/synacktiv" - }, - "html_url": "https:\/\/github.com\/synacktiv\/CVE-2020-27950", - "description": "CVE-2020-27950 exploit", - "fork": false, - "created_at": "2020-12-01T15:49:07Z", - "updated_at": "2022-11-09T18:10:19Z", - "pushed_at": "2020-12-01T15:50:45Z", - "stargazers_count": 30, - "watchers_count": 30, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 30, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-27955.json b/2020/CVE-2020-27955.json index a20f5f1d94..ab9c225b93 100644 --- a/2020/CVE-2020-27955.json +++ b/2020/CVE-2020-27955.json @@ -28,122 +28,6 @@ "watchers": 29, "score": 0 }, - { - "id": 314947753, - "name": "cve-2020-27955-poc", - "full_name": "yhsung\/cve-2020-27955-poc", - "owner": { - "login": "yhsung", - "id": 1084269, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1084269?v=4", - "html_url": "https:\/\/github.com\/yhsung" - }, - "html_url": "https:\/\/github.com\/yhsung\/cve-2020-27955-poc", - "description": null, - "fork": false, - "created_at": "2020-11-22T02:59:46Z", - "updated_at": "2020-11-22T03:04:29Z", - "pushed_at": "2020-11-22T03:04:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 315498736, - "name": "CVE-2020-27955", - "full_name": "r00t4dm\/CVE-2020-27955", - "owner": { - "login": "r00t4dm", - "id": 36941976, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36941976?v=4", - "html_url": "https:\/\/github.com\/r00t4dm" - }, - "html_url": "https:\/\/github.com\/r00t4dm\/CVE-2020-27955", - "description": null, - "fork": false, - "created_at": "2020-11-24T02:40:04Z", - "updated_at": "2022-11-09T18:10:14Z", - "pushed_at": "2020-11-24T02:59:34Z", - "stargazers_count": 17, - "watchers_count": 17, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 17, - "score": 0 - }, - { - "id": 320394850, - "name": "git-lfs-RCE-exploit-CVE-2020-27955-revshell", - "full_name": "williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell", - "owner": { - "login": "williamgoulois", - "id": 37271970, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37271970?v=4", - "html_url": "https:\/\/github.com\/williamgoulois" - }, - "html_url": "https:\/\/github.com\/williamgoulois\/git-lfs-RCE-exploit-CVE-2020-27955-revshell", - "description": null, - "fork": false, - "created_at": "2020-12-10T21:31:24Z", - "updated_at": "2021-02-11T07:12:46Z", - "pushed_at": "2020-12-10T22:03:01Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 322199299, - "name": "CVE-2020-27955", - "full_name": "shubham0d\/CVE-2020-27955", - "owner": { - "login": "shubham0d", - "id": 12750163, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4", - "html_url": "https:\/\/github.com\/shubham0d" - }, - "html_url": "https:\/\/github.com\/shubham0d\/CVE-2020-27955", - "description": "POC for CVE-2020-27955", - "fork": false, - "created_at": "2020-12-17T06:14:30Z", - "updated_at": "2020-12-17T06:14:30Z", - "pushed_at": "2020-12-17T06:14:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 325019967, "name": "cve-2020-27955", diff --git a/2020/CVE-2020-28052.json b/2020/CVE-2020-28052.json index 53a7e3daab..9322a66e27 100644 --- a/2020/CVE-2020-28052.json +++ b/2020/CVE-2020-28052.json @@ -1,33 +1,4 @@ [ - { - "id": 322948567, - "name": "bouncy-castle-generative-test-poc", - "full_name": "madstap\/bouncy-castle-generative-test-poc", - "owner": { - "login": "madstap", - "id": 7657597, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7657597?v=4", - "html_url": "https:\/\/github.com\/madstap" - }, - "html_url": "https:\/\/github.com\/madstap\/bouncy-castle-generative-test-poc", - "description": "A generative test that would've caught CVE-2020-28052", - "fork": false, - "created_at": "2020-12-19T22:22:45Z", - "updated_at": "2020-12-19T22:30:59Z", - "pushed_at": "2020-12-19T22:30:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 326754867, "name": "CVE-2020-28052_PoC", diff --git a/2020/CVE-2020-28054.json b/2020/CVE-2020-28054.json deleted file mode 100644 index 6efd2498d0..0000000000 --- a/2020/CVE-2020-28054.json +++ /dev/null @@ -1,39 +0,0 @@ -[ - { - "id": 313250504, - "name": "Tivoli-Madness", - "full_name": "VoidSec\/Tivoli-Madness", - "owner": { - "login": "VoidSec", - "id": 5717603, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4", - "html_url": "https:\/\/github.com\/VoidSec" - }, - "html_url": "https:\/\/github.com\/VoidSec\/Tivoli-Madness", - "description": "Advisory for CVE-2020-28054 & stack based buffer overflow in IBM Tivoli Storage Manager", - "fork": false, - "created_at": "2020-11-16T09:27:33Z", - "updated_at": "2022-11-09T18:10:07Z", - "pushed_at": "2020-11-18T12:55:55Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "authorization-bypass", - "buffer-overflow", - "exploit", - "ibm", - "jamodat", - "tivoli", - "voidsec" - ], - "visibility": "public", - "forks": 1, - "watchers": 7, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-28328.json b/2020/CVE-2020-28328.json deleted file mode 100644 index 242daa5795..0000000000 --- a/2020/CVE-2020-28328.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 310454719, - "name": "SuiteCRM-RCE", - "full_name": "mcorybillington\/SuiteCRM-RCE", - "owner": { - "login": "mcorybillington", - "id": 24510213, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24510213?v=4", - "html_url": "https:\/\/github.com\/mcorybillington" - }, - "html_url": "https:\/\/github.com\/mcorybillington\/SuiteCRM-RCE", - "description": "Writeup on CVE-2020-28328: SuiteCRM Log File Remote Code Execution plus some bonus Cross-Site Scripting", - "fork": false, - "created_at": "2020-11-06T00:56:36Z", - "updated_at": "2022-11-09T18:10:01Z", - "pushed_at": "2020-11-23T17:27:07Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-28647.json b/2020/CVE-2020-28647.json deleted file mode 100644 index 8be3b98835..0000000000 --- a/2020/CVE-2020-28647.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 322287030, - "name": "Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647", - "full_name": "SECFORCE\/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647", - "owner": { - "login": "SECFORCE", - "id": 8157384, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8157384?v=4", - "html_url": "https:\/\/github.com\/SECFORCE" - }, - "html_url": "https:\/\/github.com\/SECFORCE\/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647", - "description": "MOVEit Transfer 2020 web application Stored Cross-Site Scripting (XSS)", - "fork": false, - "created_at": "2020-12-17T12:23:18Z", - "updated_at": "2020-12-17T12:33:47Z", - "pushed_at": "2020-12-17T12:31:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 7c65d0a093..c21bee4dd2 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -91,38 +91,6 @@ "watchers": 0, "score": 0 }, - { - "id": 316249865, - "name": "CVE-2020-2883", - "full_name": "Al1ex\/CVE-2020-2883", - "owner": { - "login": "Al1ex", - "id": 38161463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", - "html_url": "https:\/\/github.com\/Al1ex" - }, - "html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-2883", - "description": "CVE-2020-2883", - "fork": false, - "created_at": "2020-11-26T14:10:25Z", - "updated_at": "2022-11-18T06:09:37Z", - "pushed_at": "2020-11-27T02:12:52Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2020-2883", - "weblogic" - ], - "visibility": "public", - "forks": 1, - "watchers": 6, - "score": 0 - }, { "id": 428189487, "name": "POC_CVE-2020-2883", diff --git a/2020/CVE-2020-28948.json b/2020/CVE-2020-28948.json index 00e9cd9a5b..bedb2beb6f 100644 --- a/2020/CVE-2020-28948.json +++ b/2020/CVE-2020-28948.json @@ -1,33 +1,4 @@ [ - { - "id": 316481683, - "name": "CVE-2020-28948-and-CVE-2020-28949", - "full_name": "0x240x23elu\/CVE-2020-28948-and-CVE-2020-28949", - "owner": { - "login": "0x240x23elu", - "id": 52744492, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52744492?v=4", - "html_url": "https:\/\/github.com\/0x240x23elu" - }, - "html_url": "https:\/\/github.com\/0x240x23elu\/CVE-2020-28948-and-CVE-2020-28949", - "description": null, - "fork": false, - "created_at": "2020-11-27T11:21:46Z", - "updated_at": "2022-11-13T20:05:10Z", - "pushed_at": "2020-11-27T11:26:01Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 6, - "score": 0 - }, { "id": 370402145, "name": "cve-2020-28948", diff --git a/2020/CVE-2020-29007.json b/2020/CVE-2020-29007.json deleted file mode 100644 index af17056d8e..0000000000 --- a/2020/CVE-2020-29007.json +++ /dev/null @@ -1,39 +0,0 @@ -[ - { - "id": 319646680, - "name": "cve-2020-29007", - "full_name": "seqred-s-a\/cve-2020-29007", - "owner": { - "login": "seqred-s-a", - "id": 49437606, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49437606?v=4", - "html_url": "https:\/\/github.com\/seqred-s-a" - }, - "html_url": "https:\/\/github.com\/seqred-s-a\/cve-2020-29007", - "description": "Remote code execution in Mediawiki Score", - "fork": false, - "created_at": "2020-12-08T13:27:31Z", - "updated_at": "2020-12-08T13:36:46Z", - "pushed_at": "2020-12-08T13:35:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2020-29007", - "exploit", - "lilypond", - "mediawiki", - "mediawiki-extension", - "security" - ], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-29070.json b/2020/CVE-2020-29070.json deleted file mode 100644 index ad645418ff..0000000000 --- a/2020/CVE-2020-29070.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 315874415, - "name": "cve-2020-29070", - "full_name": "aslanemre\/cve-2020-29070", - "owner": { - "login": "aslanemre", - "id": 52652572, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52652572?v=4", - "html_url": "https:\/\/github.com\/aslanemre" - }, - "html_url": "https:\/\/github.com\/aslanemre\/cve-2020-29070", - "description": "CVE-2020-29070 write-up.", - "fork": false, - "created_at": "2020-11-25T08:25:36Z", - "updated_at": "2020-12-05T13:03:30Z", - "pushed_at": "2020-11-25T17:43:14Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-29156.json b/2020/CVE-2020-29156.json deleted file mode 100644 index d278c92250..0000000000 --- a/2020/CVE-2020-29156.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 323442733, - "name": "CVE-2020-29156", - "full_name": "Ko-kn3t\/CVE-2020-29156", - "owner": { - "login": "Ko-kn3t", - "id": 57166441, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57166441?v=4", - "html_url": "https:\/\/github.com\/Ko-kn3t" - }, - "html_url": "https:\/\/github.com\/Ko-kn3t\/CVE-2020-29156", - "description": "woocommerce wordpress plugin - Affected Version: V 4.5.2 [CVE-2020-29156]", - "fork": false, - "created_at": "2020-12-21T20:38:50Z", - "updated_at": "2020-12-26T16:13:17Z", - "pushed_at": "2020-12-21T20:48:21Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-29364.json b/2020/CVE-2020-29364.json deleted file mode 100644 index 47aac62640..0000000000 --- a/2020/CVE-2020-29364.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 316557251, - "name": "CVE-2020-29364", - "full_name": "aslanemre\/CVE-2020-29364", - "owner": { - "login": "aslanemre", - "id": 52652572, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52652572?v=4", - "html_url": "https:\/\/github.com\/aslanemre" - }, - "html_url": "https:\/\/github.com\/aslanemre\/CVE-2020-29364", - "description": null, - "fork": false, - "created_at": "2020-11-27T17:01:35Z", - "updated_at": "2020-12-05T13:03:30Z", - "pushed_at": "2020-11-27T17:07:32Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-29666.json b/2020/CVE-2020-29666.json deleted file mode 100644 index 2db63ac7ca..0000000000 --- a/2020/CVE-2020-29666.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 320179942, - "name": "CVE-2020-29666", - "full_name": "jet-pentest\/CVE-2020-29666", - "owner": { - "login": "jet-pentest", - "id": 71512502, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", - "html_url": "https:\/\/github.com\/jet-pentest" - }, - "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-29666", - "description": null, - "fork": false, - "created_at": "2020-12-10T06:24:48Z", - "updated_at": "2021-02-14T09:24:16Z", - "pushed_at": "2020-12-10T06:39:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-29667.json b/2020/CVE-2020-29667.json deleted file mode 100644 index c1a57707fa..0000000000 --- a/2020/CVE-2020-29667.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 320183812, - "name": "CVE-2020-29667", - "full_name": "jet-pentest\/CVE-2020-29667", - "owner": { - "login": "jet-pentest", - "id": 71512502, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4", - "html_url": "https:\/\/github.com\/jet-pentest" - }, - "html_url": "https:\/\/github.com\/jet-pentest\/CVE-2020-29667", - "description": null, - "fork": false, - "created_at": "2020-12-10T06:43:58Z", - "updated_at": "2021-02-14T09:24:13Z", - "pushed_at": "2020-12-10T07:04:42Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-29669.json b/2020/CVE-2020-29669.json deleted file mode 100644 index ba67879398..0000000000 --- a/2020/CVE-2020-29669.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 318305323, - "name": "CVE-2020-29669", - "full_name": "code-byter\/CVE-2020-29669", - "owner": { - "login": "code-byter", - "id": 10854537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10854537?v=4", - "html_url": "https:\/\/github.com\/code-byter" - }, - "html_url": "https:\/\/github.com\/code-byter\/CVE-2020-29669", - "description": "Macally WIFISD2", - "fork": false, - "created_at": "2020-12-03T20:00:09Z", - "updated_at": "2021-03-28T12:19:39Z", - "pushed_at": "2020-12-12T13:00:37Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json index f44136e109..cbc9fc2d4e 100644 --- a/2020/CVE-2020-3452.json +++ b/2020/CVE-2020-3452.json @@ -28,64 +28,6 @@ "watchers": 1, "score": 0 }, - { - "id": 314063056, - "name": "CVE-2020-3452", - "full_name": "grim3\/CVE-2020-3452", - "owner": { - "login": "grim3", - "id": 24641185, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24641185?v=4", - "html_url": "https:\/\/github.com\/grim3" - }, - "html_url": "https:\/\/github.com\/grim3\/CVE-2020-3452", - "description": "CVE-2020-3452", - "fork": false, - "created_at": "2020-11-18T21:31:50Z", - "updated_at": "2022-12-06T13:37:52Z", - "pushed_at": "2020-11-18T21:45:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 1, - "score": 0 - }, - { - "id": 321075427, - "name": "CVE-2020-3452", - "full_name": "cygenta\/CVE-2020-3452", - "owner": { - "login": "cygenta", - "id": 49716463, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49716463?v=4", - "html_url": "https:\/\/github.com\/cygenta" - }, - "html_url": "https:\/\/github.com\/cygenta\/CVE-2020-3452", - "description": null, - "fork": false, - "created_at": "2020-12-13T13:47:38Z", - "updated_at": "2022-04-07T21:38:20Z", - "pushed_at": "2022-06-02T20:15:06Z", - "stargazers_count": 25, - "watchers_count": 25, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 25, - "score": 0 - }, { "id": 327027118, "name": "CISCO-CVE-2020-3452-Scanner-Exploiter", diff --git a/2020/CVE-2020-35473.json b/2020/CVE-2020-35473.json new file mode 100644 index 0000000000..35096ebf78 --- /dev/null +++ b/2020/CVE-2020-35473.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662222, + "name": "CVE-2020-35473", + "full_name": "Live-Hack-CVE\/CVE-2020-35473", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-35473", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-35473 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:57Z", + "updated_at": "2022-12-23T21:49:57Z", + "pushed_at": "2022-12-23T21:49:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-36457.json b/2020/CVE-2020-36457.json new file mode 100644 index 0000000000..d2bbb453d1 --- /dev/null +++ b/2020/CVE-2020-36457.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627512, + "name": "CVE-2020-36457", + "full_name": "Live-Hack-CVE\/CVE-2020-36457", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-36457", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-36457 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:37Z", + "updated_at": "2022-12-23T19:03:37Z", + "pushed_at": "2022-12-23T19:03:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-3992.json b/2020/CVE-2020-3992.json index 30f2ea20de..d93f1ab93a 100644 --- a/2020/CVE-2020-3992.json +++ b/2020/CVE-2020-3992.json @@ -1,39 +1,4 @@ [ - { - "id": 317555828, - "name": "CVE-2019-5544_CVE-2020-3992", - "full_name": "HynekPetrak\/CVE-2019-5544_CVE-2020-3992", - "owner": { - "login": "HynekPetrak", - "id": 8593983, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4", - "html_url": "https:\/\/github.com\/HynekPetrak" - }, - "html_url": "https:\/\/github.com\/HynekPetrak\/CVE-2019-5544_CVE-2020-3992", - "description": "Python \/ scapy module implementing SRVLOC\/SLP protocol and scans for enabled OpenSLP services.", - "fork": false, - "created_at": "2020-12-01T13:49:26Z", - "updated_at": "2022-12-08T03:06:49Z", - "pushed_at": "2020-12-07T00:12:21Z", - "stargazers_count": 32, - "watchers_count": 32, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2019-5544", - "cve-2020-3992", - "openslp", - "slp", - "srvloc" - ], - "visibility": "public", - "forks": 8, - "watchers": 32, - "score": 0 - }, { "id": 335992894, "name": "VMware_ESXI_OpenSLP_PoCs", diff --git a/2020/CVE-2020-4040.json b/2020/CVE-2020-4040.json deleted file mode 100644 index d3bf5883fb..0000000000 --- a/2020/CVE-2020-4040.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 312934644, - "name": "RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041", - "full_name": "jpvispo\/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041", - "owner": { - "login": "jpvispo", - "id": 11736106, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11736106?v=4", - "html_url": "https:\/\/github.com\/jpvispo" - }, - "html_url": "https:\/\/github.com\/jpvispo\/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041", - "description": null, - "fork": false, - "created_at": "2020-11-15T01:23:12Z", - "updated_at": "2020-11-15T01:33:08Z", - "pushed_at": "2020-11-15T01:33:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-6020.json b/2020/CVE-2020-6020.json new file mode 100644 index 0000000000..c4567f9a11 --- /dev/null +++ b/2020/CVE-2020-6020.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636484, + "name": "CVE-2020-6020", + "full_name": "Live-Hack-CVE\/CVE-2020-6020", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-6020", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-6020 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:48Z", + "updated_at": "2022-12-23T19:43:48Z", + "pushed_at": "2022-12-23T19:43:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-6308.json b/2020/CVE-2020-6308.json index f8c2282dcd..f7f3664999 100644 --- a/2020/CVE-2020-6308.json +++ b/2020/CVE-2020-6308.json @@ -28,35 +28,6 @@ "watchers": 32, "score": 0 }, - { - "id": 325441552, - "name": "CVE-2020-6308-mass-exploiter", - "full_name": "freeFV\/CVE-2020-6308-mass-exploiter", - "owner": { - "login": "freeFV", - "id": 32540878, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32540878?v=4", - "html_url": "https:\/\/github.com\/freeFV" - }, - "html_url": "https:\/\/github.com\/freeFV\/CVE-2020-6308-mass-exploiter", - "description": "CVE-2020-6308 mass exploiter\/fuzzer.", - "fork": false, - "created_at": "2020-12-30T03:08:17Z", - "updated_at": "2021-02-08T13:43:16Z", - "pushed_at": "2020-11-24T23:13:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 399392671, "name": "CVE-2020-6308", diff --git a/2020/CVE-2020-6624.json b/2020/CVE-2020-6624.json new file mode 100644 index 0000000000..e4fc75d255 --- /dev/null +++ b/2020/CVE-2020-6624.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670624, + "name": "CVE-2020-6624", + "full_name": "Live-Hack-CVE\/CVE-2020-6624", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-6624", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-6624 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:35Z", + "updated_at": "2022-12-23T22:37:35Z", + "pushed_at": "2022-12-23T22:37:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-6625.json b/2020/CVE-2020-6625.json new file mode 100644 index 0000000000..f6c9c0c2af --- /dev/null +++ b/2020/CVE-2020-6625.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675650, + "name": "CVE-2020-6625", + "full_name": "Live-Hack-CVE\/CVE-2020-6625", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-6625", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-6625 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:30Z", + "updated_at": "2022-12-23T23:08:30Z", + "pushed_at": "2022-12-23T23:08:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-7016.json b/2020/CVE-2020-7016.json new file mode 100644 index 0000000000..b33cfef22b --- /dev/null +++ b/2020/CVE-2020-7016.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636730, + "name": "CVE-2020-7016", + "full_name": "Live-Hack-CVE\/CVE-2020-7016", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-7016", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-7016 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:49Z", + "updated_at": "2022-12-23T19:44:49Z", + "pushed_at": "2022-12-23T19:44:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-7246.json b/2020/CVE-2020-7246.json index d7751381c7..932e20ab99 100644 --- a/2020/CVE-2020-7246.json +++ b/2020/CVE-2020-7246.json @@ -56,5 +56,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581655012, + "name": "CVE-2020-7246", + "full_name": "Live-Hack-CVE\/CVE-2020-7246", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-7246", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-7246 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:04Z", + "updated_at": "2022-12-23T21:12:04Z", + "pushed_at": "2022-12-23T21:12:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-7608.json b/2020/CVE-2020-7608.json new file mode 100644 index 0000000000..93694aa863 --- /dev/null +++ b/2020/CVE-2020-7608.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644914, + "name": "CVE-2020-7608", + "full_name": "Live-Hack-CVE\/CVE-2020-7608", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-7608", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-7608 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:13Z", + "updated_at": "2022-12-23T20:22:13Z", + "pushed_at": "2022-12-23T20:22:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-7729.json b/2020/CVE-2020-7729.json new file mode 100644 index 0000000000..da91761927 --- /dev/null +++ b/2020/CVE-2020-7729.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636420, + "name": "CVE-2020-7729", + "full_name": "Live-Hack-CVE\/CVE-2020-7729", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-7729", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-7729 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:30Z", + "updated_at": "2022-12-23T19:43:30Z", + "pushed_at": "2022-12-23T19:43:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-7961.json b/2020/CVE-2020-7961.json index 8506f1f605..92be931512 100644 --- a/2020/CVE-2020-7961.json +++ b/2020/CVE-2020-7961.json @@ -115,35 +115,6 @@ "watchers": 3, "score": 0 }, - { - "id": 319572948, - "name": "POC-CVE-2020-7961-Token-iterate", - "full_name": "shacojx\/POC-CVE-2020-7961-Token-iterate", - "owner": { - "login": "shacojx", - "id": 19655109, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19655109?v=4", - "html_url": "https:\/\/github.com\/shacojx" - }, - "html_url": "https:\/\/github.com\/shacojx\/POC-CVE-2020-7961-Token-iterate", - "description": "POC-CVE-2020-7961-Token-iterate", - "fork": false, - "created_at": "2020-12-08T08:22:18Z", - "updated_at": "2021-09-23T16:00:33Z", - "pushed_at": "2020-12-08T08:35:38Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0 - }, { "id": 326194141, "name": "CVE-2020-7961-Mass", diff --git a/2020/CVE-2020-8165.json b/2020/CVE-2020-8165.json index c72a1e1572..0b72b3c6cf 100644 --- a/2020/CVE-2020-8165.json +++ b/2020/CVE-2020-8165.json @@ -28,35 +28,6 @@ "watchers": 43, "score": 0 }, - { - "id": 312524156, - "name": "CVE-2020-8165--Auto-Shell", - "full_name": "umiterkol\/CVE-2020-8165--Auto-Shell", - "owner": { - "login": "umiterkol", - "id": 49879256, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49879256?v=4", - "html_url": "https:\/\/github.com\/umiterkol" - }, - "html_url": "https:\/\/github.com\/umiterkol\/CVE-2020-8165--Auto-Shell", - "description": null, - "fork": false, - "created_at": "2020-11-13T09:01:12Z", - "updated_at": "2021-02-13T15:57:53Z", - "pushed_at": "2020-11-13T09:50:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 324426068, "name": "CVE-2020-8165", diff --git a/2020/CVE-2020-8209.json b/2020/CVE-2020-8209.json deleted file mode 100644 index 94f650b14c..0000000000 --- a/2020/CVE-2020-8209.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 313538484, - "name": "CVE-2020-8209", - "full_name": "B1anda0\/CVE-2020-8209", - "owner": { - "login": "B1anda0", - "id": 74232513, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4", - "html_url": "https:\/\/github.com\/B1anda0" - }, - "html_url": "https:\/\/github.com\/B1anda0\/CVE-2020-8209", - "description": "该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。", - "fork": false, - "created_at": "2020-11-17T07:20:46Z", - "updated_at": "2021-10-18T03:32:04Z", - "pushed_at": "2020-12-07T07:46:06Z", - "stargazers_count": 30, - "watchers_count": 30, - "has_discussions": false, - "forks_count": 13, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 13, - "watchers": 30, - "score": 0 - } -] \ No newline at end of file diff --git a/2020/CVE-2020-8277.json b/2020/CVE-2020-8277.json index 4e78b7c4d5..4fd6ea51bf 100644 --- a/2020/CVE-2020-8277.json +++ b/2020/CVE-2020-8277.json @@ -1,33 +1,4 @@ [ - { - "id": 313906359, - "name": "CVE-2020-8277", - "full_name": "masahiro331\/CVE-2020-8277", - "owner": { - "login": "masahiro331", - "id": 20438853, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4", - "html_url": "https:\/\/github.com\/masahiro331" - }, - "html_url": "https:\/\/github.com\/masahiro331\/CVE-2020-8277", - "description": null, - "fork": false, - "created_at": "2020-11-18T10:57:13Z", - "updated_at": "2022-11-09T18:10:08Z", - "pushed_at": "2020-11-20T11:37:07Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 7, - "score": 0 - }, { "id": 384786682, "name": "CVE-2020-8277", diff --git a/2020/CVE-2020-8554.json b/2020/CVE-2020-8554.json index 26a6b8d76a..4d3fccefd7 100644 --- a/2020/CVE-2020-8554.json +++ b/2020/CVE-2020-8554.json @@ -57,35 +57,6 @@ "watchers": 1, "score": 0 }, - { - "id": 322992127, - "name": "k8s-cve-2020-8554-mitigations", - "full_name": "twistlock\/k8s-cve-2020-8554-mitigations", - "owner": { - "login": "twistlock", - "id": 12218272, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12218272?v=4", - "html_url": "https:\/\/github.com\/twistlock" - }, - "html_url": "https:\/\/github.com\/twistlock\/k8s-cve-2020-8554-mitigations", - "description": "Prisma Cloud Compute Admission rules to mitigate Kubernetes CVE-2020-8554", - "fork": false, - "created_at": "2020-12-20T04:22:43Z", - "updated_at": "2021-02-23T07:38:24Z", - "pushed_at": "2020-12-22T16:04:01Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, { "id": 331774345, "name": "CVE-2020-8554", diff --git a/2020/CVE-2020-8555.json b/2020/CVE-2020-8555.json new file mode 100644 index 0000000000..a7b3b18c24 --- /dev/null +++ b/2020/CVE-2020-8555.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636969, + "name": "CVE-2020-8555", + "full_name": "Live-Hack-CVE\/CVE-2020-8555", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-8555", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2020-8555 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:41Z", + "updated_at": "2022-12-23T19:45:41Z", + "pushed_at": "2022-12-23T19:45:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-0185.json b/2021/CVE-2021-0185.json new file mode 100644 index 0000000000..0672d78b4f --- /dev/null +++ b/2021/CVE-2021-0185.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636121, + "name": "CVE-2021-0185", + "full_name": "Live-Hack-CVE\/CVE-2021-0185", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-0185", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-0185 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:25Z", + "updated_at": "2022-12-23T19:42:25Z", + "pushed_at": "2022-12-23T19:42:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-0325.json b/2021/CVE-2021-0325.json deleted file mode 100644 index efa3ccc776..0000000000 --- a/2021/CVE-2021-0325.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476747255, - "name": "external_libavc_AOSP10_r33_CVE-2021-0325", - "full_name": "nanopathi\/external_libavc_AOSP10_r33_CVE-2021-0325", - "owner": { - "login": "nanopathi", - "id": 26024136, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4", - "html_url": "https:\/\/github.com\/nanopathi" - }, - "html_url": "https:\/\/github.com\/nanopathi\/external_libavc_AOSP10_r33_CVE-2021-0325", - "description": null, - "fork": false, - "created_at": "2022-04-01T14:11:58Z", - "updated_at": "2022-04-18T09:32:07Z", - "pushed_at": "2022-04-01T14:18:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-0326.json b/2021/CVE-2021-0326.json index 435aad7c16..a7f6343e69 100644 --- a/2021/CVE-2021-0326.json +++ b/2021/CVE-2021-0326.json @@ -1,33 +1,4 @@ [ - { - "id": 449055330, - "name": "skeleton", - "full_name": "aemmitt-ns\/skeleton", - "owner": { - "login": "aemmitt-ns", - "id": 51972960, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972960?v=4", - "html_url": "https:\/\/github.com\/aemmitt-ns" - }, - "html_url": "https:\/\/github.com\/aemmitt-ns\/skeleton", - "description": "Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326", - "fork": false, - "created_at": "2022-01-17T21:35:19Z", - "updated_at": "2022-12-06T07:42:44Z", - "pushed_at": "2022-03-16T02:58:42Z", - "stargazers_count": 16, - "watchers_count": 16, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 16, - "score": 0 - }, { "id": 485818095, "name": "wpa_supplicant_8_CVE-2021-0326.", diff --git a/2021/CVE-2021-0330.json b/2021/CVE-2021-0330.json deleted file mode 100644 index 00a7f22dd3..0000000000 --- a/2021/CVE-2021-0330.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476240143, - "name": "system_core_AOSP10_r33-CVE-2021-0330", - "full_name": "Satheesh575555\/system_core_AOSP10_r33-CVE-2021-0330", - "owner": { - "login": "Satheesh575555", - "id": 102573923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" - }, - "html_url": "https:\/\/github.com\/Satheesh575555\/system_core_AOSP10_r33-CVE-2021-0330", - "description": null, - "fork": false, - "created_at": "2022-03-31T09:36:07Z", - "updated_at": "2022-03-31T09:39:44Z", - "pushed_at": "2022-03-31T09:40:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-0334.json b/2021/CVE-2021-0334.json deleted file mode 100644 index 6d03549ef9..0000000000 --- a/2021/CVE-2021-0334.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476687472, - "name": "frameworks_base_AOSP10_r33_CVE-2021-0334", - "full_name": "ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0334", - "owner": { - "login": "ShaikUsaf", - "id": 100413972, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100413972?v=4", - "html_url": "https:\/\/github.com\/ShaikUsaf" - }, - "html_url": "https:\/\/github.com\/ShaikUsaf\/frameworks_base_AOSP10_r33_CVE-2021-0334", - "description": null, - "fork": false, - "created_at": "2022-04-01T11:10:57Z", - "updated_at": "2022-04-01T11:28:17Z", - "pushed_at": "2022-04-01T12:01:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-0397.json b/2021/CVE-2021-0397.json deleted file mode 100644 index 3e9cf26456..0000000000 --- a/2021/CVE-2021-0397.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476561257, - "name": "System_bt_AOSP10-r33_CVE-2021-0397", - "full_name": "Satheesh575555\/System_bt_AOSP10-r33_CVE-2021-0397", - "owner": { - "login": "Satheesh575555", - "id": 102573923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" - }, - "html_url": "https:\/\/github.com\/Satheesh575555\/System_bt_AOSP10-r33_CVE-2021-0397", - "description": null, - "fork": false, - "created_at": "2022-04-01T03:31:38Z", - "updated_at": "2022-04-01T03:35:40Z", - "pushed_at": "2022-04-01T03:35:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-0472.json b/2021/CVE-2021-0472.json deleted file mode 100644 index fe085b7f29..0000000000 --- a/2021/CVE-2021-0472.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476366397, - "name": "framework_base_AOSP10_r33_CVE-2021-0472", - "full_name": "nanopathi\/framework_base_AOSP10_r33_CVE-2021-0472", - "owner": { - "login": "nanopathi", - "id": 26024136, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4", - "html_url": "https:\/\/github.com\/nanopathi" - }, - "html_url": "https:\/\/github.com\/nanopathi\/framework_base_AOSP10_r33_CVE-2021-0472", - "description": null, - "fork": false, - "created_at": "2022-03-31T15:28:01Z", - "updated_at": "2022-04-01T02:30:35Z", - "pushed_at": "2022-03-31T15:38:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-0595.json b/2021/CVE-2021-0595.json index 3727a07c67..53ce5b198c 100644 --- a/2021/CVE-2021-0595.json +++ b/2021/CVE-2021-0595.json @@ -1,33 +1,4 @@ [ - { - "id": 470544287, - "name": "Settings-CVE-2021-0595", - "full_name": "pazhanivel07\/Settings-CVE-2021-0595", - "owner": { - "login": "pazhanivel07", - "id": 97434034, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97434034?v=4", - "html_url": "https:\/\/github.com\/pazhanivel07" - }, - "html_url": "https:\/\/github.com\/pazhanivel07\/Settings-CVE-2021-0595", - "description": null, - "fork": false, - "created_at": "2022-03-16T10:59:58Z", - "updated_at": "2022-03-16T10:59:58Z", - "pushed_at": "2022-03-16T10:59:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 484316243, "name": "frameworks_base_Aosp10_r33_CVE-2021-0595", diff --git a/2021/CVE-2021-0652.json b/2021/CVE-2021-0652.json deleted file mode 100644 index 14f310dd9e..0000000000 --- a/2021/CVE-2021-0652.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476594576, - "name": "frameworks_base_AOSP10_r33_CVE-2021-0652", - "full_name": "Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0652", - "owner": { - "login": "Satheesh575555", - "id": 102573923, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102573923?v=4", - "html_url": "https:\/\/github.com\/Satheesh575555" - }, - "html_url": "https:\/\/github.com\/Satheesh575555\/frameworks_base_AOSP10_r33_CVE-2021-0652", - "description": null, - "fork": false, - "created_at": "2022-04-01T06:06:53Z", - "updated_at": "2022-04-01T06:16:36Z", - "pushed_at": "2022-04-01T06:15:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-0928.json b/2021/CVE-2021-0928.json deleted file mode 100644 index 851359f5b2..0000000000 --- a/2021/CVE-2021-0928.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 453362563, - "name": "ReparcelBug2", - "full_name": "michalbednarski\/ReparcelBug2", - "owner": { - "login": "michalbednarski", - "id": 1826899, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1826899?v=4", - "html_url": "https:\/\/github.com\/michalbednarski" - }, - "html_url": "https:\/\/github.com\/michalbednarski\/ReparcelBug2", - "description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`", - "fork": false, - "created_at": "2022-01-29T10:14:32Z", - "updated_at": "2022-12-13T07:29:43Z", - "pushed_at": "2022-03-03T17:50:03Z", - "stargazers_count": 50, - "watchers_count": 50, - "has_discussions": false, - "forks_count": 13, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 13, - "watchers": 50, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-1050.json b/2021/CVE-2021-1050.json new file mode 100644 index 0000000000..95d45865f5 --- /dev/null +++ b/2021/CVE-2021-1050.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662403, + "name": "CVE-2021-1050", + "full_name": "Live-Hack-CVE\/CVE-2021-1050", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-1050", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-1050 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:56Z", + "updated_at": "2022-12-23T21:50:56Z", + "pushed_at": "2022-12-23T21:50:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 8d862eb425..bafd1967a5 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -115,64 +115,6 @@ "watchers": 4, "score": 0 }, - { - "id": 462124046, - "name": "cube0x0-CVE-2021-1675", - "full_name": "TheJoyOfHacking\/cube0x0-CVE-2021-1675", - "owner": { - "login": "TheJoyOfHacking", - "id": 99463221, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4", - "html_url": "https:\/\/github.com\/TheJoyOfHacking" - }, - "html_url": "https:\/\/github.com\/TheJoyOfHacking\/cube0x0-CVE-2021-1675", - "description": null, - "fork": false, - "created_at": "2022-02-22T03:32:14Z", - "updated_at": "2022-02-22T03:32:28Z", - "pushed_at": "2022-02-22T03:32:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 462124130, - "name": "calebstewart-CVE-2021-1675", - "full_name": "TheJoyOfHacking\/calebstewart-CVE-2021-1675", - "owner": { - "login": "TheJoyOfHacking", - "id": 99463221, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4", - "html_url": "https:\/\/github.com\/TheJoyOfHacking" - }, - "html_url": "https:\/\/github.com\/TheJoyOfHacking\/calebstewart-CVE-2021-1675", - "description": null, - "fork": false, - "created_at": "2022-02-22T03:32:34Z", - "updated_at": "2022-05-10T14:32:19Z", - "pushed_at": "2022-02-22T03:32:45Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 557145507, "name": "cve-2021-1675", diff --git a/2021/CVE-2021-1965.json b/2021/CVE-2021-1965.json deleted file mode 100644 index 8c4c263d5d..0000000000 --- a/2021/CVE-2021-1965.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 461350628, - "name": "CVE-2021-1965", - "full_name": "foxtrot\/CVE-2021-1965", - "owner": { - "login": "foxtrot", - "id": 4153572, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4153572?v=4", - "html_url": "https:\/\/github.com\/foxtrot" - }, - "html_url": "https:\/\/github.com\/foxtrot\/CVE-2021-1965", - "description": null, - "fork": false, - "created_at": "2022-02-20T00:52:01Z", - "updated_at": "2022-11-09T18:15:21Z", - "pushed_at": "2022-02-20T01:58:54Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-20227.json b/2021/CVE-2021-20227.json new file mode 100644 index 0000000000..9788b88b1f --- /dev/null +++ b/2021/CVE-2021-20227.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627810, + "name": "CVE-2021-20227", + "full_name": "Live-Hack-CVE\/CVE-2021-20227", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-20227", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-20227 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:52Z", + "updated_at": "2022-12-23T19:04:52Z", + "pushed_at": "2022-12-23T19:04:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-20294.json b/2021/CVE-2021-20294.json new file mode 100644 index 0000000000..835965e36c --- /dev/null +++ b/2021/CVE-2021-20294.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637150, + "name": "CVE-2021-20294", + "full_name": "Live-Hack-CVE\/CVE-2021-20294", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-20294", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-20294 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:23Z", + "updated_at": "2022-12-23T19:46:23Z", + "pushed_at": "2022-12-23T19:46:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-20837.json b/2021/CVE-2021-20837.json deleted file mode 100644 index 202faf1b09..0000000000 --- a/2021/CVE-2021-20837.json +++ /dev/null @@ -1,34 +0,0 @@ -[ - { - "id": 422835153, - "name": "CVE-2021-20837", - "full_name": "orangmuda\/CVE-2021-20837", - "owner": { - "login": "orangmuda", - "id": 91846073, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/orangmuda" - }, - "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-20837", - "description": "XMLRPC - RCE in MovableTypePoC", - "fork": false, - "created_at": "2021-10-30T09:15:56Z", - "updated_at": "2022-11-09T18:14:15Z", - "pushed_at": "2022-03-21T13:23:03Z", - "stargazers_count": 22, - "watchers_count": 22, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-20837", - "xmlrpc-api" - ], - "visibility": "public", - "forks": 10, - "watchers": 22, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-21017.json b/2021/CVE-2021-21017.json index 55af78d089..5504db8586 100644 --- a/2021/CVE-2021-21017.json +++ b/2021/CVE-2021-21017.json @@ -27,34 +27,5 @@ "forks": 13, "watchers": 45, "score": 0 - }, - { - "id": 475487342, - "name": "CVE-2021-21017", - "full_name": "tzwlhack\/CVE-2021-21017", - "owner": { - "login": "tzwlhack", - "id": 86322859, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86322859?v=4", - "html_url": "https:\/\/github.com\/tzwlhack" - }, - "html_url": "https:\/\/github.com\/tzwlhack\/CVE-2021-21017", - "description": null, - "fork": false, - "created_at": "2022-03-29T14:45:16Z", - "updated_at": "2022-03-29T14:45:28Z", - "pushed_at": "2022-03-29T14:45:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-2109.json b/2021/CVE-2021-2109.json index b169435a14..ea70ce73c5 100644 --- a/2021/CVE-2021-2109.json +++ b/2021/CVE-2021-2109.json @@ -91,35 +91,6 @@ "watchers": 5, "score": 0 }, - { - "id": 475591127, - "name": "CVE-2021-2109", - "full_name": "coco0x0a\/CVE-2021-2109", - "owner": { - "login": "coco0x0a", - "id": 96345719, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96345719?v=4", - "html_url": "https:\/\/github.com\/coco0x0a" - }, - "html_url": "https:\/\/github.com\/coco0x0a\/CVE-2021-2109", - "description": null, - "fork": false, - "created_at": "2022-03-29T19:29:29Z", - "updated_at": "2022-03-29T21:05:01Z", - "pushed_at": "2022-03-29T21:04:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 530633500, "name": "oracle-weblogic-CVE-2021-2109", diff --git a/2021/CVE-2021-2119.json b/2021/CVE-2021-2119.json index 9db535447e..6c9da70b95 100644 --- a/2021/CVE-2021-2119.json +++ b/2021/CVE-2021-2119.json @@ -28,35 +28,6 @@ "watchers": 127, "score": 0 }, - { - "id": 471867550, - "name": "Sauercloude", - "full_name": "chatbottesisgmailh\/Sauercloude", - "owner": { - "login": "chatbottesisgmailh", - "id": 101959431, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101959431?v=4", - "html_url": "https:\/\/github.com\/chatbottesisgmailh" - }, - "html_url": "https:\/\/github.com\/chatbottesisgmailh\/Sauercloude", - "description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119", - "fork": false, - "created_at": "2022-03-20T03:17:03Z", - "updated_at": "2022-03-20T03:17:04Z", - "pushed_at": "2022-03-20T03:17:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 477297752, "name": "Sauercloude", diff --git a/2021/CVE-2021-21193.json b/2021/CVE-2021-21193.json deleted file mode 100644 index 47808ce7df..0000000000 --- a/2021/CVE-2021-21193.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 474836947, - "name": "CVE-2021-21193", - "full_name": "mehrzad1994\/CVE-2021-21193", - "owner": { - "login": "mehrzad1994", - "id": 19632843, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19632843?v=4", - "html_url": "https:\/\/github.com\/mehrzad1994" - }, - "html_url": "https:\/\/github.com\/mehrzad1994\/CVE-2021-21193", - "description": "introduction to hacking second presentation", - "fork": false, - "created_at": "2022-03-28T03:51:58Z", - "updated_at": "2022-03-28T03:51:58Z", - "pushed_at": "2022-03-28T13:06:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-21300.json b/2021/CVE-2021-21300.json index 342c8c5408..919936573b 100644 --- a/2021/CVE-2021-21300.json +++ b/2021/CVE-2021-21300.json @@ -260,64 +260,6 @@ "watchers": 0, "score": 0 }, - { - "id": 470823423, - "name": "cve-2021-21300", - "full_name": "Jiang59991\/cve-2021-21300", - "owner": { - "login": "Jiang59991", - "id": 101699680, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101699680?v=4", - "html_url": "https:\/\/github.com\/Jiang59991" - }, - "html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300", - "description": null, - "fork": false, - "created_at": "2022-03-17T02:37:58Z", - "updated_at": "2022-03-17T02:37:58Z", - "pushed_at": "2022-03-17T02:47:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 473848809, - "name": "cve-2021-21300-plus", - "full_name": "Jiang59991\/cve-2021-21300-plus", - "owner": { - "login": "Jiang59991", - "id": 101699680, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101699680?v=4", - "html_url": "https:\/\/github.com\/Jiang59991" - }, - "html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300-plus", - "description": null, - "fork": false, - "created_at": "2022-03-25T02:59:41Z", - "updated_at": "2022-03-25T03:26:08Z", - "pushed_at": "2022-03-25T03:26:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 509747722, "name": "CVE-2021-21300", diff --git a/2021/CVE-2021-21341.json b/2021/CVE-2021-21341.json index 9870b9cad0..7940546184 100644 --- a/2021/CVE-2021-21341.json +++ b/2021/CVE-2021-21341.json @@ -27,34 +27,5 @@ "forks": 1, "watchers": 0, "score": 0 - }, - { - "id": 470049863, - "name": "ka-cve-2021-21341", - "full_name": "Mani1325\/ka-cve-2021-21341", - "owner": { - "login": "Mani1325", - "id": 96471113, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96471113?v=4", - "html_url": "https:\/\/github.com\/Mani1325" - }, - "html_url": "https:\/\/github.com\/Mani1325\/ka-cve-2021-21341", - "description": null, - "fork": false, - "created_at": "2022-03-15T07:28:52Z", - "updated_at": "2022-03-15T07:38:51Z", - "pushed_at": "2022-03-15T07:38:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 15a9084869..02d41bceeb 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -159,35 +159,6 @@ "watchers": 13, "score": 0 }, - { - "id": 402614345, - "name": "Dell-Driver-EoP-CVE-2021-21551", - "full_name": "ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551", - "owner": { - "login": "ihack4falafel", - "id": 17316888, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17316888?v=4", - "html_url": "https:\/\/github.com\/ihack4falafel" - }, - "html_url": "https:\/\/github.com\/ihack4falafel\/Dell-Driver-EoP-CVE-2021-21551", - "description": "Dell Driver EoP (CVE-2021-21551)", - "fork": false, - "created_at": "2021-09-03T01:47:03Z", - "updated_at": "2022-12-12T21:01:31Z", - "pushed_at": "2022-02-24T10:13:45Z", - "stargazers_count": 33, - "watchers_count": 33, - "has_discussions": false, - "forks_count": 15, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 15, - "watchers": 33, - "score": 0 - }, { "id": 507289591, "name": "kernel-mii", diff --git a/2021/CVE-2021-21772.json b/2021/CVE-2021-21772.json new file mode 100644 index 0000000000..607923ef36 --- /dev/null +++ b/2021/CVE-2021-21772.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637020, + "name": "CVE-2021-21772", + "full_name": "Live-Hack-CVE\/CVE-2021-21772", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-21772", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-21772 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:51Z", + "updated_at": "2022-12-23T19:45:51Z", + "pushed_at": "2022-12-23T19:45:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 474d07857f..5e10e0b2a0 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -718,40 +718,6 @@ "watchers": 1, "score": 0 }, - { - "id": 413216838, - "name": "CVE-2021-21972", - "full_name": "orangmuda\/CVE-2021-21972", - "owner": { - "login": "orangmuda", - "id": 91846073, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/orangmuda" - }, - "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-21972", - "description": "CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)", - "fork": false, - "created_at": "2021-10-03T23:03:11Z", - "updated_at": "2022-11-15T17:44:46Z", - "pushed_at": "2022-03-07T14:12:38Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-21972", - "exploit", - "remote-code-execution", - "vmware" - ], - "visibility": "public", - "forks": 3, - "watchers": 7, - "score": 0 - }, { "id": 492815004, "name": "cve-2021-21972_PoC", diff --git a/2021/CVE-2021-21983.json b/2021/CVE-2021-21983.json deleted file mode 100644 index 6233bd6628..0000000000 --- a/2021/CVE-2021-21983.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 470562831, - "name": "CVE-2021-21983", - "full_name": "murataydemir\/CVE-2021-21983", - "owner": { - "login": "murataydemir", - "id": 16391655, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4", - "html_url": "https:\/\/github.com\/murataydemir" - }, - "html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-21983", - "description": "[CVE-2021-21983] VMware vRealize Operations (vROps) Manager API Arbitrary File Write Leads to Remote Code Execution (RCE)", - "fork": false, - "created_at": "2022-03-16T11:56:25Z", - "updated_at": "2022-08-15T05:24:38Z", - "pushed_at": "2022-03-16T13:08:46Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-22137.json b/2021/CVE-2021-22137.json new file mode 100644 index 0000000000..427873e10f --- /dev/null +++ b/2021/CVE-2021-22137.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682412, + "name": "CVE-2021-22137", + "full_name": "Live-Hack-CVE\/CVE-2021-22137", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-22137", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-22137 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:35Z", + "updated_at": "2022-12-23T23:53:35Z", + "pushed_at": "2022-12-23T23:53:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-22147.json b/2021/CVE-2021-22147.json new file mode 100644 index 0000000000..bceef657a9 --- /dev/null +++ b/2021/CVE-2021-22147.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682420, + "name": "CVE-2021-22147", + "full_name": "Live-Hack-CVE\/CVE-2021-22147", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-22147", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-22147 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:38Z", + "updated_at": "2022-12-23T23:53:38Z", + "pushed_at": "2022-12-23T23:53:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index 68b66677c8..d194822f2f 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -89,64 +89,6 @@ "watchers": 6, "score": 0 }, - { - "id": 461823605, - "name": "CVE-2021-22204-exiftool", - "full_name": "tuhinGsg\/CVE-2021-22204-exiftool", - "owner": { - "login": "tuhinGsg", - "id": 53522759, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53522759?v=4", - "html_url": "https:\/\/github.com\/tuhinGsg" - }, - "html_url": "https:\/\/github.com\/tuhinGsg\/CVE-2021-22204-exiftool", - "description": "exiftool exploit", - "fork": false, - "created_at": "2022-02-21T11:07:19Z", - "updated_at": "2022-05-20T15:33:08Z", - "pushed_at": "2022-02-21T12:20:15Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - }, - { - "id": 474844634, - "name": "CVE-2021-22204", - "full_name": "Pajarraco4444\/CVE-2021-22204", - "owner": { - "login": "Pajarraco4444", - "id": 102332204, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102332204?v=4", - "html_url": "https:\/\/github.com\/Pajarraco4444" - }, - "html_url": "https:\/\/github.com\/Pajarraco4444\/CVE-2021-22204", - "description": "Script en python para crear imagenes maliciosas (reverse shell)", - "fork": false, - "created_at": "2022-03-28T04:27:05Z", - "updated_at": "2022-09-02T03:21:29Z", - "pushed_at": "2022-03-11T19:02:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 482377691, "name": "exploit-CVE-2021-22204", diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index bf132cd89e..2a624ece8d 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -117,35 +117,6 @@ "watchers": 1, "score": 0 }, - { - "id": 469576094, - "name": "CVE-2021-22205", - "full_name": "honypot\/CVE-2021-22205", - "owner": { - "login": "honypot", - "id": 101309325, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", - "html_url": "https:\/\/github.com\/honypot" - }, - "html_url": "https:\/\/github.com\/honypot\/CVE-2021-22205", - "description": null, - "fork": false, - "created_at": "2022-03-14T04:09:18Z", - "updated_at": "2022-03-14T04:09:34Z", - "pushed_at": "2022-03-14T04:09:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 482719088, "name": "cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-", diff --git a/2021/CVE-2021-22737.json b/2021/CVE-2021-22737.json new file mode 100644 index 0000000000..02980b5e9d --- /dev/null +++ b/2021/CVE-2021-22737.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647122, + "name": "CVE-2021-22737", + "full_name": "Live-Hack-CVE\/CVE-2021-22737", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-22737", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-22737 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:54Z", + "updated_at": "2022-12-23T20:32:54Z", + "pushed_at": "2022-12-23T20:32:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-22893.json b/2021/CVE-2021-22893.json index bd6c07535f..9a881e452f 100644 --- a/2021/CVE-2021-22893.json +++ b/2021/CVE-2021-22893.json @@ -56,38 +56,5 @@ "forks": 6, "watchers": 5, "score": 0 - }, - { - "id": 413204436, - "name": "CVE-2021-22893", - "full_name": "orangmuda\/CVE-2021-22893", - "owner": { - "login": "orangmuda", - "id": 91846073, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4", - "html_url": "https:\/\/github.com\/orangmuda" - }, - "html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-22893", - "description": "Proof On Concept — Pulse Secure CVE-2021-22893", - "fork": false, - "created_at": "2021-10-03T21:46:58Z", - "updated_at": "2022-11-15T17:44:45Z", - "pushed_at": "2022-02-24T22:56:29Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bash", - "bugbounty", - "code-injection" - ], - "visibility": "public", - "forks": 4, - "watchers": 7, - "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-22939.json b/2021/CVE-2021-22939.json new file mode 100644 index 0000000000..9e4d02d8cc --- /dev/null +++ b/2021/CVE-2021-22939.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676509, + "name": "CVE-2021-22939", + "full_name": "Live-Hack-CVE\/CVE-2021-22939", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-22939", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-22939 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:59Z", + "updated_at": "2022-12-23T23:13:59Z", + "pushed_at": "2022-12-23T23:14:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json index 1e5649be64..273a49a46d 100644 --- a/2021/CVE-2021-22986.json +++ b/2021/CVE-2021-22986.json @@ -294,35 +294,6 @@ "watchers": 0, "score": 0 }, - { - "id": 476541451, - "name": "CVE-2021-22986", - "full_name": "DDestinys\/CVE-2021-22986", - "owner": { - "login": "DDestinys", - "id": 73631761, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73631761?v=4", - "html_url": "https:\/\/github.com\/DDestinys" - }, - "html_url": "https:\/\/github.com\/DDestinys\/CVE-2021-22986", - "description": "BIGIP F5", - "fork": false, - "created_at": "2022-04-01T02:02:33Z", - "updated_at": "2022-04-01T02:03:21Z", - "pushed_at": "2022-04-01T02:03:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 497326298, "name": "F5-BIG-IP-POC", diff --git a/2021/CVE-2021-23239.json b/2021/CVE-2021-23239.json new file mode 100644 index 0000000000..70a996c31b --- /dev/null +++ b/2021/CVE-2021-23239.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663158, + "name": "CVE-2021-23239", + "full_name": "Live-Hack-CVE\/CVE-2021-23239", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-23239", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-23239 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:07Z", + "updated_at": "2022-12-23T22:00:19Z", + "pushed_at": "2022-12-23T21:55:10Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-23394.json b/2021/CVE-2021-23394.json new file mode 100644 index 0000000000..d82c12bc10 --- /dev/null +++ b/2021/CVE-2021-23394.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668738, + "name": "CVE-2021-23394", + "full_name": "Live-Hack-CVE\/CVE-2021-23394", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-23394", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-23394 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:09Z", + "updated_at": "2022-12-23T22:27:09Z", + "pushed_at": "2022-12-23T22:27:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24084.json b/2021/CVE-2021-24084.json deleted file mode 100644 index 7315804df1..0000000000 --- a/2021/CVE-2021-24084.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 432673238, - "name": "WindowsMDM-LPE-0Day", - "full_name": "exploitblizzard\/WindowsMDM-LPE-0Day", - "owner": { - "login": "exploitblizzard", - "id": 61627070, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4", - "html_url": "https:\/\/github.com\/exploitblizzard" - }, - "html_url": "https:\/\/github.com\/exploitblizzard\/WindowsMDM-LPE-0Day", - "description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day", - "fork": false, - "created_at": "2021-11-28T09:48:36Z", - "updated_at": "2022-11-09T18:14:31Z", - "pushed_at": "2022-02-21T08:30:22Z", - "stargazers_count": 35, - "watchers_count": 35, - "has_discussions": false, - "forks_count": 12, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 12, - "watchers": 35, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-24144.json b/2021/CVE-2021-24144.json new file mode 100644 index 0000000000..e314504475 --- /dev/null +++ b/2021/CVE-2021-24144.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646134, + "name": "CVE-2021-24144", + "full_name": "Live-Hack-CVE\/CVE-2021-24144", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24144", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24144 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:51Z", + "updated_at": "2022-12-23T20:27:51Z", + "pushed_at": "2022-12-23T20:27:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24347.json b/2021/CVE-2021-24347.json new file mode 100644 index 0000000000..ab81991f20 --- /dev/null +++ b/2021/CVE-2021-24347.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668579, + "name": "CVE-2021-24347", + "full_name": "Live-Hack-CVE\/CVE-2021-24347", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24347", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24347 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:16Z", + "updated_at": "2022-12-23T22:26:16Z", + "pushed_at": "2022-12-23T22:26:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24349.json b/2021/CVE-2021-24349.json new file mode 100644 index 0000000000..4b10058e2d --- /dev/null +++ b/2021/CVE-2021-24349.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668617, + "name": "CVE-2021-24349", + "full_name": "Live-Hack-CVE\/CVE-2021-24349", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24349", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24349 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:30Z", + "updated_at": "2022-12-23T22:26:30Z", + "pushed_at": "2022-12-23T22:26:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24444.json b/2021/CVE-2021-24444.json new file mode 100644 index 0000000000..d244a607d2 --- /dev/null +++ b/2021/CVE-2021-24444.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628933, + "name": "CVE-2021-24444", + "full_name": "Live-Hack-CVE\/CVE-2021-24444", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24444", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24444 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:31Z", + "updated_at": "2022-12-23T19:09:31Z", + "pushed_at": "2022-12-23T19:09:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24504.json b/2021/CVE-2021-24504.json new file mode 100644 index 0000000000..6c9761fde2 --- /dev/null +++ b/2021/CVE-2021-24504.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668593, + "name": "CVE-2021-24504", + "full_name": "Live-Hack-CVE\/CVE-2021-24504", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24504", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24504 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:23Z", + "updated_at": "2022-12-23T22:26:23Z", + "pushed_at": "2022-12-23T22:26:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24543.json b/2021/CVE-2021-24543.json new file mode 100644 index 0000000000..1fd94362bb --- /dev/null +++ b/2021/CVE-2021-24543.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661537, + "name": "CVE-2021-24543", + "full_name": "Live-Hack-CVE\/CVE-2021-24543", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24543", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24543 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:32Z", + "updated_at": "2022-12-23T21:46:32Z", + "pushed_at": "2022-12-23T21:46:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24555.json b/2021/CVE-2021-24555.json new file mode 100644 index 0000000000..dfd66a3fdb --- /dev/null +++ b/2021/CVE-2021-24555.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662169, + "name": "CVE-2021-24555", + "full_name": "Live-Hack-CVE\/CVE-2021-24555", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24555", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24555 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:43Z", + "updated_at": "2022-12-23T21:49:43Z", + "pushed_at": "2022-12-23T21:49:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24570.json b/2021/CVE-2021-24570.json new file mode 100644 index 0000000000..5efc2e7b5e --- /dev/null +++ b/2021/CVE-2021-24570.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661515, + "name": "CVE-2021-24570", + "full_name": "Live-Hack-CVE\/CVE-2021-24570", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24570", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24570 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:25Z", + "updated_at": "2022-12-23T21:46:25Z", + "pushed_at": "2022-12-23T21:46:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24595.json b/2021/CVE-2021-24595.json new file mode 100644 index 0000000000..74358b3079 --- /dev/null +++ b/2021/CVE-2021-24595.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661326, + "name": "CVE-2021-24595", + "full_name": "Live-Hack-CVE\/CVE-2021-24595", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24595", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24595 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:23Z", + "updated_at": "2022-12-23T21:45:23Z", + "pushed_at": "2022-12-23T21:45:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24615.json b/2021/CVE-2021-24615.json new file mode 100644 index 0000000000..75ed3cd748 --- /dev/null +++ b/2021/CVE-2021-24615.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661303, + "name": "CVE-2021-24615", + "full_name": "Live-Hack-CVE\/CVE-2021-24615", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24615", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24615 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:16Z", + "updated_at": "2022-12-23T21:45:16Z", + "pushed_at": "2022-12-23T21:45:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24626.json b/2021/CVE-2021-24626.json new file mode 100644 index 0000000000..b8ad57838c --- /dev/null +++ b/2021/CVE-2021-24626.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661403, + "name": "CVE-2021-24626", + "full_name": "Live-Hack-CVE\/CVE-2021-24626", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24626", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24626 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:44Z", + "updated_at": "2022-12-23T21:45:45Z", + "pushed_at": "2022-12-23T21:45:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24642.json b/2021/CVE-2021-24642.json new file mode 100644 index 0000000000..a3de5ec36c --- /dev/null +++ b/2021/CVE-2021-24642.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661312, + "name": "CVE-2021-24642", + "full_name": "Live-Hack-CVE\/CVE-2021-24642", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24642", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24642 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:19Z", + "updated_at": "2022-12-23T21:45:19Z", + "pushed_at": "2022-12-23T21:45:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24651.json b/2021/CVE-2021-24651.json new file mode 100644 index 0000000000..c903fcd46d --- /dev/null +++ b/2021/CVE-2021-24651.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661342, + "name": "CVE-2021-24651", + "full_name": "Live-Hack-CVE\/CVE-2021-24651", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24651", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24651 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:26Z", + "updated_at": "2022-12-23T21:45:26Z", + "pushed_at": "2022-12-23T21:45:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24683.json b/2021/CVE-2021-24683.json new file mode 100644 index 0000000000..5c1237db0b --- /dev/null +++ b/2021/CVE-2021-24683.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661356, + "name": "CVE-2021-24683", + "full_name": "Live-Hack-CVE\/CVE-2021-24683", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24683", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24683 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:31Z", + "updated_at": "2022-12-23T21:45:31Z", + "pushed_at": "2022-12-23T21:45:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24685.json b/2021/CVE-2021-24685.json new file mode 100644 index 0000000000..759024d6e8 --- /dev/null +++ b/2021/CVE-2021-24685.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661526, + "name": "CVE-2021-24685", + "full_name": "Live-Hack-CVE\/CVE-2021-24685", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24685", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24685 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:29Z", + "updated_at": "2022-12-23T21:46:29Z", + "pushed_at": "2022-12-23T21:46:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24695.json b/2021/CVE-2021-24695.json new file mode 100644 index 0000000000..21e1c2f0dd --- /dev/null +++ b/2021/CVE-2021-24695.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661392, + "name": "CVE-2021-24695", + "full_name": "Live-Hack-CVE\/CVE-2021-24695", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24695", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24695 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:41Z", + "updated_at": "2022-12-23T21:50:50Z", + "pushed_at": "2022-12-23T21:45:43Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24730.json b/2021/CVE-2021-24730.json new file mode 100644 index 0000000000..87b542ff5b --- /dev/null +++ b/2021/CVE-2021-24730.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661604, + "name": "CVE-2021-24730", + "full_name": "Live-Hack-CVE\/CVE-2021-24730", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24730", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24730 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:55Z", + "updated_at": "2022-12-23T21:46:55Z", + "pushed_at": "2022-12-23T21:46:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24739.json b/2021/CVE-2021-24739.json new file mode 100644 index 0000000000..ec0500dcf5 --- /dev/null +++ b/2021/CVE-2021-24739.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661235, + "name": "CVE-2021-24739", + "full_name": "Live-Hack-CVE\/CVE-2021-24739", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24739", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24739 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:55Z", + "updated_at": "2022-12-23T21:44:55Z", + "pushed_at": "2022-12-23T21:44:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24822.json b/2021/CVE-2021-24822.json new file mode 100644 index 0000000000..66d7bc2b4e --- /dev/null +++ b/2021/CVE-2021-24822.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661281, + "name": "CVE-2021-24822", + "full_name": "Live-Hack-CVE\/CVE-2021-24822", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24822", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24822 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:09Z", + "updated_at": "2022-12-23T21:45:09Z", + "pushed_at": "2022-12-23T21:45:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-24930.json b/2021/CVE-2021-24930.json new file mode 100644 index 0000000000..e50b2ba493 --- /dev/null +++ b/2021/CVE-2021-24930.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646372, + "name": "CVE-2021-24930", + "full_name": "Live-Hack-CVE\/CVE-2021-24930", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-24930", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-24930 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:06Z", + "updated_at": "2022-12-23T20:29:06Z", + "pushed_at": "2022-12-23T20:29:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-25094.json b/2021/CVE-2021-25094.json index 15ff385bd8..1a534875b9 100644 --- a/2021/CVE-2021-25094.json +++ b/2021/CVE-2021-25094.json @@ -85,5 +85,34 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 581661654, + "name": "CVE-2021-25094", + "full_name": "Live-Hack-CVE\/CVE-2021-25094", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-25094", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-25094 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:12Z", + "updated_at": "2022-12-23T21:47:12Z", + "pushed_at": "2022-12-23T21:47:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-25121.json b/2021/CVE-2021-25121.json new file mode 100644 index 0000000000..3e38c2e1d3 --- /dev/null +++ b/2021/CVE-2021-25121.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677316, + "name": "CVE-2021-25121", + "full_name": "Live-Hack-CVE\/CVE-2021-25121", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-25121", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-25121 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:57Z", + "updated_at": "2022-12-23T23:18:57Z", + "pushed_at": "2022-12-23T23:18:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-27645.json b/2021/CVE-2021-27645.json new file mode 100644 index 0000000000..bbe3a66c06 --- /dev/null +++ b/2021/CVE-2021-27645.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682092, + "name": "CVE-2021-27645", + "full_name": "Live-Hack-CVE\/CVE-2021-27645", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27645", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27645 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:32Z", + "updated_at": "2022-12-23T23:51:32Z", + "pushed_at": "2022-12-23T23:51:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-27815.json b/2021/CVE-2021-27815.json new file mode 100644 index 0000000000..0ba98e57c8 --- /dev/null +++ b/2021/CVE-2021-27815.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682916, + "name": "CVE-2021-27815", + "full_name": "Live-Hack-CVE\/CVE-2021-27815", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27815", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27815 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:37Z", + "updated_at": "2022-12-23T23:56:37Z", + "pushed_at": "2022-12-23T23:56:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-27853.json b/2021/CVE-2021-27853.json new file mode 100644 index 0000000000..5eaf83f4aa --- /dev/null +++ b/2021/CVE-2021-27853.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628444, + "name": "CVE-2021-27853", + "full_name": "Live-Hack-CVE\/CVE-2021-27853", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-27853", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-27853 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:25Z", + "updated_at": "2022-12-23T19:07:25Z", + "pushed_at": "2022-12-23T19:07:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-28275.json b/2021/CVE-2021-28275.json new file mode 100644 index 0000000000..756b8ef9ae --- /dev/null +++ b/2021/CVE-2021-28275.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627362, + "name": "CVE-2021-28275", + "full_name": "Live-Hack-CVE\/CVE-2021-28275", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-28275", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-28275 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:57Z", + "updated_at": "2022-12-23T19:02:57Z", + "pushed_at": "2022-12-23T19:03:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-28276.json b/2021/CVE-2021-28276.json new file mode 100644 index 0000000000..ea4b037ffa --- /dev/null +++ b/2021/CVE-2021-28276.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627346, + "name": "CVE-2021-28276", + "full_name": "Live-Hack-CVE\/CVE-2021-28276", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-28276", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-28276 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:54Z", + "updated_at": "2022-12-23T19:02:54Z", + "pushed_at": "2022-12-23T19:02:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-28277.json b/2021/CVE-2021-28277.json new file mode 100644 index 0000000000..b18aeed447 --- /dev/null +++ b/2021/CVE-2021-28277.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627319, + "name": "CVE-2021-28277", + "full_name": "Live-Hack-CVE\/CVE-2021-28277", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-28277", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-28277 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:46Z", + "updated_at": "2022-12-23T19:02:46Z", + "pushed_at": "2022-12-23T19:02:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-28278.json b/2021/CVE-2021-28278.json new file mode 100644 index 0000000000..d9ebd2959a --- /dev/null +++ b/2021/CVE-2021-28278.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627282, + "name": "CVE-2021-28278", + "full_name": "Live-Hack-CVE\/CVE-2021-28278", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-28278", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-28278 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:35Z", + "updated_at": "2022-12-23T19:02:35Z", + "pushed_at": "2022-12-23T19:02:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index cb30008eb4..321b47e28d 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -65,35 +65,6 @@ "watchers": 10, "score": 0 }, - { - "id": 471563181, - "name": "0vercl0k", - "full_name": "2273852279qqs\/0vercl0k", - "owner": { - "login": "2273852279qqs", - "id": 101910961, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101910961?v=4", - "html_url": "https:\/\/github.com\/2273852279qqs" - }, - "html_url": "https:\/\/github.com\/2273852279qqs\/0vercl0k", - "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", - "fork": false, - "created_at": "2022-03-19T01:33:04Z", - "updated_at": "2022-03-19T01:33:04Z", - "pushed_at": "2022-03-19T01:33:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 482583152, "name": "0vercl0k", diff --git a/2021/CVE-2021-28480.json b/2021/CVE-2021-28480.json index b9a00f634c..19cea55171 100644 --- a/2021/CVE-2021-28480.json +++ b/2021/CVE-2021-28480.json @@ -27,34 +27,5 @@ "forks": 9, "watchers": 11, "score": 0 - }, - { - "id": 475777282, - "name": "CVE-2021-28480", - "full_name": "Threonic\/CVE-2021-28480", - "owner": { - "login": "Threonic", - "id": 49891027, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49891027?v=4", - "html_url": "https:\/\/github.com\/Threonic" - }, - "html_url": "https:\/\/github.com\/Threonic\/CVE-2021-28480", - "description": null, - "fork": false, - "created_at": "2022-03-30T07:57:43Z", - "updated_at": "2022-03-30T07:57:43Z", - "pushed_at": "2022-03-30T07:57:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29440.json b/2021/CVE-2021-29440.json index 06630ec1b9..ed84b6dcda 100644 --- a/2021/CVE-2021-29440.json +++ b/2021/CVE-2021-29440.json @@ -27,5 +27,34 @@ "forks": 3, "watchers": 6, "score": 0 + }, + { + "id": 581668887, + "name": "CVE-2021-29440", + "full_name": "Live-Hack-CVE\/CVE-2021-29440", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-29440", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-29440 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:58Z", + "updated_at": "2022-12-23T22:27:58Z", + "pushed_at": "2022-12-23T22:28:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29441.json b/2021/CVE-2021-29441.json deleted file mode 100644 index 76fbd31a82..0000000000 --- a/2021/CVE-2021-29441.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 470076597, - "name": "CVE-2021-29441", - "full_name": "bysinks\/CVE-2021-29441", - "owner": { - "login": "bysinks", - "id": 50199185, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50199185?v=4", - "html_url": "https:\/\/github.com\/bysinks" - }, - "html_url": "https:\/\/github.com\/bysinks\/CVE-2021-29441", - "description": null, - "fork": false, - "created_at": "2022-03-15T08:53:59Z", - "updated_at": "2022-07-01T08:44:29Z", - "pushed_at": "2022-03-15T08:56:39Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-29922.json b/2021/CVE-2021-29922.json new file mode 100644 index 0000000000..8738c8408d --- /dev/null +++ b/2021/CVE-2021-29922.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676852, + "name": "CVE-2021-29922", + "full_name": "Live-Hack-CVE\/CVE-2021-29922", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-29922", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-29922 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:13Z", + "updated_at": "2022-12-23T23:16:13Z", + "pushed_at": "2022-12-23T23:16:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-30498.json b/2021/CVE-2021-30498.json new file mode 100644 index 0000000000..edc5509d9c --- /dev/null +++ b/2021/CVE-2021-30498.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637167, + "name": "CVE-2021-30498", + "full_name": "Live-Hack-CVE\/CVE-2021-30498", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-30498", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-30498 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:26Z", + "updated_at": "2022-12-23T19:46:26Z", + "pushed_at": "2022-12-23T19:46:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-30682.json b/2021/CVE-2021-30682.json deleted file mode 100644 index e3fc713263..0000000000 --- a/2021/CVE-2021-30682.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 417419424, - "name": "csp-playground", - "full_name": "threatnix\/csp-playground", - "owner": { - "login": "threatnix", - "id": 63774126, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63774126?v=4", - "html_url": "https:\/\/github.com\/threatnix" - }, - "html_url": "https:\/\/github.com\/threatnix\/csp-playground", - "description": "CSP Playground for CVE-2021-30682", - "fork": false, - "created_at": "2021-10-15T08:10:02Z", - "updated_at": "2022-08-03T09:54:49Z", - "pushed_at": "2022-03-24T07:38:41Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-30955.json b/2021/CVE-2021-30955.json index 66db542aee..d0e60ee77d 100644 --- a/2021/CVE-2021-30955.json +++ b/2021/CVE-2021-30955.json @@ -1,149 +1,4 @@ [ - { - "id": 464524453, - "name": "CVE-2021-30955", - "full_name": "timb-machine-mirrors\/CVE-2021-30955", - "owner": { - "login": "timb-machine-mirrors", - "id": 49810875, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4", - "html_url": "https:\/\/github.com\/timb-machine-mirrors" - }, - "html_url": "https:\/\/github.com\/timb-machine-mirrors\/CVE-2021-30955", - "description": null, - "fork": false, - "created_at": "2022-02-28T14:54:10Z", - "updated_at": "2022-02-28T14:54:22Z", - "pushed_at": "2022-02-28T14:54:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 464663598, - "name": "CVE-2021-30955-POC", - "full_name": "nickorlow\/CVE-2021-30955-POC", - "owner": { - "login": "nickorlow", - "id": 56371027, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56371027?v=4", - "html_url": "https:\/\/github.com\/nickorlow" - }, - "html_url": "https:\/\/github.com\/nickorlow\/CVE-2021-30955-POC", - "description": "Jake Jame's proof of concept wrapped into an iOS app for CVE-2021-30955", - "fork": false, - "created_at": "2022-02-28T22:23:51Z", - "updated_at": "2022-06-01T11:14:21Z", - "pushed_at": "2022-02-28T22:27:53Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 464677668, - "name": "CVE-2021-30955-POC-IPA", - "full_name": "verygenericname\/CVE-2021-30955-POC-IPA", - "owner": { - "login": "verygenericname", - "id": 87825638, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87825638?v=4", - "html_url": "https:\/\/github.com\/verygenericname" - }, - "html_url": "https:\/\/github.com\/verygenericname\/CVE-2021-30955-POC-IPA", - "description": "https:\/\/gist.github.com\/jakeajames\/37f72c58c775bfbdda3aa9575149a8aa compiled into a ipa 15.0-15.2b1", - "fork": false, - "created_at": "2022-02-28T23:28:39Z", - "updated_at": "2022-03-25T17:16:23Z", - "pushed_at": "2022-03-01T11:39:28Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - }, - { - "id": 464887929, - "name": "desc_race", - "full_name": "b1n4r1b01\/desc_race", - "owner": { - "login": "b1n4r1b01", - "id": 46951815, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46951815?v=4", - "html_url": "https:\/\/github.com\/b1n4r1b01" - }, - "html_url": "https:\/\/github.com\/b1n4r1b01\/desc_race", - "description": "iOS 15.1 kernel exploit POC for CVE-2021-30955", - "fork": false, - "created_at": "2022-03-01T12:41:03Z", - "updated_at": "2022-12-20T13:36:56Z", - "pushed_at": "2022-03-01T16:11:31Z", - "stargazers_count": 248, - "watchers_count": 248, - "has_discussions": false, - "forks_count": 47, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 47, - "watchers": 248, - "score": 0 - }, - { - "id": 469611099, - "name": "desc_race_A15", - "full_name": "markie-dev\/desc_race_A15", - "owner": { - "login": "markie-dev", - "id": 34432591, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34432591?v=4", - "html_url": "https:\/\/github.com\/markie-dev" - }, - "html_url": "https:\/\/github.com\/markie-dev\/desc_race_A15", - "description": "CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)", - "fork": false, - "created_at": "2022-03-14T06:42:45Z", - "updated_at": "2022-10-31T06:52:27Z", - "pushed_at": "2022-03-14T07:58:37Z", - "stargazers_count": 47, - "watchers_count": 47, - "has_discussions": false, - "forks_count": 14, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 14, - "watchers": 47, - "score": 0 - }, { "id": 470172833, "name": "desc_race", diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index 291714ede2..ec81772275 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -211,53 +211,6 @@ "watchers": 2, "score": 0 }, - { - "id": 467221883, - "name": "CVE-2021-31166", - "full_name": "mauricelambert\/CVE-2021-31166", - "owner": { - "login": "mauricelambert", - "id": 50479118, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", - "html_url": "https:\/\/github.com\/mauricelambert" - }, - "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-31166", - "description": "CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.", - "fork": false, - "created_at": "2022-03-07T18:56:52Z", - "updated_at": "2022-06-11T23:34:22Z", - "pushed_at": "2022-03-16T21:21:14Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bluescreen", - "crash", - "cve", - "cve-2021-31166", - "denial-of-service", - "dos", - "exploit", - "iis", - "metasploit", - "microsoft", - "nmap", - "payload", - "powershell", - "python3", - "ruby", - "vulnerability", - "webserver" - ], - "visibility": "public", - "forks": 0, - "watchers": 4, - "score": 0 - }, { "id": 569183785, "name": "Home-Demolisher", diff --git a/2021/CVE-2021-31525.json b/2021/CVE-2021-31525.json new file mode 100644 index 0000000000..6068328208 --- /dev/null +++ b/2021/CVE-2021-31525.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668752, + "name": "CVE-2021-31525", + "full_name": "Live-Hack-CVE\/CVE-2021-31525", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-31525", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-31525 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:12Z", + "updated_at": "2022-12-23T22:27:12Z", + "pushed_at": "2022-12-23T22:27:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index ea80d5f48f..e9c2c16c5d 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1344,35 +1344,6 @@ "watchers": 0, "score": 0 }, - { - "id": 466126446, - "name": "CVE-2021-3156", - "full_name": "puckiestyle\/CVE-2021-3156", - "owner": { - "login": "puckiestyle", - "id": 57447087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", - "html_url": "https:\/\/github.com\/puckiestyle" - }, - "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3156", - "description": null, - "fork": false, - "created_at": "2022-03-04T13:06:51Z", - "updated_at": "2022-06-12T04:07:19Z", - "pushed_at": "2022-03-04T13:11:57Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 471181143, "name": "CVE-2021-3156", diff --git a/2021/CVE-2021-32001.json b/2021/CVE-2021-32001.json new file mode 100644 index 0000000000..7c21651673 --- /dev/null +++ b/2021/CVE-2021-32001.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645532, + "name": "CVE-2021-32001", + "full_name": "Live-Hack-CVE\/CVE-2021-32001", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32001", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32001 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:07Z", + "updated_at": "2022-12-23T20:25:07Z", + "pushed_at": "2022-12-23T20:25:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-32099.json b/2021/CVE-2021-32099.json deleted file mode 100644 index 789df14a9c..0000000000 --- a/2021/CVE-2021-32099.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 466400226, - "name": "CVE-2021-32099", - "full_name": "akr3ch\/CVE-2021-32099", - "owner": { - "login": "akr3ch", - "id": 97300177, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97300177?v=4", - "html_url": "https:\/\/github.com\/akr3ch" - }, - "html_url": "https:\/\/github.com\/akr3ch\/CVE-2021-32099", - "description": "CVE-2021-32099", - "fork": false, - "created_at": "2022-03-05T08:53:45Z", - "updated_at": "2022-03-05T08:53:45Z", - "pushed_at": "2022-03-05T09:01:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-32399.json b/2021/CVE-2021-32399.json deleted file mode 100644 index ef48c22af5..0000000000 --- a/2021/CVE-2021-32399.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476675393, - "name": "linux-4.19.72_CVE-2021-32399", - "full_name": "nanopathi\/linux-4.19.72_CVE-2021-32399", - "owner": { - "login": "nanopathi", - "id": 26024136, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26024136?v=4", - "html_url": "https:\/\/github.com\/nanopathi" - }, - "html_url": "https:\/\/github.com\/nanopathi\/linux-4.19.72_CVE-2021-32399", - "description": null, - "fork": false, - "created_at": "2022-04-01T10:29:20Z", - "updated_at": "2022-04-01T10:37:11Z", - "pushed_at": "2022-12-09T13:39:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-32478.json b/2021/CVE-2021-32478.json new file mode 100644 index 0000000000..1f418a9233 --- /dev/null +++ b/2021/CVE-2021-32478.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676432, + "name": "CVE-2021-32478", + "full_name": "Live-Hack-CVE\/CVE-2021-32478", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32478", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32478 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:29Z", + "updated_at": "2022-12-23T23:13:29Z", + "pushed_at": "2022-12-23T23:13:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-32607.json b/2021/CVE-2021-32607.json new file mode 100644 index 0000000000..04cfc45d2d --- /dev/null +++ b/2021/CVE-2021-32607.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668800, + "name": "CVE-2021-32607", + "full_name": "Live-Hack-CVE\/CVE-2021-32607", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32607", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32607 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:31Z", + "updated_at": "2022-12-23T22:27:31Z", + "pushed_at": "2022-12-23T22:27:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-32608.json b/2021/CVE-2021-32608.json new file mode 100644 index 0000000000..7b511505b7 --- /dev/null +++ b/2021/CVE-2021-32608.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668810, + "name": "CVE-2021-32608", + "full_name": "Live-Hack-CVE\/CVE-2021-32608", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32608", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32608 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:34Z", + "updated_at": "2022-12-23T22:27:34Z", + "pushed_at": "2022-12-23T22:27:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-32682.json b/2021/CVE-2021-32682.json new file mode 100644 index 0000000000..e3bf1db1a3 --- /dev/null +++ b/2021/CVE-2021-32682.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668605, + "name": "CVE-2021-32682", + "full_name": "Live-Hack-CVE\/CVE-2021-32682", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32682", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32682 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:26Z", + "updated_at": "2022-12-23T22:26:26Z", + "pushed_at": "2022-12-23T22:26:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-32686.json b/2021/CVE-2021-32686.json new file mode 100644 index 0000000000..085eacd0ad --- /dev/null +++ b/2021/CVE-2021-32686.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627722, + "name": "CVE-2021-32686", + "full_name": "Live-Hack-CVE\/CVE-2021-32686", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32686", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-32686 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:35Z", + "updated_at": "2022-12-23T19:04:35Z", + "pushed_at": "2022-12-23T19:04:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json deleted file mode 100644 index e6ec5e79a2..0000000000 --- a/2021/CVE-2021-33044.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 462035961, - "name": "alonzzzo", - "full_name": "Alonzozzz\/alonzzzo", - "owner": { - "login": "Alonzozzz", - "id": 100165245, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100165245?v=4", - "html_url": "https:\/\/github.com\/Alonzozzz" - }, - "html_url": "https:\/\/github.com\/Alonzozzz\/alonzzzo", - "description": "Changelog CVE-2021-33044,CVE-2021-33045 Identity authentication bypass vulnerability found in some Dahua products CVE-2021-27248,CVE-2021-27249,CVE-2021-27250,CVE-2021-34860,CVE-2021-34861,CVE-2021-34862,CVE-2021-34863 Multiple vulnerabilities in DAP-2020 H\/W rev. Ax with F\/W v1.01 and below HTTP Path Traversal CVE-2019-7406 RCE vulnerability in TP-Link Wi-Fi Extenders via a malformed user agent field in HTTP headers CVE-2020-2501,CVE-2021-28797 Stack Buffer Overflow in QNAP Surveillance Station CVE-2021-34730 Critical UPnP Service Flaw on Cisco Small Business RV Series Routers CVE-2020-35785 Multiple HTTP authentication vulnerabilities on DGN2200v1", - "fork": false, - "created_at": "2022-02-21T21:22:43Z", - "updated_at": "2022-02-21T21:22:43Z", - "pushed_at": "2022-02-21T21:23:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-33064.json b/2021/CVE-2021-33064.json new file mode 100644 index 0000000000..03a3c6646e --- /dev/null +++ b/2021/CVE-2021-33064.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637597, + "name": "CVE-2021-33064", + "full_name": "Live-Hack-CVE\/CVE-2021-33064", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-33064", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-33064 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:10Z", + "updated_at": "2022-12-23T19:48:10Z", + "pushed_at": "2022-12-23T19:48:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33196.json b/2021/CVE-2021-33196.json new file mode 100644 index 0000000000..ac6fc8a29b --- /dev/null +++ b/2021/CVE-2021-33196.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668590, + "name": "CVE-2021-33196", + "full_name": "Live-Hack-CVE\/CVE-2021-33196", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-33196", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-33196 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:20Z", + "updated_at": "2022-12-23T22:26:20Z", + "pushed_at": "2022-12-23T22:26:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3326.json b/2021/CVE-2021-3326.json new file mode 100644 index 0000000000..4832133807 --- /dev/null +++ b/2021/CVE-2021-3326.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682080, + "name": "CVE-2021-3326", + "full_name": "Live-Hack-CVE\/CVE-2021-3326", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3326", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3326 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:29Z", + "updated_at": "2022-12-23T23:51:29Z", + "pushed_at": "2022-12-23T23:51:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-33574.json b/2021/CVE-2021-33574.json new file mode 100644 index 0000000000..984f0cdc7c --- /dev/null +++ b/2021/CVE-2021-33574.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670296, + "name": "CVE-2021-33574", + "full_name": "Live-Hack-CVE\/CVE-2021-33574", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-33574", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-33574 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:40Z", + "updated_at": "2022-12-23T22:35:40Z", + "pushed_at": "2022-12-23T22:35:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34566.json b/2021/CVE-2021-34566.json new file mode 100644 index 0000000000..4865303b4d --- /dev/null +++ b/2021/CVE-2021-34566.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635946, + "name": "CVE-2021-34566", + "full_name": "Live-Hack-CVE\/CVE-2021-34566", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34566", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34566 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:42Z", + "updated_at": "2022-12-23T19:41:42Z", + "pushed_at": "2022-12-23T19:41:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34567.json b/2021/CVE-2021-34567.json new file mode 100644 index 0000000000..711e918357 --- /dev/null +++ b/2021/CVE-2021-34567.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635963, + "name": "CVE-2021-34567", + "full_name": "Live-Hack-CVE\/CVE-2021-34567", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34567", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34567 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:45Z", + "updated_at": "2022-12-23T19:41:45Z", + "pushed_at": "2022-12-23T19:41:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34568.json b/2021/CVE-2021-34568.json new file mode 100644 index 0000000000..bbc8b75f7d --- /dev/null +++ b/2021/CVE-2021-34568.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635976, + "name": "CVE-2021-34568", + "full_name": "Live-Hack-CVE\/CVE-2021-34568", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34568", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34568 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:49Z", + "updated_at": "2022-12-23T19:41:49Z", + "pushed_at": "2022-12-23T19:41:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34569.json b/2021/CVE-2021-34569.json new file mode 100644 index 0000000000..d446ee7369 --- /dev/null +++ b/2021/CVE-2021-34569.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635986, + "name": "CVE-2021-34569", + "full_name": "Live-Hack-CVE\/CVE-2021-34569", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34569", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34569 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:52Z", + "updated_at": "2022-12-23T19:41:52Z", + "pushed_at": "2022-12-23T19:41:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34577.json b/2021/CVE-2021-34577.json new file mode 100644 index 0000000000..cb79992591 --- /dev/null +++ b/2021/CVE-2021-34577.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644903, + "name": "CVE-2021-34577", + "full_name": "Live-Hack-CVE\/CVE-2021-34577", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34577", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34577 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:10Z", + "updated_at": "2022-12-23T20:22:10Z", + "pushed_at": "2022-12-23T20:22:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34579.json b/2021/CVE-2021-34579.json new file mode 100644 index 0000000000..b5fd7135df --- /dev/null +++ b/2021/CVE-2021-34579.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644945, + "name": "CVE-2021-34579", + "full_name": "Live-Hack-CVE\/CVE-2021-34579", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34579", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34579 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:23Z", + "updated_at": "2022-12-23T20:22:23Z", + "pushed_at": "2022-12-23T20:22:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34620.json b/2021/CVE-2021-34620.json new file mode 100644 index 0000000000..9e4dd38f04 --- /dev/null +++ b/2021/CVE-2021-34620.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676832, + "name": "CVE-2021-34620", + "full_name": "Live-Hack-CVE\/CVE-2021-34620", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-34620", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-34620 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:06Z", + "updated_at": "2022-12-23T23:16:06Z", + "pushed_at": "2022-12-23T23:16:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-34824.json b/2021/CVE-2021-34824.json index 59da384a61..f6286e1862 100644 --- a/2021/CVE-2021-34824.json +++ b/2021/CVE-2021-34824.json @@ -13,8 +13,8 @@ "description": "reproducing an old istio bug", "fork": false, "created_at": "2022-12-23T18:19:06Z", - "updated_at": "2022-12-23T18:19:06Z", - "pushed_at": "2022-12-23T18:19:07Z", + "updated_at": "2022-12-23T18:34:58Z", + "pushed_at": "2022-12-23T19:28:24Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2021/CVE-2021-35587.json b/2021/CVE-2021-35587.json deleted file mode 100644 index ccb7f09d0d..0000000000 --- a/2021/CVE-2021-35587.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 469587526, - "name": "CVE-2021-35587", - "full_name": "antx-code\/CVE-2021-35587", - "owner": { - "login": "antx-code", - "id": 7877940, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4", - "html_url": "https:\/\/github.com\/antx-code" - }, - "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-35587", - "description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587", - "fork": false, - "created_at": "2022-03-14T05:03:54Z", - "updated_at": "2022-11-30T05:22:25Z", - "pushed_at": "2022-03-14T05:07:01Z", - "stargazers_count": 37, - "watchers_count": 37, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 37, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 7c5d7f6b5b..0d9ec379b1 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -143,13 +143,13 @@ "stargazers_count": 79, "watchers_count": 79, "has_discussions": false, - "forks_count": 48, + "forks_count": 49, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 48, + "forks": 49, "watchers": 79, "score": 0 }, @@ -269,35 +269,6 @@ "watchers": 2, "score": 0 }, - { - "id": 463667394, - "name": "CVE-2021-3560", - "full_name": "innxrmxst\/CVE-2021-3560", - "owner": { - "login": "innxrmxst", - "id": 43517528, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43517528?v=4", - "html_url": "https:\/\/github.com\/innxrmxst" - }, - "html_url": "https:\/\/github.com\/innxrmxst\/CVE-2021-3560", - "description": null, - "fork": false, - "created_at": "2022-02-25T20:30:31Z", - "updated_at": "2022-11-19T21:44:18Z", - "pushed_at": "2022-02-25T20:31:03Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 487080832, "name": "CVE-2021-3560-Authentication-Agent", diff --git a/2021/CVE-2021-35937.json b/2021/CVE-2021-35937.json new file mode 100644 index 0000000000..90cc820435 --- /dev/null +++ b/2021/CVE-2021-35937.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626772, + "name": "CVE-2021-35937", + "full_name": "Live-Hack-CVE\/CVE-2021-35937", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-35937", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-35937 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:32Z", + "updated_at": "2022-12-23T19:00:32Z", + "pushed_at": "2022-12-23T19:00:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-35942.json b/2021/CVE-2021-35942.json new file mode 100644 index 0000000000..1e430c23c7 --- /dev/null +++ b/2021/CVE-2021-35942.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670286, + "name": "CVE-2021-35942", + "full_name": "Live-Hack-CVE\/CVE-2021-35942", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-35942", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-35942 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:37Z", + "updated_at": "2022-12-23T22:35:37Z", + "pushed_at": "2022-12-23T22:35:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3597.json b/2021/CVE-2021-3597.json new file mode 100644 index 0000000000..87d06acbba --- /dev/null +++ b/2021/CVE-2021-3597.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653812, + "name": "CVE-2021-3597", + "full_name": "Live-Hack-CVE\/CVE-2021-3597", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3597", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3597 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:17Z", + "updated_at": "2022-12-23T21:06:17Z", + "pushed_at": "2022-12-23T21:06:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3629.json b/2021/CVE-2021-3629.json new file mode 100644 index 0000000000..64a09fdb87 --- /dev/null +++ b/2021/CVE-2021-3629.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653829, + "name": "CVE-2021-3629", + "full_name": "Live-Hack-CVE\/CVE-2021-3629", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3629", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3629 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:21Z", + "updated_at": "2022-12-23T21:06:21Z", + "pushed_at": "2022-12-23T21:06:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36317.json b/2021/CVE-2021-36317.json new file mode 100644 index 0000000000..b5c8e3f7e4 --- /dev/null +++ b/2021/CVE-2021-36317.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676333, + "name": "CVE-2021-36317", + "full_name": "Live-Hack-CVE\/CVE-2021-36317", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36317", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36317 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:48Z", + "updated_at": "2022-12-23T23:12:48Z", + "pushed_at": "2022-12-23T23:12:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36318.json b/2021/CVE-2021-36318.json new file mode 100644 index 0000000000..e5af0b701a --- /dev/null +++ b/2021/CVE-2021-36318.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676378, + "name": "CVE-2021-36318", + "full_name": "Live-Hack-CVE\/CVE-2021-36318", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36318", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36318 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:07Z", + "updated_at": "2022-12-23T23:13:07Z", + "pushed_at": "2022-12-23T23:13:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3634.json b/2021/CVE-2021-3634.json new file mode 100644 index 0000000000..7d8c6b2192 --- /dev/null +++ b/2021/CVE-2021-3634.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637049, + "name": "CVE-2021-3634", + "full_name": "Live-Hack-CVE\/CVE-2021-3634", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3634", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3634 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:58Z", + "updated_at": "2022-12-23T19:45:58Z", + "pushed_at": "2022-12-23T19:46:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36369.json b/2021/CVE-2021-36369.json new file mode 100644 index 0000000000..6867a4e231 --- /dev/null +++ b/2021/CVE-2021-36369.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646187, + "name": "CVE-2021-36369", + "full_name": "Live-Hack-CVE\/CVE-2021-36369", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36369", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36369 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:06Z", + "updated_at": "2022-12-23T20:28:06Z", + "pushed_at": "2022-12-23T20:28:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36779.json b/2021/CVE-2021-36779.json new file mode 100644 index 0000000000..1817d650a7 --- /dev/null +++ b/2021/CVE-2021-36779.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654197, + "name": "CVE-2021-36779", + "full_name": "Live-Hack-CVE\/CVE-2021-36779", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36779", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36779 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:12Z", + "updated_at": "2022-12-23T21:08:12Z", + "pushed_at": "2022-12-23T21:08:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36780.json b/2021/CVE-2021-36780.json new file mode 100644 index 0000000000..d68ace76b9 --- /dev/null +++ b/2021/CVE-2021-36780.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654214, + "name": "CVE-2021-36780", + "full_name": "Live-Hack-CVE\/CVE-2021-36780", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36780", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36780 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:15Z", + "updated_at": "2022-12-23T21:08:15Z", + "pushed_at": "2022-12-23T21:08:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36783.json b/2021/CVE-2021-36783.json new file mode 100644 index 0000000000..c7f9d86d88 --- /dev/null +++ b/2021/CVE-2021-36783.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645512, + "name": "CVE-2021-36783", + "full_name": "Live-Hack-CVE\/CVE-2021-36783", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36783", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36783 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:04Z", + "updated_at": "2022-12-23T20:25:04Z", + "pushed_at": "2022-12-23T20:25:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36885.json b/2021/CVE-2021-36885.json new file mode 100644 index 0000000000..7bf1086c7b --- /dev/null +++ b/2021/CVE-2021-36885.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646327, + "name": "CVE-2021-36885", + "full_name": "Live-Hack-CVE\/CVE-2021-36885", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36885", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36885 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:52Z", + "updated_at": "2022-12-23T20:28:52Z", + "pushed_at": "2022-12-23T20:28:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36886.json b/2021/CVE-2021-36886.json new file mode 100644 index 0000000000..be32e5deb3 --- /dev/null +++ b/2021/CVE-2021-36886.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646342, + "name": "CVE-2021-36886", + "full_name": "Live-Hack-CVE\/CVE-2021-36886", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36886", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36886 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:55Z", + "updated_at": "2022-12-23T20:28:55Z", + "pushed_at": "2022-12-23T20:28:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-36906.json b/2021/CVE-2021-36906.json new file mode 100644 index 0000000000..6428eec502 --- /dev/null +++ b/2021/CVE-2021-36906.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683193, + "name": "CVE-2021-36906", + "full_name": "Live-Hack-CVE\/CVE-2021-36906", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-36906", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-36906 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:28Z", + "updated_at": "2022-12-23T23:58:28Z", + "pushed_at": "2022-12-23T23:58:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3717.json b/2021/CVE-2021-3717.json new file mode 100644 index 0000000000..4be139ac8e --- /dev/null +++ b/2021/CVE-2021-3717.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653841, + "name": "CVE-2021-3717", + "full_name": "Live-Hack-CVE\/CVE-2021-3717", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3717", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3717 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:24Z", + "updated_at": "2022-12-23T21:06:24Z", + "pushed_at": "2022-12-23T21:06:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3807.json b/2021/CVE-2021-3807.json new file mode 100644 index 0000000000..c481bae68e --- /dev/null +++ b/2021/CVE-2021-3807.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676468, + "name": "CVE-2021-3807", + "full_name": "Live-Hack-CVE\/CVE-2021-3807", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3807", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3807 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:41Z", + "updated_at": "2022-12-23T23:13:41Z", + "pushed_at": "2022-12-23T23:13:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3864.json b/2021/CVE-2021-3864.json deleted file mode 100644 index ca4ac93a2e..0000000000 --- a/2021/CVE-2021-3864.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 476460097, - "name": "cve-2021-3864", - "full_name": "walac\/cve-2021-3864", - "owner": { - "login": "walac", - "id": 611309, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/611309?v=4", - "html_url": "https:\/\/github.com\/walac" - }, - "html_url": "https:\/\/github.com\/walac\/cve-2021-3864", - "description": "Test for cve-2021-3864", - "fork": false, - "created_at": "2022-03-31T20:03:04Z", - "updated_at": "2022-08-15T15:42:17Z", - "pushed_at": "2022-04-01T20:40:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-38827.json b/2021/CVE-2021-38827.json new file mode 100644 index 0000000000..593372f5f9 --- /dev/null +++ b/2021/CVE-2021-38827.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628104, + "name": "CVE-2021-38827", + "full_name": "Live-Hack-CVE\/CVE-2021-38827", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-38827", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-38827 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:59Z", + "updated_at": "2022-12-23T19:05:59Z", + "pushed_at": "2022-12-23T19:06:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-38828.json b/2021/CVE-2021-38828.json new file mode 100644 index 0000000000..8521b8d27b --- /dev/null +++ b/2021/CVE-2021-38828.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628114, + "name": "CVE-2021-38828", + "full_name": "Live-Hack-CVE\/CVE-2021-38828", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-38828", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-38828 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:02Z", + "updated_at": "2022-12-23T19:06:02Z", + "pushed_at": "2022-12-23T19:06:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-39144.json b/2021/CVE-2021-39144.json new file mode 100644 index 0000000000..b466b1206c --- /dev/null +++ b/2021/CVE-2021-39144.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638204, + "name": "CVE-2021-39144", + "full_name": "Live-Hack-CVE\/CVE-2021-39144", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-39144", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-39144 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:00Z", + "updated_at": "2022-12-23T19:51:00Z", + "pushed_at": "2022-12-23T19:51:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3928.json b/2021/CVE-2021-3928.json new file mode 100644 index 0000000000..f29f6f5d43 --- /dev/null +++ b/2021/CVE-2021-3928.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668910, + "name": "CVE-2021-3928", + "full_name": "Live-Hack-CVE\/CVE-2021-3928", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3928", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3928 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:05Z", + "updated_at": "2022-12-23T22:28:05Z", + "pushed_at": "2022-12-23T22:28:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-39432.json b/2021/CVE-2021-39432.json new file mode 100644 index 0000000000..12711cd3a0 --- /dev/null +++ b/2021/CVE-2021-39432.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677049, + "name": "CVE-2021-39432", + "full_name": "Live-Hack-CVE\/CVE-2021-39432", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-39432", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-39432 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:32Z", + "updated_at": "2022-12-23T23:17:32Z", + "pushed_at": "2022-12-23T23:17:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-39473.json b/2021/CVE-2021-39473.json new file mode 100644 index 0000000000..cd6cc70331 --- /dev/null +++ b/2021/CVE-2021-39473.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677066, + "name": "CVE-2021-39473", + "full_name": "Live-Hack-CVE\/CVE-2021-39473", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-39473", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-39473 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:35Z", + "updated_at": "2022-12-23T23:17:35Z", + "pushed_at": "2022-12-23T23:17:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-39661.json b/2021/CVE-2021-39661.json new file mode 100644 index 0000000000..36f65abc99 --- /dev/null +++ b/2021/CVE-2021-39661.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662793, + "name": "CVE-2021-39661", + "full_name": "Live-Hack-CVE\/CVE-2021-39661", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-39661", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-39661 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:00Z", + "updated_at": "2022-12-23T21:53:00Z", + "pushed_at": "2022-12-23T21:53:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3974.json b/2021/CVE-2021-3974.json new file mode 100644 index 0000000000..d722014291 --- /dev/null +++ b/2021/CVE-2021-3974.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668875, + "name": "CVE-2021-3974", + "full_name": "Live-Hack-CVE\/CVE-2021-3974", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3974", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3974 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:54Z", + "updated_at": "2022-12-23T22:27:54Z", + "pushed_at": "2022-12-23T22:27:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3984.json b/2021/CVE-2021-3984.json new file mode 100644 index 0000000000..7ac9c8993e --- /dev/null +++ b/2021/CVE-2021-3984.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668852, + "name": "CVE-2021-3984", + "full_name": "Live-Hack-CVE\/CVE-2021-3984", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3984", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3984 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:46Z", + "updated_at": "2022-12-23T22:27:46Z", + "pushed_at": "2022-12-23T22:27:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-3998.json b/2021/CVE-2021-3998.json new file mode 100644 index 0000000000..c2df6fddcf --- /dev/null +++ b/2021/CVE-2021-3998.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675753, + "name": "CVE-2021-3998", + "full_name": "Live-Hack-CVE\/CVE-2021-3998", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-3998", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-3998 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:11Z", + "updated_at": "2022-12-23T23:09:11Z", + "pushed_at": "2022-12-23T23:09:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4001.json b/2021/CVE-2021-4001.json new file mode 100644 index 0000000000..3296b2f245 --- /dev/null +++ b/2021/CVE-2021-4001.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636997, + "name": "CVE-2021-4001", + "full_name": "Live-Hack-CVE\/CVE-2021-4001", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4001", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4001 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:45:48Z", + "updated_at": "2022-12-23T19:51:16Z", + "pushed_at": "2022-12-23T19:45:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40017.json b/2021/CVE-2021-40017.json new file mode 100644 index 0000000000..2ee4f904fb --- /dev/null +++ b/2021/CVE-2021-40017.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655294, + "name": "CVE-2021-40017", + "full_name": "Live-Hack-CVE\/CVE-2021-40017", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40017", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40017 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:22Z", + "updated_at": "2022-12-23T21:13:22Z", + "pushed_at": "2022-12-23T21:13:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40158.json b/2021/CVE-2021-40158.json new file mode 100644 index 0000000000..3ded1c7dc6 --- /dev/null +++ b/2021/CVE-2021-40158.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636657, + "name": "CVE-2021-40158", + "full_name": "Live-Hack-CVE\/CVE-2021-40158", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40158", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40158 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:29Z", + "updated_at": "2022-12-23T19:44:29Z", + "pushed_at": "2022-12-23T19:44:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40159.json b/2021/CVE-2021-40159.json new file mode 100644 index 0000000000..a79f92ebee --- /dev/null +++ b/2021/CVE-2021-40159.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636597, + "name": "CVE-2021-40159", + "full_name": "Live-Hack-CVE\/CVE-2021-40159", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40159", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40159 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:12Z", + "updated_at": "2022-12-23T19:44:12Z", + "pushed_at": "2022-12-23T19:44:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4019.json b/2021/CVE-2021-4019.json new file mode 100644 index 0000000000..05f972b078 --- /dev/null +++ b/2021/CVE-2021-4019.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668864, + "name": "CVE-2021-4019", + "full_name": "Live-Hack-CVE\/CVE-2021-4019", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4019", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4019 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:50Z", + "updated_at": "2022-12-23T22:27:50Z", + "pushed_at": "2022-12-23T22:27:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40226.json b/2021/CVE-2021-40226.json new file mode 100644 index 0000000000..b7b7b8ad40 --- /dev/null +++ b/2021/CVE-2021-40226.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637988, + "name": "CVE-2021-40226", + "full_name": "Live-Hack-CVE\/CVE-2021-40226", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40226", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40226 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:59Z", + "updated_at": "2022-12-23T19:49:59Z", + "pushed_at": "2022-12-23T19:50:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40272.json b/2021/CVE-2021-40272.json new file mode 100644 index 0000000000..11e6fcdc0e --- /dev/null +++ b/2021/CVE-2021-40272.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626473, + "name": "CVE-2021-40272", + "full_name": "Live-Hack-CVE\/CVE-2021-40272", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40272", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40272 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:21Z", + "updated_at": "2022-12-23T18:59:21Z", + "pushed_at": "2022-12-23T18:59:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40289.json b/2021/CVE-2021-40289.json new file mode 100644 index 0000000000..b0488cbf3c --- /dev/null +++ b/2021/CVE-2021-40289.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638381, + "name": "CVE-2021-40289", + "full_name": "Live-Hack-CVE\/CVE-2021-40289", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40289", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40289 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:38Z", + "updated_at": "2022-12-23T19:51:38Z", + "pushed_at": "2022-12-23T19:51:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40303.json b/2021/CVE-2021-40303.json index 0733ea5e06..bf992b2d65 100644 --- a/2021/CVE-2021-40303.json +++ b/2021/CVE-2021-40303.json @@ -27,5 +27,34 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 581668958, + "name": "CVE-2021-40303", + "full_name": "Live-Hack-CVE\/CVE-2021-40303", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40303", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40303 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:17Z", + "updated_at": "2022-12-23T22:28:17Z", + "pushed_at": "2022-12-23T22:28:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40330.json b/2021/CVE-2021-40330.json new file mode 100644 index 0000000000..cc5765a3ef --- /dev/null +++ b/2021/CVE-2021-40330.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676481, + "name": "CVE-2021-40330", + "full_name": "Live-Hack-CVE\/CVE-2021-40330", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40330", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40330 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:48Z", + "updated_at": "2022-12-23T23:13:48Z", + "pushed_at": "2022-12-23T23:13:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 80acb2a42c..c831ee4ce0 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -122,35 +122,6 @@ "watchers": 0, "score": 0 }, - { - "id": 452430809, - "name": "CVE-2021-4034", - "full_name": "nobelh\/CVE-2021-4034", - "owner": { - "login": "nobelh", - "id": 42378484, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42378484?v=4", - "html_url": "https:\/\/github.com\/nobelh" - }, - "html_url": "https:\/\/github.com\/nobelh\/CVE-2021-4034", - "description": "Polkit pkexec CVE-2021-4034 Proof Of Concept and Patching", - "fork": false, - "created_at": "2022-01-26T20:32:10Z", - "updated_at": "2022-02-08T20:59:44Z", - "pushed_at": "2022-03-03T21:20:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 0, - "score": 0 - }, { "id": 452715280, "name": "poppy", @@ -214,35 +185,6 @@ "watchers": 325, "score": 0 }, - { - "id": 452783558, - "name": "CVE-2021-4034", - "full_name": "c3c\/CVE-2021-4034", - "owner": { - "login": "c3c", - "id": 2326945, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2326945?v=4", - "html_url": "https:\/\/github.com\/c3c" - }, - "html_url": "https:\/\/github.com\/c3c\/CVE-2021-4034", - "description": "Pre-compiled builds for CVE-2021-4034", - "fork": false, - "created_at": "2022-01-27T17:43:24Z", - "updated_at": "2022-12-21T10:26:52Z", - "pushed_at": "2022-03-30T15:38:20Z", - "stargazers_count": 12, - "watchers_count": 12, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 8, - "watchers": 12, - "score": 0 - }, { "id": 453053476, "name": "PwnKit-CVE-2021-4034", @@ -330,47 +272,6 @@ "watchers": 1, "score": 0 }, - { - "id": 453510021, - "name": "ez-pwnkit", - "full_name": "OXDBXKXO\/ez-pwnkit", - "owner": { - "login": "OXDBXKXO", - "id": 18035000, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18035000?v=4", - "html_url": "https:\/\/github.com\/OXDBXKXO" - }, - "html_url": "https:\/\/github.com\/OXDBXKXO\/ez-pwnkit", - "description": "Go implementation of the PwnKit Linux Local Privilege Escalation exploit (CVE-2021-4034)", - "fork": false, - "created_at": "2022-01-29T20:24:43Z", - "updated_at": "2022-11-09T18:15:13Z", - "pushed_at": "2022-02-23T21:54:41Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2021-4034", - "exploit", - "go", - "golang", - "golang-package", - "linux", - "local-privilege-escalation", - "lpe", - "pkexec", - "pwnkit" - ], - "visibility": "public", - "forks": 2, - "watchers": 4, - "score": 0 - }, { "id": 455655673, "name": "CVE-2021-4034", @@ -434,276 +335,6 @@ "watchers": 2, "score": 0 }, - { - "id": 459341469, - "name": "codeql-sample-polkit", - "full_name": "hohn\/codeql-sample-polkit", - "owner": { - "login": "hohn", - "id": 2253228, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253228?v=4", - "html_url": "https:\/\/github.com\/hohn" - }, - "html_url": "https:\/\/github.com\/hohn\/codeql-sample-polkit", - "description": "All stages of exploring the polkit CVE-2021-4034 using codeql", - "fork": false, - "created_at": "2022-02-14T22:09:44Z", - "updated_at": "2022-04-06T21:01:41Z", - "pushed_at": "2022-03-15T18:42:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 461568164, - "name": "CVE-2021-4034_POC", - "full_name": "JoaoFukuda\/CVE-2021-4034_POC", - "owner": { - "login": "JoaoFukuda", - "id": 37672942, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37672942?v=4", - "html_url": "https:\/\/github.com\/JoaoFukuda" - }, - "html_url": "https:\/\/github.com\/JoaoFukuda\/CVE-2021-4034_POC", - "description": "Proof Of Concept for the 2021's pkexec vulnerability CVE-2021-4034", - "fork": false, - "created_at": "2022-02-20T17:49:21Z", - "updated_at": "2022-02-21T12:40:31Z", - "pushed_at": "2022-02-20T17:52:36Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 461952795, - "name": "CVE-2021-4034", - "full_name": "Tanmay-N\/CVE-2021-4034", - "owner": { - "login": "Tanmay-N", - "id": 36262050, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36262050?v=4", - "html_url": "https:\/\/github.com\/Tanmay-N" - }, - "html_url": "https:\/\/github.com\/Tanmay-N\/CVE-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-02-21T16:54:38Z", - "updated_at": "2022-02-21T16:57:30Z", - "pushed_at": "2022-02-21T17:06:58Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 463357145, - "name": "CVE-2021-4034", - "full_name": "hahaleyile\/CVE-2021-4034", - "owner": { - "login": "hahaleyile", - "id": 38727644, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4", - "html_url": "https:\/\/github.com\/hahaleyile" - }, - "html_url": "https:\/\/github.com\/hahaleyile\/CVE-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-02-25T01:30:09Z", - "updated_at": "2022-06-22T02:55:05Z", - "pushed_at": "2022-02-25T01:30:55Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 464340102, - "name": "PwnKit-CVE-2021-4034", - "full_name": "movvamrocks\/PwnKit-CVE-2021-4034", - "owner": { - "login": "movvamrocks", - "id": 22263143, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22263143?v=4", - "html_url": "https:\/\/github.com\/movvamrocks" - }, - "html_url": "https:\/\/github.com\/movvamrocks\/PwnKit-CVE-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-02-28T04:41:40Z", - "updated_at": "2022-02-28T04:46:26Z", - "pushed_at": "2022-02-28T04:46:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 465309758, - "name": "CVE-2021-4034", - "full_name": "Squirre17\/CVE-2021-4034", - "owner": { - "login": "Squirre17", - "id": 79578430, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79578430?v=4", - "html_url": "https:\/\/github.com\/Squirre17" - }, - "html_url": "https:\/\/github.com\/Squirre17\/CVE-2021-4034", - "description": "polkit-pkexec local privilege escalation vulnerability", - "fork": false, - "created_at": "2022-03-02T13:07:00Z", - "updated_at": "2022-03-02T13:18:31Z", - "pushed_at": "2022-03-02T13:19:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 465839695, - "name": "make_me_root", - "full_name": "Jesrat\/make_me_root", - "owner": { - "login": "Jesrat", - "id": 18082153, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18082153?v=4", - "html_url": "https:\/\/github.com\/Jesrat" - }, - "html_url": "https:\/\/github.com\/Jesrat\/make_me_root", - "description": "CVE-2021-4034", - "fork": false, - "created_at": "2022-03-03T18:29:11Z", - "updated_at": "2022-03-03T19:40:05Z", - "pushed_at": "2022-03-03T19:40:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 465973416, - "name": "cve-2021-4034", - "full_name": "defhacks\/cve-2021-4034", - "owner": { - "login": "defhacks", - "id": 4090053, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4090053?v=4", - "html_url": "https:\/\/github.com\/defhacks" - }, - "html_url": "https:\/\/github.com\/defhacks\/cve-2021-4034", - "description": "port of CVE-2021-4034 exploit to Rust\/cargo for my own edification", - "fork": false, - "created_at": "2022-03-04T03:47:53Z", - "updated_at": "2022-07-04T19:12:02Z", - "pushed_at": "2022-03-04T05:32:29Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, - { - "id": 466178605, - "name": "CVE-2021-4034-exploit", - "full_name": "PentesterSoham\/CVE-2021-4034-exploit", - "owner": { - "login": "PentesterSoham", - "id": 96686822, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96686822?v=4", - "html_url": "https:\/\/github.com\/PentesterSoham" - }, - "html_url": "https:\/\/github.com\/PentesterSoham\/CVE-2021-4034-exploit", - "description": "I am not the real author of this exploits.. There are two exploits available, use any of one if it doesn't work use another one... Manual for this two exploit has given in README file. Please read that file before using it.. :) ", - "fork": false, - "created_at": "2022-03-04T15:41:12Z", - "updated_at": "2022-08-16T11:11:01Z", - "pushed_at": "2022-03-04T15:49:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2021-4034", - "exploit", - "exploitation", - "exploits", - "hacking", - "poc", - "vulnerability" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 466553344, "name": "pwnkit-pwn", @@ -743,180 +374,6 @@ "watchers": 3, "score": 0 }, - { - "id": 467743719, - "name": "CVE-2021-4034-bug-root", - "full_name": "bakhtiyarsierad\/CVE-2021-4034-bug-root", - "owner": { - "login": "bakhtiyarsierad", - "id": 7570307, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7570307?v=4", - "html_url": "https:\/\/github.com\/bakhtiyarsierad" - }, - "html_url": "https:\/\/github.com\/bakhtiyarsierad\/CVE-2021-4034-bug-root", - "description": null, - "fork": false, - "created_at": "2022-03-09T02:04:07Z", - "updated_at": "2022-03-09T02:04:19Z", - "pushed_at": "2022-03-09T02:04:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 467844609, - "name": "Polkit-s-Pkexec-CVE-2021-4034", - "full_name": "ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034", - "owner": { - "login": "ITMarcin2211", - "id": 60057530, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4", - "html_url": "https:\/\/github.com\/ITMarcin2211" - }, - "html_url": "https:\/\/github.com\/ITMarcin2211\/Polkit-s-Pkexec-CVE-2021-4034", - "description": "Polkit's Pkexec CVE-2021-4034 Proof Of Concept and Patching", - "fork": false, - "created_at": "2022-03-09T08:44:02Z", - "updated_at": "2022-03-09T08:51:49Z", - "pushed_at": "2022-03-09T08:54:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 468150219, - "name": "CVE-2021-4034-Linux", - "full_name": "edsonjt81\/CVE-2021-4034-Linux", - "owner": { - "login": "edsonjt81", - "id": 27496739, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4", - "html_url": "https:\/\/github.com\/edsonjt81" - }, - "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2021-4034-Linux", - "description": null, - "fork": false, - "created_at": "2022-03-10T01:24:14Z", - "updated_at": "2022-03-10T01:24:25Z", - "pushed_at": "2022-03-10T01:24:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469303038, - "name": "CVE-2021-4034", - "full_name": "Kashiki078\/CVE-2021-4034", - "owner": { - "login": "Kashiki078", - "id": 33626505, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33626505?v=4", - "html_url": "https:\/\/github.com\/Kashiki078" - }, - "html_url": "https:\/\/github.com\/Kashiki078\/CVE-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-03-13T07:40:56Z", - "updated_at": "2022-03-13T07:44:14Z", - "pushed_at": "2022-03-13T07:44:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469486171, - "name": "pwnkit-vulnerability", - "full_name": "nel0x\/pwnkit-vulnerability", - "owner": { - "login": "nel0x", - "id": 87320197, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87320197?v=4", - "html_url": "https:\/\/github.com\/nel0x" - }, - "html_url": "https:\/\/github.com\/nel0x\/pwnkit-vulnerability", - "description": "CVE-2021-4034 (PWNKIT).", - "fork": false, - "created_at": "2022-03-13T20:24:59Z", - "updated_at": "2022-06-06T12:15:58Z", - "pushed_at": "2022-03-13T20:25:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469927703, - "name": "CVE-2021-4034", - "full_name": "TomSgn\/CVE-2021-4034", - "owner": { - "login": "TomSgn", - "id": 62591045, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62591045?v=4", - "html_url": "https:\/\/github.com\/TomSgn" - }, - "html_url": "https:\/\/github.com\/TomSgn\/CVE-2021-4034", - "description": "pkexec --> privilege escalation", - "fork": false, - "created_at": "2022-03-14T22:42:49Z", - "updated_at": "2022-03-15T00:22:54Z", - "pushed_at": "2022-03-14T22:47:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 470778554, "name": "CVE-2021-4034", @@ -949,64 +406,6 @@ "watchers": 0, "score": 0 }, - { - "id": 473151472, - "name": "berdav-CVE-2021-4034", - "full_name": "TheJoyOfHacking\/berdav-CVE-2021-4034", - "owner": { - "login": "TheJoyOfHacking", - "id": 99463221, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4", - "html_url": "https:\/\/github.com\/TheJoyOfHacking" - }, - "html_url": "https:\/\/github.com\/TheJoyOfHacking\/berdav-CVE-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-03-23T11:08:20Z", - "updated_at": "2022-05-06T15:35:05Z", - "pushed_at": "2022-03-23T11:08:33Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, - { - "id": 474372121, - "name": "CVE-2021-4034", - "full_name": "tzwlhack\/CVE-2021-4034", - "owner": { - "login": "tzwlhack", - "id": 86322859, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86322859?v=4", - "html_url": "https:\/\/github.com\/tzwlhack" - }, - "html_url": "https:\/\/github.com\/tzwlhack\/CVE-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-03-26T14:30:11Z", - "updated_at": "2022-03-26T14:30:22Z", - "pushed_at": "2022-03-26T14:30:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 474844468, "name": "CVE-2021-4034", @@ -1036,35 +435,6 @@ "watchers": 0, "score": 0 }, - { - "id": 475232490, - "name": "f_poc_cve-2021-4034", - "full_name": "jcatala\/f_poc_cve-2021-4034", - "owner": { - "login": "jcatala", - "id": 23392306, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23392306?v=4", - "html_url": "https:\/\/github.com\/jcatala" - }, - "html_url": "https:\/\/github.com\/jcatala\/f_poc_cve-2021-4034", - "description": null, - "fork": false, - "created_at": "2022-03-29T01:06:32Z", - "updated_at": "2022-03-31T21:39:25Z", - "pushed_at": "2022-03-30T21:12:43Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 476850767, "name": "PwnKit", diff --git a/2021/CVE-2021-40345.json b/2021/CVE-2021-40345.json index 16c79aa840..4c094cee92 100644 --- a/2021/CVE-2021-40345.json +++ b/2021/CVE-2021-40345.json @@ -27,5 +27,34 @@ "forks": 1, "watchers": 0, "score": 0 + }, + { + "id": 581670572, + "name": "CVE-2021-40345", + "full_name": "Live-Hack-CVE\/CVE-2021-40345", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40345", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40345 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:19Z", + "updated_at": "2022-12-23T22:37:19Z", + "pushed_at": "2022-12-23T22:37:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40348.json b/2021/CVE-2021-40348.json new file mode 100644 index 0000000000..d388184db8 --- /dev/null +++ b/2021/CVE-2021-40348.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646545, + "name": "CVE-2021-40348", + "full_name": "Live-Hack-CVE\/CVE-2021-40348", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40348", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40348 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:00Z", + "updated_at": "2022-12-23T20:30:00Z", + "pushed_at": "2022-12-23T20:30:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40369.json b/2021/CVE-2021-40369.json new file mode 100644 index 0000000000..775cfd8879 --- /dev/null +++ b/2021/CVE-2021-40369.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661378, + "name": "CVE-2021-40369", + "full_name": "Live-Hack-CVE\/CVE-2021-40369", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40369", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40369 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:38Z", + "updated_at": "2022-12-23T21:45:38Z", + "pushed_at": "2022-12-23T21:45:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40373.json b/2021/CVE-2021-40373.json deleted file mode 100644 index 75fc760fb7..0000000000 --- a/2021/CVE-2021-40373.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 401705362, - "name": "CVE-2021-40373", - "full_name": "maikroservice\/CVE-2021-40373", - "owner": { - "login": "maikroservice", - "id": 20245897, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20245897?v=4", - "html_url": "https:\/\/github.com\/maikroservice" - }, - "html_url": "https:\/\/github.com\/maikroservice\/CVE-2021-40373", - "description": "CVE-2021-40373 - remote code execution", - "fork": false, - "created_at": "2021-08-31T13:03:10Z", - "updated_at": "2022-03-24T09:34:07Z", - "pushed_at": "2022-03-24T09:34:04Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json deleted file mode 100644 index 2878c251a6..0000000000 --- a/2021/CVE-2021-40449.json +++ /dev/null @@ -1,60 +0,0 @@ -[ - { - "id": 461544780, - "name": "CVE-2021-40449-NtGdiResetDC-UAF", - "full_name": "BL0odz\/CVE-2021-40449-NtGdiResetDC-UAF", - "owner": { - "login": "BL0odz", - "id": 38938632, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38938632?v=4", - "html_url": "https:\/\/github.com\/BL0odz" - }, - "html_url": "https:\/\/github.com\/BL0odz\/CVE-2021-40449-NtGdiResetDC-UAF", - "description": null, - "fork": false, - "created_at": "2022-02-20T16:23:26Z", - "updated_at": "2022-11-09T18:15:22Z", - "pushed_at": "2022-02-20T16:34:32Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 6, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 6, - "watchers": 8, - "score": 0 - }, - { - "id": 466221042, - "name": "voidmap", - "full_name": "SamuelTulach\/voidmap", - "owner": { - "login": "SamuelTulach", - "id": 16323119, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16323119?v=4", - "html_url": "https:\/\/github.com\/SamuelTulach" - }, - "html_url": "https:\/\/github.com\/SamuelTulach\/voidmap", - "description": "Using CVE-2021-40449 to manual map kernel mode driver", - "fork": false, - "created_at": "2022-03-04T17:55:52Z", - "updated_at": "2022-12-17T02:47:24Z", - "pushed_at": "2022-03-05T18:34:25Z", - "stargazers_count": 55, - "watchers_count": 55, - "has_discussions": false, - "forks_count": 27, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 27, - "watchers": 55, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-4069.json b/2021/CVE-2021-4069.json new file mode 100644 index 0000000000..e7490a9d13 --- /dev/null +++ b/2021/CVE-2021-4069.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668837, + "name": "CVE-2021-4069", + "full_name": "Live-Hack-CVE\/CVE-2021-4069", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4069", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4069 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:42Z", + "updated_at": "2022-12-23T22:27:42Z", + "pushed_at": "2022-12-23T22:27:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40776.json b/2021/CVE-2021-40776.json new file mode 100644 index 0000000000..e637a8ed59 --- /dev/null +++ b/2021/CVE-2021-40776.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676529, + "name": "CVE-2021-40776", + "full_name": "Live-Hack-CVE\/CVE-2021-40776", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-40776", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-40776 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:06Z", + "updated_at": "2022-12-23T23:14:06Z", + "pushed_at": "2022-12-23T23:14:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-40875.json b/2021/CVE-2021-40875.json deleted file mode 100644 index 6a5a59beb0..0000000000 --- a/2021/CVE-2021-40875.json +++ /dev/null @@ -1,35 +0,0 @@ -[ - { - "id": 463282170, - "name": "TestRail-files.md5-IAC-scanner", - "full_name": "Lul\/TestRail-files.md5-IAC-scanner", - "owner": { - "login": "Lul", - "id": 59487177, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59487177?v=4", - "html_url": "https:\/\/github.com\/Lul" - }, - "html_url": "https:\/\/github.com\/Lul\/TestRail-files.md5-IAC-scanner", - "description": "Python scanner for TestRail servers vulnerable to CVE-2021-40875", - "fork": false, - "created_at": "2022-02-24T19:52:01Z", - "updated_at": "2022-02-25T01:56:15Z", - "pushed_at": "2022-02-28T14:53:40Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-40875", - "python3", - "testrail" - ], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-41073.json b/2021/CVE-2021-41073.json deleted file mode 100644 index 277bfed4c6..0000000000 --- a/2021/CVE-2021-41073.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 465436142, - "name": "Linux_LPE_io_uring_CVE-2021-41073", - "full_name": "chompie1337\/Linux_LPE_io_uring_CVE-2021-41073", - "owner": { - "login": "chompie1337", - "id": 56364411, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56364411?v=4", - "html_url": "https:\/\/github.com\/chompie1337" - }, - "html_url": "https:\/\/github.com\/chompie1337\/Linux_LPE_io_uring_CVE-2021-41073", - "description": null, - "fork": false, - "created_at": "2022-03-02T19:07:37Z", - "updated_at": "2022-12-17T06:43:09Z", - "pushed_at": "2022-03-08T15:37:34Z", - "stargazers_count": 85, - "watchers_count": 85, - "has_discussions": false, - "forks_count": 17, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 17, - "watchers": 85, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-41141.json b/2021/CVE-2021-41141.json new file mode 100644 index 0000000000..c5945f3fd5 --- /dev/null +++ b/2021/CVE-2021-41141.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627654, + "name": "CVE-2021-41141", + "full_name": "Live-Hack-CVE\/CVE-2021-41141", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41141", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41141 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:16Z", + "updated_at": "2022-12-23T19:04:16Z", + "pushed_at": "2022-12-23T19:04:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41159.json b/2021/CVE-2021-41159.json new file mode 100644 index 0000000000..e9a2283c5d --- /dev/null +++ b/2021/CVE-2021-41159.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682911, + "name": "CVE-2021-41159", + "full_name": "Live-Hack-CVE\/CVE-2021-41159", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41159", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41159 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:33Z", + "updated_at": "2022-12-23T23:56:33Z", + "pushed_at": "2022-12-23T23:56:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41182.json b/2021/CVE-2021-41182.json new file mode 100644 index 0000000000..83defd71fe --- /dev/null +++ b/2021/CVE-2021-41182.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676718, + "name": "CVE-2021-41182", + "full_name": "Live-Hack-CVE\/CVE-2021-41182", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41182", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41182 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:18Z", + "updated_at": "2022-12-23T23:15:18Z", + "pushed_at": "2022-12-23T23:15:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41183.json b/2021/CVE-2021-41183.json new file mode 100644 index 0000000000..596c6c8fb7 --- /dev/null +++ b/2021/CVE-2021-41183.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676822, + "name": "CVE-2021-41183", + "full_name": "Live-Hack-CVE\/CVE-2021-41183", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41183", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41183 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:02Z", + "updated_at": "2022-12-23T23:16:02Z", + "pushed_at": "2022-12-23T23:16:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41184.json b/2021/CVE-2021-41184.json index 93df7f2da9..5ebd9b2a32 100644 --- a/2021/CVE-2021-41184.json +++ b/2021/CVE-2021-41184.json @@ -27,5 +27,34 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 581676736, + "name": "CVE-2021-41184", + "full_name": "Live-Hack-CVE\/CVE-2021-41184", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41184", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41184 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:24Z", + "updated_at": "2022-12-23T23:15:24Z", + "pushed_at": "2022-12-23T23:15:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41229.json b/2021/CVE-2021-41229.json new file mode 100644 index 0000000000..99f493eb2d --- /dev/null +++ b/2021/CVE-2021-41229.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676634, + "name": "CVE-2021-41229", + "full_name": "Live-Hack-CVE\/CVE-2021-41229", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41229", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41229 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:45Z", + "updated_at": "2022-12-23T23:14:45Z", + "pushed_at": "2022-12-23T23:14:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41277.json b/2021/CVE-2021-41277.json index 08588b1c2d..09c55909dc 100644 --- a/2021/CVE-2021-41277.json +++ b/2021/CVE-2021-41277.json @@ -27,34 +27,5 @@ "forks": 1, "watchers": 4, "score": 0 - }, - { - "id": 468638331, - "name": "CVE-2021-41277", - "full_name": "Chen-ling-afk\/CVE-2021-41277", - "owner": { - "login": "Chen-ling-afk", - "id": 76235286, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76235286?v=4", - "html_url": "https:\/\/github.com\/Chen-ling-afk" - }, - "html_url": "https:\/\/github.com\/Chen-ling-afk\/CVE-2021-41277", - "description": "MetaBase 任意文件读取", - "fork": false, - "created_at": "2022-03-11T06:39:38Z", - "updated_at": "2022-08-25T14:19:45Z", - "pushed_at": "2022-03-11T07:48:18Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-41313.json b/2021/CVE-2021-41313.json new file mode 100644 index 0000000000..30527a11c3 --- /dev/null +++ b/2021/CVE-2021-41313.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628882, + "name": "CVE-2021-41313", + "full_name": "Live-Hack-CVE\/CVE-2021-41313", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41313", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41313 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:21Z", + "updated_at": "2022-12-23T19:09:21Z", + "pushed_at": "2022-12-23T19:09:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41338.json b/2021/CVE-2021-41338.json deleted file mode 100644 index 833be672e3..0000000000 --- a/2021/CVE-2021-41338.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 472963061, - "name": "firewall-cve", - "full_name": "Mario-Kart-Felix\/firewall-cve", - "owner": { - "login": "Mario-Kart-Felix", - "id": 76971465, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76971465?v=4", - "html_url": "https:\/\/github.com\/Mario-Kart-Felix" - }, - "html_url": "https:\/\/github.com\/Mario-Kart-Felix\/firewall-cve", - "description": "Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability CVE-2021-41338 Security Vulnerability Released: Oct 12, 2021 Assigning CNA: Microsoft MITRE CVE-2021-41338 CVSS:3.1 5.5 \/ 5.0 Attack Vector Local Attack Complexity Low Privileges Required Low User Interaction None Scope Unchanged Confidentiality High Integrity None Availability None Exploit Code Maturity Proof-of-Concept Remediation Level Official Fix Report Confidence Confirmed Please see Common Vulnerability Scoring System for more information on the definition of these metrics. Exploitability The following table provides an exploitability assessment for this vulnerability at the time of original publication. Yes No Exploitation Less Likely", - "fork": false, - "created_at": "2022-03-22T22:53:32Z", - "updated_at": "2022-03-22T22:56:29Z", - "pushed_at": "2022-03-29T02:29:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-41381.json b/2021/CVE-2021-41381.json new file mode 100644 index 0000000000..37b6471dac --- /dev/null +++ b/2021/CVE-2021-41381.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638191, + "name": "CVE-2021-41381", + "full_name": "Live-Hack-CVE\/CVE-2021-41381", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41381", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41381 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:57Z", + "updated_at": "2022-12-23T19:50:57Z", + "pushed_at": "2022-12-23T19:50:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4160.json b/2021/CVE-2021-4160.json new file mode 100644 index 0000000000..087e9964c8 --- /dev/null +++ b/2021/CVE-2021-4160.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661715, + "name": "CVE-2021-4160", + "full_name": "Live-Hack-CVE\/CVE-2021-4160", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4160", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4160 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:31Z", + "updated_at": "2022-12-23T21:47:31Z", + "pushed_at": "2022-12-23T21:47:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41771.json b/2021/CVE-2021-41771.json new file mode 100644 index 0000000000..ca153e6a74 --- /dev/null +++ b/2021/CVE-2021-41771.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661413, + "name": "CVE-2021-41771", + "full_name": "Live-Hack-CVE\/CVE-2021-41771", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-41771", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-41771 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:48Z", + "updated_at": "2022-12-23T21:45:48Z", + "pushed_at": "2022-12-23T21:45:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 7c54a7aad3..e098f24fe0 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -238,259 +238,6 @@ "watchers": 0, "score": 0 }, - { - "id": 464271089, - "name": "CVE-2021-41773", - "full_name": "skentagon\/CVE-2021-41773", - "owner": { - "login": "skentagon", - "id": 49702576, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49702576?v=4", - "html_url": "https:\/\/github.com\/skentagon" - }, - "html_url": "https:\/\/github.com\/skentagon\/CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2022-02-27T22:39:58Z", - "updated_at": "2022-03-04T00:11:58Z", - "pushed_at": "2022-03-04T00:05:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 467687901, - "name": "CVE-2021-41773", - "full_name": "mauricelambert\/CVE-2021-41773", - "owner": { - "login": "mauricelambert", - "id": 50479118, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", - "html_url": "https:\/\/github.com\/mauricelambert" - }, - "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773", - "description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.", - "fork": false, - "created_at": "2022-03-08T21:55:53Z", - "updated_at": "2022-03-23T16:56:34Z", - "pushed_at": "2022-03-14T07:34:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2021-41773", - "detection", - "exploit", - "metasploit", - "nmap", - "python3", - "rce", - "ruby", - "scanner", - "vulnerability" - ], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0 - }, - { - "id": 468909402, - "name": "CVE-2021-41773", - "full_name": "the29a\/CVE-2021-41773", - "owner": { - "login": "the29a", - "id": 4436697, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4436697?v=4", - "html_url": "https:\/\/github.com\/the29a" - }, - "html_url": "https:\/\/github.com\/the29a\/CVE-2021-41773", - "description": "Small PoC of CVE-2021-41773", - "fork": false, - "created_at": "2022-03-11T21:50:35Z", - "updated_at": "2022-03-11T21:52:35Z", - "pushed_at": "2022-03-11T22:10:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469203660, - "name": "CVE-2021-41773", - "full_name": "thehackersbrain\/CVE-2021-41773", - "owner": { - "login": "thehackersbrain", - "id": 36809025, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36809025?v=4", - "html_url": "https:\/\/github.com\/thehackersbrain" - }, - "html_url": "https:\/\/github.com\/thehackersbrain\/CVE-2021-41773", - "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", - "fork": false, - "created_at": "2022-03-12T21:24:55Z", - "updated_at": "2022-11-21T15:34:17Z", - "pushed_at": "2022-03-12T21:30:58Z", - "stargazers_count": 58, - "watchers_count": 58, - "has_discussions": false, - "forks_count": 24, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "apache2", - "cve-2021-41773", - "exploit", - "gauravraj", - "lfi", - "python", - "rce", - "thehackersbrain" - ], - "visibility": "public", - "forks": 24, - "watchers": 58, - "score": 0 - }, - { - "id": 469576020, - "name": "CVE-2021-41773", - "full_name": "honypot\/CVE-2021-41773", - "owner": { - "login": "honypot", - "id": 101309325, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", - "html_url": "https:\/\/github.com\/honypot" - }, - "html_url": "https:\/\/github.com\/honypot\/CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2022-03-14T04:08:56Z", - "updated_at": "2022-03-14T04:09:11Z", - "pushed_at": "2022-03-14T04:09:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469821841, - "name": "CVE-2021-41773", - "full_name": "Fa1c0n35\/CVE-2021-41773", - "owner": { - "login": "Fa1c0n35", - "id": 33335488, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", - "html_url": "https:\/\/github.com\/Fa1c0n35" - }, - "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2022-03-14T16:43:49Z", - "updated_at": "2022-03-14T16:44:00Z", - "pushed_at": "2022-03-14T16:43:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 474747864, - "name": "CVE-2021-41773-", - "full_name": "Evil-d0Zz\/CVE-2021-41773-", - "owner": { - "login": "Evil-d0Zz", - "id": 80478753, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80478753?v=4", - "html_url": "https:\/\/github.com\/Evil-d0Zz" - }, - "html_url": "https:\/\/github.com\/Evil-d0Zz\/CVE-2021-41773-", - "description": null, - "fork": false, - "created_at": "2022-03-27T20:10:30Z", - "updated_at": "2022-03-27T20:10:30Z", - "pushed_at": "2022-03-27T20:10:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 474963195, - "name": "CVE-2021-41773", - "full_name": "puckiestyle\/CVE-2021-41773", - "owner": { - "login": "puckiestyle", - "id": 57447087, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4", - "html_url": "https:\/\/github.com\/puckiestyle" - }, - "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2022-03-28T11:02:46Z", - "updated_at": "2022-03-28T11:03:00Z", - "pushed_at": "2022-03-28T11:41:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 475931011, "name": "CVE-2021-41773", @@ -520,35 +267,6 @@ "watchers": 0, "score": 0 }, - { - "id": 476112666, - "name": "Reserch-CVE-2021-41773", - "full_name": "DoTuan1\/Reserch-CVE-2021-41773", - "owner": { - "login": "DoTuan1", - "id": 63194321, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63194321?v=4", - "html_url": "https:\/\/github.com\/DoTuan1" - }, - "html_url": "https:\/\/github.com\/DoTuan1\/Reserch-CVE-2021-41773", - "description": null, - "fork": false, - "created_at": "2022-03-31T01:48:33Z", - "updated_at": "2022-03-31T01:54:45Z", - "pushed_at": "2022-03-31T03:03:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 477111512, "name": "netsec-polygon", diff --git a/2021/CVE-2021-4181.json b/2021/CVE-2021-4181.json new file mode 100644 index 0000000000..8130c3784d --- /dev/null +++ b/2021/CVE-2021-4181.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682167, + "name": "CVE-2021-4181", + "full_name": "Live-Hack-CVE\/CVE-2021-4181", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4181", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4181 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:58Z", + "updated_at": "2022-12-23T23:51:58Z", + "pushed_at": "2022-12-23T23:52:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4182.json b/2021/CVE-2021-4182.json new file mode 100644 index 0000000000..d2631f93ec --- /dev/null +++ b/2021/CVE-2021-4182.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682156, + "name": "CVE-2021-4182", + "full_name": "Live-Hack-CVE\/CVE-2021-4182", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4182", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4182 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:55Z", + "updated_at": "2022-12-23T23:51:55Z", + "pushed_at": "2022-12-23T23:51:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4183.json b/2021/CVE-2021-4183.json new file mode 100644 index 0000000000..6efbcaa6e2 --- /dev/null +++ b/2021/CVE-2021-4183.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682133, + "name": "CVE-2021-4183", + "full_name": "Live-Hack-CVE\/CVE-2021-4183", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4183", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4183 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:48Z", + "updated_at": "2022-12-23T23:51:48Z", + "pushed_at": "2022-12-23T23:51:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4184.json b/2021/CVE-2021-4184.json new file mode 100644 index 0000000000..bb94313596 --- /dev/null +++ b/2021/CVE-2021-4184.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682128, + "name": "CVE-2021-4184", + "full_name": "Live-Hack-CVE\/CVE-2021-4184", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4184", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4184 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:45Z", + "updated_at": "2022-12-23T23:51:45Z", + "pushed_at": "2022-12-23T23:51:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4185.json b/2021/CVE-2021-4185.json new file mode 100644 index 0000000000..f6b5deb0b4 --- /dev/null +++ b/2021/CVE-2021-4185.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682396, + "name": "CVE-2021-4185", + "full_name": "Live-Hack-CVE\/CVE-2021-4185", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4185", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4185 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:28Z", + "updated_at": "2022-12-23T23:53:29Z", + "pushed_at": "2022-12-23T23:53:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4186.json b/2021/CVE-2021-4186.json new file mode 100644 index 0000000000..2d41668f2e --- /dev/null +++ b/2021/CVE-2021-4186.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682121, + "name": "CVE-2021-4186", + "full_name": "Live-Hack-CVE\/CVE-2021-4186", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4186", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4186 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:42Z", + "updated_at": "2022-12-23T23:51:42Z", + "pushed_at": "2022-12-23T23:51:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4190.json b/2021/CVE-2021-4190.json new file mode 100644 index 0000000000..e3daa0c008 --- /dev/null +++ b/2021/CVE-2021-4190.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682146, + "name": "CVE-2021-4190", + "full_name": "Live-Hack-CVE\/CVE-2021-4190", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4190", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4190 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:52Z", + "updated_at": "2022-12-23T23:51:52Z", + "pushed_at": "2022-12-23T23:51:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4192.json b/2021/CVE-2021-4192.json new file mode 100644 index 0000000000..3cfcf64df7 --- /dev/null +++ b/2021/CVE-2021-4192.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668821, + "name": "CVE-2021-4192", + "full_name": "Live-Hack-CVE\/CVE-2021-4192", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4192", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4192 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:27:38Z", + "updated_at": "2022-12-23T22:27:38Z", + "pushed_at": "2022-12-23T22:27:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-4193.json b/2021/CVE-2021-4193.json new file mode 100644 index 0000000000..c42816ba2a --- /dev/null +++ b/2021/CVE-2021-4193.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668903, + "name": "CVE-2021-4193", + "full_name": "Live-Hack-CVE\/CVE-2021-4193", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4193", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4193 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:01Z", + "updated_at": "2022-12-23T22:28:01Z", + "pushed_at": "2022-12-23T22:28:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 769f06957f..8329d988aa 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -86,105 +86,6 @@ "watchers": 1, "score": 0 }, - { - "id": 466011549, - "name": "CVE-2022-22947-Spring-Cloud-Gateway", - "full_name": "tangxiaofeng7\/CVE-2022-22947-Spring-Cloud-Gateway", - "owner": { - "login": "tangxiaofeng7", - "id": 45926593, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4", - "html_url": "https:\/\/github.com\/tangxiaofeng7" - }, - "html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2022-22947-Spring-Cloud-Gateway", - "description": "CVE-2021-42013批量", - "fork": false, - "created_at": "2022-03-04T06:38:26Z", - "updated_at": "2022-11-09T18:15:27Z", - "pushed_at": "2022-03-04T10:49:00Z", - "stargazers_count": 67, - "watchers_count": 67, - "has_discussions": false, - "forks_count": 22, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 22, - "watchers": 67, - "score": 0 - }, - { - "id": 467686191, - "name": "CVE-2021-42013", - "full_name": "mauricelambert\/CVE-2021-42013", - "owner": { - "login": "mauricelambert", - "id": 50479118, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", - "html_url": "https:\/\/github.com\/mauricelambert" - }, - "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-42013", - "description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.", - "fork": false, - "created_at": "2022-03-08T21:48:40Z", - "updated_at": "2022-03-23T16:46:10Z", - "pushed_at": "2022-03-14T07:36:49Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve", - "cve-2021-42013", - "detection", - "exploit", - "metasploit", - "nmap", - "python3", - "rce", - "ruby", - "scanner", - "vulnerability" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 469575892, - "name": "CVE-2021-42013", - "full_name": "honypot\/CVE-2021-42013", - "owner": { - "login": "honypot", - "id": 101309325, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", - "html_url": "https:\/\/github.com\/honypot" - }, - "html_url": "https:\/\/github.com\/honypot\/CVE-2021-42013", - "description": null, - "fork": false, - "created_at": "2022-03-14T04:08:24Z", - "updated_at": "2022-03-14T04:20:42Z", - "pushed_at": "2022-03-14T04:08:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 479265759, "name": "CVE-2021-42013", diff --git a/2021/CVE-2021-4204.json b/2021/CVE-2021-4204.json deleted file mode 100644 index 4cb4cb604d..0000000000 --- a/2021/CVE-2021-4204.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 463038208, - "name": "CVE-2021-4204", - "full_name": "tr3ee\/CVE-2021-4204", - "owner": { - "login": "tr3ee", - "id": 26628940, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26628940?v=4", - "html_url": "https:\/\/github.com\/tr3ee" - }, - "html_url": "https:\/\/github.com\/tr3ee\/CVE-2021-4204", - "description": "CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation", - "fork": false, - "created_at": "2022-02-24T06:43:56Z", - "updated_at": "2022-11-09T18:15:23Z", - "pushed_at": "2022-03-19T06:32:50Z", - "stargazers_count": 56, - "watchers_count": 56, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 56, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-4214.json b/2021/CVE-2021-4214.json new file mode 100644 index 0000000000..0def314904 --- /dev/null +++ b/2021/CVE-2021-4214.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675736, + "name": "CVE-2021-4214", + "full_name": "Live-Hack-CVE\/CVE-2021-4214", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-4214", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-4214 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:01Z", + "updated_at": "2022-12-23T23:09:01Z", + "pushed_at": "2022-12-23T23:09:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42205.json b/2021/CVE-2021-42205.json new file mode 100644 index 0000000000..b9e1ee6b75 --- /dev/null +++ b/2021/CVE-2021-42205.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661758, + "name": "CVE-2021-42205", + "full_name": "Live-Hack-CVE\/CVE-2021-42205", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-42205", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-42205 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:44Z", + "updated_at": "2022-12-23T21:47:44Z", + "pushed_at": "2022-12-23T21:47:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42612.json b/2021/CVE-2021-42612.json new file mode 100644 index 0000000000..81ce132493 --- /dev/null +++ b/2021/CVE-2021-42612.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682619, + "name": "CVE-2021-42612", + "full_name": "Live-Hack-CVE\/CVE-2021-42612", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-42612", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-42612 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:43Z", + "updated_at": "2022-12-23T23:54:43Z", + "pushed_at": "2022-12-23T23:54:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42613.json b/2021/CVE-2021-42613.json new file mode 100644 index 0000000000..459f1c4d79 --- /dev/null +++ b/2021/CVE-2021-42613.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682664, + "name": "CVE-2021-42613", + "full_name": "Live-Hack-CVE\/CVE-2021-42613", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-42613", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-42613 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:01Z", + "updated_at": "2022-12-23T23:55:02Z", + "pushed_at": "2022-12-23T23:55:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42614.json b/2021/CVE-2021-42614.json new file mode 100644 index 0000000000..8a97daa5db --- /dev/null +++ b/2021/CVE-2021-42614.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682613, + "name": "CVE-2021-42614", + "full_name": "Live-Hack-CVE\/CVE-2021-42614", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-42614", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-42614 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:40Z", + "updated_at": "2022-12-23T23:54:40Z", + "pushed_at": "2022-12-23T23:54:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42662.json b/2021/CVE-2021-42662.json deleted file mode 100644 index 13e3e2da6a..0000000000 --- a/2021/CVE-2021-42662.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424326946, - "name": "CVE-2021-42662", - "full_name": "0xDeku\/CVE-2021-42662", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42662", - "description": "CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. ", - "fork": false, - "created_at": "2021-11-03T17:51:55Z", - "updated_at": "2022-04-24T13:55:02Z", - "pushed_at": "2022-03-24T18:08:34Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42663.json b/2021/CVE-2021-42663.json deleted file mode 100644 index 9d7738b020..0000000000 --- a/2021/CVE-2021-42663.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424343690, - "name": "CVE-2021-42663", - "full_name": "0xDeku\/CVE-2021-42663", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42663", - "description": "CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. ", - "fork": false, - "created_at": "2021-11-03T18:49:28Z", - "updated_at": "2022-04-24T13:55:00Z", - "pushed_at": "2022-03-24T18:09:07Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42664.json b/2021/CVE-2021-42664.json deleted file mode 100644 index 74d30a5e95..0000000000 --- a/2021/CVE-2021-42664.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424354876, - "name": "CVE-2021-42664", - "full_name": "0xDeku\/CVE-2021-42664", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42664", - "description": " CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.", - "fork": false, - "created_at": "2021-11-03T19:29:57Z", - "updated_at": "2022-04-24T13:54:56Z", - "pushed_at": "2022-03-24T18:09:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42665.json b/2021/CVE-2021-42665.json deleted file mode 100644 index 7303ed93d8..0000000000 --- a/2021/CVE-2021-42665.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424362612, - "name": "CVE-2021-42665", - "full_name": "0xDeku\/CVE-2021-42665", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42665", - "description": "CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. ", - "fork": false, - "created_at": "2021-11-03T19:58:58Z", - "updated_at": "2022-04-24T13:54:54Z", - "pushed_at": "2022-03-24T18:09:50Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42666.json b/2021/CVE-2021-42666.json deleted file mode 100644 index 7107a53fd8..0000000000 --- a/2021/CVE-2021-42666.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424367205, - "name": "CVE-2021-42666", - "full_name": "0xDeku\/CVE-2021-42666", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42666", - "description": "CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. ", - "fork": false, - "created_at": "2021-11-03T20:14:58Z", - "updated_at": "2022-04-24T13:54:53Z", - "pushed_at": "2022-03-24T18:10:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42667.json b/2021/CVE-2021-42667.json deleted file mode 100644 index 9856fd1014..0000000000 --- a/2021/CVE-2021-42667.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424371514, - "name": "CVE-2021-42667", - "full_name": "0xDeku\/CVE-2021-42667", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42667", - "description": "CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.", - "fork": false, - "created_at": "2021-11-03T20:31:30Z", - "updated_at": "2022-04-24T13:54:52Z", - "pushed_at": "2022-03-24T18:10:23Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42668.json b/2021/CVE-2021-42668.json deleted file mode 100644 index 391dcb459e..0000000000 --- a/2021/CVE-2021-42668.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424374708, - "name": "CVE-2021-42668", - "full_name": "0xDeku\/CVE-2021-42668", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42668", - "description": "CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. ", - "fork": false, - "created_at": "2021-11-03T20:43:30Z", - "updated_at": "2022-04-24T13:54:50Z", - "pushed_at": "2022-03-24T18:11:35Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42670.json b/2021/CVE-2021-42670.json deleted file mode 100644 index 339f36877e..0000000000 --- a/2021/CVE-2021-42670.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424385119, - "name": "CVE-2021-42670", - "full_name": "0xDeku\/CVE-2021-42670", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42670", - "description": "CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. ", - "fork": false, - "created_at": "2021-11-03T21:25:43Z", - "updated_at": "2022-04-24T13:54:49Z", - "pushed_at": "2022-03-24T18:12:05Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42671.json b/2021/CVE-2021-42671.json deleted file mode 100644 index 06b860ae7e..0000000000 --- a/2021/CVE-2021-42671.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 424387160, - "name": "CVE-2021-42671", - "full_name": "0xDeku\/CVE-2021-42671", - "owner": { - "login": "0xDeku", - "id": 93016131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4", - "html_url": "https:\/\/github.com\/0xDeku" - }, - "html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42671", - "description": "CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. ", - "fork": false, - "created_at": "2021-11-03T21:34:23Z", - "updated_at": "2022-04-24T13:54:43Z", - "pushed_at": "2022-03-24T18:12:27Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42739.json b/2021/CVE-2021-42739.json new file mode 100644 index 0000000000..bbd5de663c --- /dev/null +++ b/2021/CVE-2021-42739.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676278, + "name": "CVE-2021-42739", + "full_name": "Live-Hack-CVE\/CVE-2021-42739", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-42739", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-42739 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:28Z", + "updated_at": "2022-12-23T23:12:28Z", + "pushed_at": "2022-12-23T23:12:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42948.json b/2021/CVE-2021-42948.json deleted file mode 100644 index bd5a9ba50f..0000000000 --- a/2021/CVE-2021-42948.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 461312246, - "name": "HotelDruid-CVE-2021-42948", - "full_name": "dhammon\/HotelDruid-CVE-2021-42948", - "owner": { - "login": "dhammon", - "id": 69738058, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69738058?v=4", - "html_url": "https:\/\/github.com\/dhammon" - }, - "html_url": "https:\/\/github.com\/dhammon\/HotelDruid-CVE-2021-42948", - "description": null, - "fork": false, - "created_at": "2022-02-19T21:01:12Z", - "updated_at": "2022-02-19T21:01:12Z", - "pushed_at": "2022-02-19T21:01:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-42949.json b/2021/CVE-2021-42949.json deleted file mode 100644 index d931e16b37..0000000000 --- a/2021/CVE-2021-42949.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 461312502, - "name": "HotelDruid-CVE-2021-42949", - "full_name": "dhammon\/HotelDruid-CVE-2021-42949", - "owner": { - "login": "dhammon", - "id": 69738058, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69738058?v=4", - "html_url": "https:\/\/github.com\/dhammon" - }, - "html_url": "https:\/\/github.com\/dhammon\/HotelDruid-CVE-2021-42949", - "description": null, - "fork": false, - "created_at": "2022-02-19T21:02:42Z", - "updated_at": "2022-02-19T21:02:42Z", - "pushed_at": "2022-02-19T21:03:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-43400.json b/2021/CVE-2021-43400.json new file mode 100644 index 0000000000..c54c56e478 --- /dev/null +++ b/2021/CVE-2021-43400.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676766, + "name": "CVE-2021-43400", + "full_name": "Live-Hack-CVE\/CVE-2021-43400", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-43400", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-43400 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:38Z", + "updated_at": "2022-12-23T23:15:38Z", + "pushed_at": "2022-12-23T23:15:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index d9c2d28c7c..f89e5ac2a9 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -1,33 +1,4 @@ [ - { - "id": 439241226, - "name": "CVE-2021-43798-Grafana", - "full_name": "k3rwin\/CVE-2021-43798-Grafana", - "owner": { - "login": "k3rwin", - "id": 59213152, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4", - "html_url": "https:\/\/github.com\/k3rwin" - }, - "html_url": "https:\/\/github.com\/k3rwin\/CVE-2021-43798-Grafana", - "description": "CVE-2021-43798 Grafana任意文件读取", - "fork": false, - "created_at": "2021-12-17T07:03:32Z", - "updated_at": "2022-03-13T10:04:41Z", - "pushed_at": "2022-03-16T04:33:37Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 463472397, "name": "GrafanaDirInclusion", @@ -57,35 +28,6 @@ "watchers": 0, "score": 0 }, - { - "id": 465654847, - "name": "grafana-cve-2021-43798", - "full_name": "yasin-cs-ko-ak\/grafana-cve-2021-43798", - "owner": { - "login": "yasin-cs-ko-ak", - "id": 92008211, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92008211?v=4", - "html_url": "https:\/\/github.com\/yasin-cs-ko-ak" - }, - "html_url": "https:\/\/github.com\/yasin-cs-ko-ak\/grafana-cve-2021-43798", - "description": "This repository contains files for reproducing the vulnerability.", - "fork": false, - "created_at": "2022-03-03T09:37:46Z", - "updated_at": "2022-03-03T09:37:46Z", - "pushed_at": "2022-03-03T09:42:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 547929236, "name": "CVE-2021-43798", diff --git a/2021/CVE-2021-43936.json b/2021/CVE-2021-43936.json deleted file mode 100644 index 0ba183b390..0000000000 --- a/2021/CVE-2021-43936.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 437671075, - "name": "CVE-2021-43936", - "full_name": "LongWayHomie\/CVE-2021-43936", - "owner": { - "login": "LongWayHomie", - "id": 63229183, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4", - "html_url": "https:\/\/github.com\/LongWayHomie" - }, - "html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43936", - "description": "CVE-2021-43936 is a critical vulnerability (CVSS3 10.0) leading to Remote Code Execution (RCE) in WebHMI Firmware.", - "fork": false, - "created_at": "2021-12-12T22:31:00Z", - "updated_at": "2022-07-05T01:05:23Z", - "pushed_at": "2022-03-29T11:41:00Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 7, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 7, - "watchers": 8, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-43946.json b/2021/CVE-2021-43946.json new file mode 100644 index 0000000000..f6fb33f7af --- /dev/null +++ b/2021/CVE-2021-43946.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646560, + "name": "CVE-2021-43946", + "full_name": "Live-Hack-CVE\/CVE-2021-43946", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-43946", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-43946 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:03Z", + "updated_at": "2022-12-23T20:30:03Z", + "pushed_at": "2022-12-23T20:30:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-43980.json b/2021/CVE-2021-43980.json new file mode 100644 index 0000000000..21d2bb0221 --- /dev/null +++ b/2021/CVE-2021-43980.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655317, + "name": "CVE-2021-43980", + "full_name": "Live-Hack-CVE\/CVE-2021-43980", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-43980", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-43980 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:28Z", + "updated_at": "2022-12-23T21:13:28Z", + "pushed_at": "2022-12-23T21:13:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-44132.json b/2021/CVE-2021-44132.json deleted file mode 100644 index 81517abf87..0000000000 --- a/2021/CVE-2021-44132.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 463667316, - "name": "CVE-2021-44132", - "full_name": "exploitwritter\/CVE-2021-44132", - "owner": { - "login": "exploitwritter", - "id": 47488127, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47488127?v=4", - "html_url": "https:\/\/github.com\/exploitwritter" - }, - "html_url": "https:\/\/github.com\/exploitwritter\/CVE-2021-44132", - "description": "This script exploits a vulnerability in the OMCISHELL object for C-DATA proprietary routers such as BESTCOMs.", - "fork": false, - "created_at": "2022-02-25T20:30:05Z", - "updated_at": "2022-03-08T02:55:07Z", - "pushed_at": "2022-02-25T20:31:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-44142.json b/2021/CVE-2021-44142.json index b97c2e7037..6373a1acd0 100644 --- a/2021/CVE-2021-44142.json +++ b/2021/CVE-2021-44142.json @@ -1,62 +1,4 @@ [ - { - "id": 475550985, - "name": "Samba-CVE-2021-44142", - "full_name": "hrsman\/Samba-CVE-2021-44142", - "owner": { - "login": "hrsman", - "id": 102617131, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102617131?v=4", - "html_url": "https:\/\/github.com\/hrsman" - }, - "html_url": "https:\/\/github.com\/hrsman\/Samba-CVE-2021-44142", - "description": null, - "fork": false, - "created_at": "2022-03-29T17:32:25Z", - "updated_at": "2022-03-29T18:25:12Z", - "pushed_at": "2022-03-29T20:43:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 475582400, - "name": "CVE-2021-44142", - "full_name": "horizon3ai\/CVE-2021-44142", - "owner": { - "login": "horizon3ai", - "id": 79593994, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", - "html_url": "https:\/\/github.com\/horizon3ai" - }, - "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2021-44142", - "description": null, - "fork": false, - "created_at": "2022-03-29T19:03:38Z", - "updated_at": "2022-11-12T13:55:19Z", - "pushed_at": "2022-03-29T20:47:13Z", - "stargazers_count": 8, - "watchers_count": 8, - "has_discussions": false, - "forks_count": 4, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 4, - "watchers": 8, - "score": 0 - }, { "id": 484298524, "name": "CVE-2021-44142", diff --git a/2021/CVE-2021-44217.json b/2021/CVE-2021-44217.json deleted file mode 100644 index c442a00fe1..0000000000 --- a/2021/CVE-2021-44217.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 431676694, - "name": "CVE-2021-44217", - "full_name": "Hyperkopite\/CVE-2021-44217", - "owner": { - "login": "Hyperkopite", - "id": 9525971, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9525971?v=4", - "html_url": "https:\/\/github.com\/Hyperkopite" - }, - "html_url": "https:\/\/github.com\/Hyperkopite\/CVE-2021-44217", - "description": null, - "fork": false, - "created_at": "2021-11-25T01:24:58Z", - "updated_at": "2021-11-25T05:02:36Z", - "pushed_at": "2022-02-26T18:38:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 777c26b22a..e0bd1084ba 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -268,47 +268,6 @@ "watchers": 4, "score": 0 }, - { - "id": 437419010, - "name": "log4j-detector", - "full_name": "mergebase\/log4j-detector", - "owner": { - "login": "mergebase", - "id": 73667397, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4", - "html_url": "https:\/\/github.com\/mergebase" - }, - "html_url": "https:\/\/github.com\/mergebase\/log4j-detector", - "description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!", - "fork": false, - "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2022-12-17T07:29:40Z", - "pushed_at": "2022-03-10T18:44:50Z", - "stargazers_count": 621, - "watchers_count": 621, - "has_discussions": false, - "forks_count": 99, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-44228", - "cve-2021-45046", - "cve-2021-45105", - "cybersecurity", - "detector", - "log4j", - "log4shell", - "pentest", - "sca", - "scanner", - "vulnerability-scanner" - ], - "visibility": "public", - "forks": 99, - "watchers": 621, - "score": 0 - }, { "id": 437426386, "name": "hotpatch-for-apache-log4j2", @@ -338,76 +297,6 @@ "watchers": 493, "score": 0 }, - { - "id": 437526168, - "name": "Log4JShell-Bytecode-Detector", - "full_name": "CodeShield-Security\/Log4JShell-Bytecode-Detector", - "owner": { - "login": "CodeShield-Security", - "id": 60257643, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60257643?v=4", - "html_url": "https:\/\/github.com\/CodeShield-Security" - }, - "html_url": "https:\/\/github.com\/CodeShield-Security\/Log4JShell-Bytecode-Detector", - "description": "Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)", - "fork": false, - "created_at": "2021-12-12T11:28:34Z", - "updated_at": "2022-04-23T02:10:51Z", - "pushed_at": "2022-02-23T19:10:53Z", - "stargazers_count": 49, - "watchers_count": 49, - "has_discussions": false, - "forks_count": 8, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bytecode", - "cve-2021-44228", - "log4j2", - "log4jshell", - "log4shell", - "scanner", - "security" - ], - "visibility": "public", - "forks": 8, - "watchers": 49, - "score": 0 - }, - { - "id": 437586734, - "name": "horrors-log4shell", - "full_name": "tasooshi\/horrors-log4shell", - "owner": { - "login": "tasooshi", - "id": 44586478, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44586478?v=4", - "html_url": "https:\/\/github.com\/tasooshi" - }, - "html_url": "https:\/\/github.com\/tasooshi\/horrors-log4shell", - "description": "A micro lab for CVE-2021-44228 (log4j)", - "fork": false, - "created_at": "2021-12-12T15:44:49Z", - "updated_at": "2022-03-15T19:14:39Z", - "pushed_at": "2022-02-22T00:27:58Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-44228", - "log4j", - "log4shell" - ], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0 - }, { "id": 437663314, "name": "log4j-poc", @@ -530,35 +419,6 @@ "watchers": 2, "score": 0 }, - { - "id": 437847140, - "name": "Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228", - "full_name": "LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228", - "owner": { - "login": "LutziGoz", - "id": 45577616, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45577616?v=4", - "html_url": "https:\/\/github.com\/LutziGoz" - }, - "html_url": "https:\/\/github.com\/LutziGoz\/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2021-12-13T11:29:57Z", - "updated_at": "2022-08-14T12:05:18Z", - "pushed_at": "2022-02-22T00:21:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 437888133, "name": "f5-waf-quick-patch-cve-2021-44228", @@ -588,35 +448,6 @@ "watchers": 2, "score": 0 }, - { - "id": 437937629, - "name": "log4j-CVE-2021-44228", - "full_name": "tobiasoed\/log4j-CVE-2021-44228", - "owner": { - "login": "tobiasoed", - "id": 12912943, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12912943?v=4", - "html_url": "https:\/\/github.com\/tobiasoed" - }, - "html_url": "https:\/\/github.com\/tobiasoed\/log4j-CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2021-12-13T16:04:54Z", - "updated_at": "2021-12-21T02:30:06Z", - "pushed_at": "2022-02-21T23:45:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 438034703, "name": "log4shell-tools", @@ -689,83 +520,6 @@ "watchers": 359, "score": 0 }, - { - "id": 438418716, - "name": "log4shell-finder", - "full_name": "HynekPetrak\/log4shell-finder", - "owner": { - "login": "HynekPetrak", - "id": 8593983, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8593983?v=4", - "html_url": "https:\/\/github.com\/HynekPetrak" - }, - "html_url": "https:\/\/github.com\/HynekPetrak\/log4shell-finder", - "description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.", - "fork": false, - "created_at": "2021-12-14T22:27:14Z", - "updated_at": "2022-12-16T09:07:56Z", - "pushed_at": "2022-02-23T00:44:17Z", - "stargazers_count": 32, - "watchers_count": 32, - "has_discussions": false, - "forks_count": 10, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2017-5645", - "cve-2019-17571", - "cve-2020-9488", - "cve-2021-4104", - "cve-2021-42550", - "cve-2021-44228", - "cve-2021-44832", - "cve-2021-45046", - "cve-2021-45105", - "cve-2022-23302", - "cve-2022-23305", - "cve-2022-23307", - "log4j", - "log4j2", - "log4shell", - "scanner", - "security", - "vulnerability" - ], - "visibility": "public", - "forks": 10, - "watchers": 32, - "score": 0 - }, - { - "id": 438432868, - "name": "CVE-2021-44228_scanner", - "full_name": "CERTCC\/CVE-2021-44228_scanner", - "owner": { - "login": "CERTCC", - "id": 37221555, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37221555?v=4", - "html_url": "https:\/\/github.com\/CERTCC" - }, - "html_url": "https:\/\/github.com\/CERTCC\/CVE-2021-44228_scanner", - "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", - "fork": false, - "created_at": "2021-12-14T23:33:51Z", - "updated_at": "2022-12-09T22:14:13Z", - "pushed_at": "2022-03-23T18:12:51Z", - "stargazers_count": 343, - "watchers_count": 343, - "has_discussions": false, - "forks_count": 94, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 94, - "watchers": 343, - "score": 0 - }, { "id": 438689577, "name": "Log4j", @@ -828,40 +582,6 @@ "watchers": 1, "score": 0 }, - { - "id": 438773632, - "name": "Log4Shell-Honeypot", - "full_name": "michaelsanford\/Log4Shell-Honeypot", - "owner": { - "login": "michaelsanford", - "id": 1800499, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1800499?v=4", - "html_url": "https:\/\/github.com\/michaelsanford" - }, - "html_url": "https:\/\/github.com\/michaelsanford\/Log4Shell-Honeypot", - "description": "Dockerized honeypot for CVE-2021-44228.", - "fork": false, - "created_at": "2021-12-15T21:09:00Z", - "updated_at": "2022-08-07T20:26:05Z", - "pushed_at": "2022-10-28T08:28:06Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "cve-2021-44228", - "docker", - "honeypot", - "python" - ], - "visibility": "public", - "forks": 0, - "watchers": 3, - "score": 0 - }, { "id": 438791130, "name": "Log4Pot", @@ -920,35 +640,6 @@ "watchers": 3, "score": 0 }, - { - "id": 439018822, - "name": "log4j-filescan", - "full_name": "andalik\/log4j-filescan", - "owner": { - "login": "andalik", - "id": 12278569, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12278569?v=4", - "html_url": "https:\/\/github.com\/andalik" - }, - "html_url": "https:\/\/github.com\/andalik\/log4j-filescan", - "description": "Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)", - "fork": false, - "created_at": "2021-12-16T14:29:05Z", - "updated_at": "2022-03-05T22:52:28Z", - "pushed_at": "2022-03-05T23:01:15Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - }, { "id": 439129728, "name": "CVE-2021-44228", @@ -1007,35 +698,6 @@ "watchers": 1, "score": 0 }, - { - "id": 439496578, - "name": "PowerShell-Log4J-Scanner", - "full_name": "DANSI\/PowerShell-Log4J-Scanner", - "owner": { - "login": "DANSI", - "id": 4057240, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4057240?v=4", - "html_url": "https:\/\/github.com\/DANSI" - }, - "html_url": "https:\/\/github.com\/DANSI\/PowerShell-Log4J-Scanner", - "description": "can find, analyse and patch Log4J files because of CVE-2021-44228, CVE-2021-45046", - "fork": false, - "created_at": "2021-12-18T00:51:46Z", - "updated_at": "2021-12-31T13:32:41Z", - "pushed_at": "2022-03-29T21:43:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 440220972, "name": "CVE-2021-44228---detection-with-PowerShell", @@ -1065,74 +727,6 @@ "watchers": 0, "score": 0 }, - { - "id": 440261792, - "name": "TekiumLog4jApp", - "full_name": "erickrr-bd\/TekiumLog4jApp", - "owner": { - "login": "erickrr-bd", - "id": 77643346, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77643346?v=4", - "html_url": "https:\/\/github.com\/erickrr-bd" - }, - "html_url": "https:\/\/github.com\/erickrr-bd\/TekiumLog4jApp", - "description": "Java application vulnerable to CVE-2021-44228", - "fork": false, - "created_at": "2021-12-20T17:59:56Z", - "updated_at": "2022-02-15T20:16:38Z", - "pushed_at": "2022-03-01T00:00:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "app", - "cve-2021-44228", - "docker", - "exploitation", - "java", - "jndi", - "log4j2", - "security", - "vulnerability" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 440722343, - "name": "Log4Shell-CVE-2021-44228-Demo", - "full_name": "BabooPan\/Log4Shell-CVE-2021-44228-Demo", - "owner": { - "login": "BabooPan", - "id": 16317991, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16317991?v=4", - "html_url": "https:\/\/github.com\/BabooPan" - }, - "html_url": "https:\/\/github.com\/BabooPan\/Log4Shell-CVE-2021-44228-Demo", - "description": "Log4Shell Demo with AWS", - "fork": false, - "created_at": "2021-12-22T03:34:40Z", - "updated_at": "2021-12-24T08:56:47Z", - "pushed_at": "2022-03-28T06:49:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 441470836, "name": "Log4jUnifi", @@ -1191,66 +785,6 @@ "watchers": 5, "score": 0 }, - { - "id": 441545718, - "name": "log4shell-vulnerable-app", - "full_name": "bsigouin\/log4shell-vulnerable-app", - "owner": { - "login": "bsigouin", - "id": 48130586, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48130586?v=4", - "html_url": "https:\/\/github.com\/bsigouin" - }, - "html_url": "https:\/\/github.com\/bsigouin\/log4shell-vulnerable-app", - "description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.", - "fork": false, - "created_at": "2021-12-24T20:00:12Z", - "updated_at": "2022-01-06T13:31:29Z", - "pushed_at": "2022-12-23T17:04:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 442033629, - "name": "ModSec-log4j2", - "full_name": "felipe8398\/ModSec-log4j2", - "owner": { - "login": "felipe8398", - "id": 24979677, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24979677?v=4", - "html_url": "https:\/\/github.com\/felipe8398" - }, - "html_url": "https:\/\/github.com\/felipe8398\/ModSec-log4j2", - "description": "Regra ModSec para proteção log4j2 - CVE-2021-44228", - "fork": false, - "created_at": "2021-12-27T02:53:24Z", - "updated_at": "2022-06-19T02:08:13Z", - "pushed_at": "2022-03-10T22:09:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "docker" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 442073643, "name": "log4j-vulnerability", @@ -1280,64 +814,6 @@ "watchers": 0, "score": 0 }, - { - "id": 442217104, - "name": "l4s_poc", - "full_name": "s-retlaw\/l4s_poc", - "owner": { - "login": "s-retlaw", - "id": 73955369, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73955369?v=4", - "html_url": "https:\/\/github.com\/s-retlaw" - }, - "html_url": "https:\/\/github.com\/s-retlaw\/l4s_poc", - "description": "Log4Shell (Cve-2021-44228) Proof Of Concept", - "fork": false, - "created_at": "2021-12-27T16:45:58Z", - "updated_at": "2022-01-04T14:50:09Z", - "pushed_at": "2022-10-05T19:03:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 444275342, - "name": "4jfinder.github.io", - "full_name": "4jfinder\/4jfinder.github.io", - "owner": { - "login": "4jfinder", - "id": 97116800, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97116800?v=4", - "html_url": "https:\/\/github.com\/4jfinder" - }, - "html_url": "https:\/\/github.com\/4jfinder\/4jfinder.github.io", - "description": "Searchable page for CISA Log4j (CVE-2021-44228) Affected Vendor & Software List", - "fork": false, - "created_at": "2022-01-04T03:37:03Z", - "updated_at": "2022-08-17T00:21:21Z", - "pushed_at": "2022-02-25T08:52:45Z", - "stargazers_count": 6, - "watchers_count": 6, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 6, - "score": 0 - }, { "id": 444603389, "name": "CVE-2021-44228_scanner-main-Modified-", @@ -1396,35 +872,6 @@ "watchers": 1, "score": 0 }, - { - "id": 445687561, - "name": "log4j-fuzzer", - "full_name": "mr-vill4in\/log4j-fuzzer", - "owner": { - "login": "mr-vill4in", - "id": 51061936, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4", - "html_url": "https:\/\/github.com\/mr-vill4in" - }, - "html_url": "https:\/\/github.com\/mr-vill4in\/log4j-fuzzer", - "description": "CVE-2021-44228", - "fork": false, - "created_at": "2022-01-08T00:28:32Z", - "updated_at": "2022-08-25T01:38:48Z", - "pushed_at": "2022-03-19T21:10:47Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 3, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 3, - "watchers": 4, - "score": 0 - }, { "id": 448612058, "name": "log4stdin", @@ -1526,187 +973,6 @@ "watchers": 0, "score": 0 }, - { - "id": 463165453, - "name": "Log-4j-scanner", - "full_name": "Ananya-0306\/Log-4j-scanner", - "owner": { - "login": "Ananya-0306", - "id": 74227338, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74227338?v=4", - "html_url": "https:\/\/github.com\/Ananya-0306" - }, - "html_url": "https:\/\/github.com\/Ananya-0306\/Log-4j-scanner", - "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228", - "fork": false, - "created_at": "2022-02-24T13:49:14Z", - "updated_at": "2022-04-29T13:54:03Z", - "pushed_at": "2022-03-04T13:30:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bugbounty", - "cybersecurity", - "fork-for-contribution", - "log4j", - "open-source", - "trending-repositories" - ], - "visibility": "public", - "forks": 1, - "watchers": 1, - "score": 0 - }, - { - "id": 467749739, - "name": "log4shellwithlog4j2_13_3", - "full_name": "paulvkitor\/log4shellwithlog4j2_13_3", - "owner": { - "login": "paulvkitor", - "id": 101220344, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101220344?v=4", - "html_url": "https:\/\/github.com\/paulvkitor" - }, - "html_url": "https:\/\/github.com\/paulvkitor\/log4shellwithlog4j2_13_3", - "description": "Springboot web application accepts a name get parameter and logs its value to log4j2. Vulnerable to CVE-2021-44228.", - "fork": false, - "created_at": "2022-03-09T02:29:58Z", - "updated_at": "2022-03-09T04:11:03Z", - "pushed_at": "2022-03-09T04:11:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 468389206, - "name": "vulescanjndilookup", - "full_name": "MiguelM001\/vulescanjndilookup", - "owner": { - "login": "MiguelM001", - "id": 22323920, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22323920?v=4", - "html_url": "https:\/\/github.com\/MiguelM001" - }, - "html_url": "https:\/\/github.com\/MiguelM001\/vulescanjndilookup", - "description": "HERRAMIENTA AUTOMATIZADA PARA LA DETECCION DE LA VULNERABILIDAD CVE-2021-44228", - "fork": false, - "created_at": "2022-03-10T14:57:30Z", - "updated_at": "2022-03-10T15:56:57Z", - "pushed_at": "2022-03-11T17:49:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 468746734, - "name": "CVE-2021-44228", - "full_name": "Jun-5heng\/CVE-2021-44228", - "owner": { - "login": "Jun-5heng", - "id": 88525975, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4", - "html_url": "https:\/\/github.com\/Jun-5heng" - }, - "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-44228", - "description": "Log4j2组件命令执行RCE \/ Code By:Jun_sheng", - "fork": false, - "created_at": "2022-03-11T12:43:15Z", - "updated_at": "2022-03-11T13:24:13Z", - "pushed_at": "2022-03-11T13:24:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469576160, - "name": "CVE-2021-44228", - "full_name": "honypot\/CVE-2021-44228", - "owner": { - "login": "honypot", - "id": 101309325, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", - "html_url": "https:\/\/github.com\/honypot" - }, - "html_url": "https:\/\/github.com\/honypot\/CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2022-03-14T04:09:36Z", - "updated_at": "2022-03-14T04:09:57Z", - "pushed_at": "2022-03-14T04:10:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 469576898, - "name": "CVE-2021-44228-vuln-app", - "full_name": "honypot\/CVE-2021-44228-vuln-app", - "owner": { - "login": "honypot", - "id": 101309325, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101309325?v=4", - "html_url": "https:\/\/github.com\/honypot" - }, - "html_url": "https:\/\/github.com\/honypot\/CVE-2021-44228-vuln-app", - "description": null, - "fork": false, - "created_at": "2022-03-14T04:13:13Z", - "updated_at": "2022-03-14T04:13:24Z", - "pushed_at": "2022-03-14T04:16:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 482498767, "name": "log4j-scanner", diff --git a/2021/CVE-2021-44255.json b/2021/CVE-2021-44255.json deleted file mode 100644 index 46f10d6ddf..0000000000 --- a/2021/CVE-2021-44255.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 420164946, - "name": "motioneye-authenticated-RCE", - "full_name": "pizza-power\/motioneye-authenticated-RCE", - "owner": { - "login": "pizza-power", - "id": 6135659, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4", - "html_url": "https:\/\/github.com\/pizza-power" - }, - "html_url": "https:\/\/github.com\/pizza-power\/motioneye-authenticated-RCE", - "description": "A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. CVE-2021-44255", - "fork": false, - "created_at": "2021-10-22T16:15:08Z", - "updated_at": "2022-04-18T11:39:50Z", - "pushed_at": "2022-11-02T18:40:17Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 2, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 2, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-44521.json b/2021/CVE-2021-44521.json index a652738ebc..a5dd4974d4 100644 --- a/2021/CVE-2021-44521.json +++ b/2021/CVE-2021-44521.json @@ -1,33 +1,4 @@ [ - { - "id": 463116248, - "name": "CVE-2021-44521", - "full_name": "WoodenKlaas\/CVE-2021-44521", - "owner": { - "login": "WoodenKlaas", - "id": 26481794, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26481794?v=4", - "html_url": "https:\/\/github.com\/WoodenKlaas" - }, - "html_url": "https:\/\/github.com\/WoodenKlaas\/CVE-2021-44521", - "description": "Automated PoC of CVE-2021-44521", - "fork": false, - "created_at": "2022-02-24T11:07:34Z", - "updated_at": "2022-11-25T12:48:07Z", - "pushed_at": "2022-02-24T12:04:40Z", - "stargazers_count": 7, - "watchers_count": 7, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 7, - "score": 0 - }, { "id": 573925245, "name": "poc-CVE-2021-44521", diff --git a/2021/CVE-2021-44529.json b/2021/CVE-2021-44529.json index 76fa0ad3ce..f4a24c25c6 100644 --- a/2021/CVE-2021-44529.json +++ b/2021/CVE-2021-44529.json @@ -1,33 +1,4 @@ [ - { - "id": 473450134, - "name": "CVE-2021-44529", - "full_name": "jkana\/CVE-2021-44529", - "owner": { - "login": "jkana", - "id": 52318947, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52318947?v=4", - "html_url": "https:\/\/github.com\/jkana" - }, - "html_url": "https:\/\/github.com\/jkana\/CVE-2021-44529", - "description": "CVE-2021-44529 PoC", - "fork": false, - "created_at": "2022-03-24T03:58:16Z", - "updated_at": "2022-03-28T12:33:15Z", - "pushed_at": "2022-03-24T04:07:34Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - }, { "id": 482288380, "name": "CVE-2021-44529", diff --git a/2021/CVE-2021-44716.json b/2021/CVE-2021-44716.json new file mode 100644 index 0000000000..c6af828f69 --- /dev/null +++ b/2021/CVE-2021-44716.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661270, + "name": "CVE-2021-44716", + "full_name": "Live-Hack-CVE\/CVE-2021-44716", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-44716", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-44716 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:06Z", + "updated_at": "2022-12-23T21:45:06Z", + "pushed_at": "2022-12-23T21:45:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-44827.json b/2021/CVE-2021-44827.json deleted file mode 100644 index e5f31d953e..0000000000 --- a/2021/CVE-2021-44827.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 437843261, - "name": "CVE-2021-44827", - "full_name": "full-disclosure\/CVE-2021-44827", - "owner": { - "login": "full-disclosure", - "id": 62108425, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62108425?v=4", - "html_url": "https:\/\/github.com\/full-disclosure" - }, - "html_url": "https:\/\/github.com\/full-disclosure\/CVE-2021-44827", - "description": "A PoC for CVE-2021-44827 - authenticated remote code execution in Tp-link Archer C20i", - "fork": false, - "created_at": "2021-12-13T11:17:12Z", - "updated_at": "2022-03-29T07:23:25Z", - "pushed_at": "2022-03-02T16:36:54Z", - "stargazers_count": 3, - "watchers_count": 3, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 3, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-44862.json b/2021/CVE-2021-44862.json new file mode 100644 index 0000000000..50d3535437 --- /dev/null +++ b/2021/CVE-2021-44862.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683290, + "name": "CVE-2021-44862", + "full_name": "Live-Hack-CVE\/CVE-2021-44862", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-44862", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-44862 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:12Z", + "updated_at": "2022-12-23T23:59:12Z", + "pushed_at": "2022-12-23T23:59:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45007.json b/2021/CVE-2021-45007.json deleted file mode 100644 index a25d750d91..0000000000 --- a/2021/CVE-2021-45007.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 461231807, - "name": "CVE-2021-45007", - "full_name": "AS4mir\/CVE-2021-45007", - "owner": { - "login": "AS4mir", - "id": 65978029, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65978029?v=4", - "html_url": "https:\/\/github.com\/AS4mir" - }, - "html_url": "https:\/\/github.com\/AS4mir\/CVE-2021-45007", - "description": "Cross-Site Request Forgery", - "fork": false, - "created_at": "2022-02-19T15:28:59Z", - "updated_at": "2022-03-16T14:39:48Z", - "pushed_at": "2022-03-16T14:36:36Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-45008.json b/2021/CVE-2021-45008.json deleted file mode 100644 index 764829ccd4..0000000000 --- a/2021/CVE-2021-45008.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 461780034, - "name": "CVE-2021-45008", - "full_name": "AS4mir\/CVE-2021-45008", - "owner": { - "login": "AS4mir", - "id": 65978029, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65978029?v=4", - "html_url": "https:\/\/github.com\/AS4mir" - }, - "html_url": "https:\/\/github.com\/AS4mir\/CVE-2021-45008", - "description": null, - "fork": false, - "created_at": "2022-02-21T09:00:38Z", - "updated_at": "2022-02-21T09:00:38Z", - "pushed_at": "2022-03-16T14:38:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-45010.json b/2021/CVE-2021-45010.json index 4b6a9bece6..e4fe4fce16 100644 --- a/2021/CVE-2021-45010.json +++ b/2021/CVE-2021-45010.json @@ -1,33 +1,4 @@ [ - { - "id": 471389764, - "name": "CVE-2021-45010-TinyFileManager-Exploit", - "full_name": "febinrev\/CVE-2021-45010-TinyFileManager-Exploit", - "owner": { - "login": "febinrev", - "id": 52229330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4", - "html_url": "https:\/\/github.com\/febinrev" - }, - "html_url": "https:\/\/github.com\/febinrev\/CVE-2021-45010-TinyFileManager-Exploit", - "description": "A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project’s Tiny File Manager <= 2.4.3 allows remote attackers with valid user accounts to upload malicious PHP files to the webroot and achieve code execution on the target server.", - "fork": false, - "created_at": "2022-03-18T14:00:03Z", - "updated_at": "2022-03-18T18:35:40Z", - "pushed_at": "2022-03-18T18:35:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 580199819, "name": "CVE-2021-45010", diff --git a/2021/CVE-2021-45342.json b/2021/CVE-2021-45342.json new file mode 100644 index 0000000000..17ef1a2970 --- /dev/null +++ b/2021/CVE-2021-45342.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676458, + "name": "CVE-2021-45342", + "full_name": "Live-Hack-CVE\/CVE-2021-45342", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-45342", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-45342 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:38Z", + "updated_at": "2022-12-23T23:13:38Z", + "pushed_at": "2022-12-23T23:13:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45343.json b/2021/CVE-2021-45343.json new file mode 100644 index 0000000000..a4c618ac1f --- /dev/null +++ b/2021/CVE-2021-45343.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676424, + "name": "CVE-2021-45343", + "full_name": "Live-Hack-CVE\/CVE-2021-45343", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-45343", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-45343 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:25Z", + "updated_at": "2022-12-23T23:13:25Z", + "pushed_at": "2022-12-23T23:13:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45446.json b/2021/CVE-2021-45446.json new file mode 100644 index 0000000000..2e3c814869 --- /dev/null +++ b/2021/CVE-2021-45446.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683273, + "name": "CVE-2021-45446", + "full_name": "Live-Hack-CVE\/CVE-2021-45446", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-45446", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-45446 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:02Z", + "updated_at": "2022-12-23T23:59:02Z", + "pushed_at": "2022-12-23T23:59:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45447.json b/2021/CVE-2021-45447.json new file mode 100644 index 0000000000..e50f04ace9 --- /dev/null +++ b/2021/CVE-2021-45447.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683300, + "name": "CVE-2021-45447", + "full_name": "Live-Hack-CVE\/CVE-2021-45447", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-45447", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-45447 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:15Z", + "updated_at": "2022-12-23T23:59:15Z", + "pushed_at": "2022-12-23T23:59:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45848.json b/2021/CVE-2021-45848.json new file mode 100644 index 0000000000..5bbda4df57 --- /dev/null +++ b/2021/CVE-2021-45848.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627397, + "name": "CVE-2021-45848", + "full_name": "Live-Hack-CVE\/CVE-2021-45848", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-45848", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-45848 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:05Z", + "updated_at": "2022-12-23T19:03:05Z", + "pushed_at": "2022-12-23T19:03:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-45943.json b/2021/CVE-2021-45943.json new file mode 100644 index 0000000000..9c04ce2793 --- /dev/null +++ b/2021/CVE-2021-45943.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682876, + "name": "CVE-2021-45943", + "full_name": "Live-Hack-CVE\/CVE-2021-45943", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-45943", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-45943 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:20Z", + "updated_at": "2022-12-23T23:56:20Z", + "pushed_at": "2022-12-23T23:56:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-46398.json b/2021/CVE-2021-46398.json deleted file mode 100644 index c95d1ed883..0000000000 --- a/2021/CVE-2021-46398.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 472870293, - "name": "CVE-2021-46398_Chamilo-LMS-RCE", - "full_name": "febinrev\/CVE-2021-46398_Chamilo-LMS-RCE", - "owner": { - "login": "febinrev", - "id": 52229330, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4", - "html_url": "https:\/\/github.com\/febinrev" - }, - "html_url": "https:\/\/github.com\/febinrev\/CVE-2021-46398_Chamilo-LMS-RCE", - "description": "Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.", - "fork": false, - "created_at": "2022-03-22T17:35:38Z", - "updated_at": "2022-10-18T23:31:21Z", - "pushed_at": "2022-03-22T17:47:05Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 4, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-46702.json b/2021/CVE-2021-46702.json deleted file mode 100644 index 758310bd73..0000000000 --- a/2021/CVE-2021-46702.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 463866526, - "name": "CVE-2021-46702", - "full_name": "malakkf\/CVE-2021-46702", - "owner": { - "login": "malakkf", - "id": 38157380, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38157380?v=4", - "html_url": "https:\/\/github.com\/malakkf" - }, - "html_url": "https:\/\/github.com\/malakkf\/CVE-2021-46702", - "description": "Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.", - "fork": false, - "created_at": "2022-02-26T13:52:44Z", - "updated_at": "2022-08-14T08:57:13Z", - "pushed_at": "2022-02-26T14:44:24Z", - "stargazers_count": 5, - "watchers_count": 5, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 5, - "score": 0 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-46851.json b/2021/CVE-2021-46851.json new file mode 100644 index 0000000000..406a8dafdc --- /dev/null +++ b/2021/CVE-2021-46851.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653471, + "name": "CVE-2021-46851", + "full_name": "Live-Hack-CVE\/CVE-2021-46851", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-46851", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-46851 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:39Z", + "updated_at": "2022-12-23T21:04:39Z", + "pushed_at": "2022-12-23T21:04:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-46852.json b/2021/CVE-2021-46852.json new file mode 100644 index 0000000000..0ff07dcbe6 --- /dev/null +++ b/2021/CVE-2021-46852.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653464, + "name": "CVE-2021-46852", + "full_name": "Live-Hack-CVE\/CVE-2021-46852", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-46852", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2021-46852 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:36Z", + "updated_at": "2022-12-23T21:04:36Z", + "pushed_at": "2022-12-23T21:04:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0031.json b/2022/CVE-2022-0031.json new file mode 100644 index 0000000000..cbe0eb0abf --- /dev/null +++ b/2022/CVE-2022-0031.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653887, + "name": "CVE-2022-0031", + "full_name": "Live-Hack-CVE\/CVE-2022-0031", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0031", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0031 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:38Z", + "updated_at": "2022-12-23T21:06:38Z", + "pushed_at": "2022-12-23T21:06:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0175.json b/2022/CVE-2022-0175.json new file mode 100644 index 0000000000..94d3bcfa2b --- /dev/null +++ b/2022/CVE-2022-0175.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675617, + "name": "CVE-2022-0175", + "full_name": "Live-Hack-CVE\/CVE-2022-0175", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0175", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0175 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:20Z", + "updated_at": "2022-12-23T23:08:20Z", + "pushed_at": "2022-12-23T23:08:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0204.json b/2022/CVE-2022-0204.json new file mode 100644 index 0000000000..758a1c2f0f --- /dev/null +++ b/2022/CVE-2022-0204.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676405, + "name": "CVE-2022-0204", + "full_name": "Live-Hack-CVE\/CVE-2022-0204", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0204", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0204 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:19Z", + "updated_at": "2022-12-23T23:13:19Z", + "pushed_at": "2022-12-23T23:13:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0213.json b/2022/CVE-2022-0213.json new file mode 100644 index 0000000000..240a1ea1cd --- /dev/null +++ b/2022/CVE-2022-0213.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668672, + "name": "CVE-2022-0213", + "full_name": "Live-Hack-CVE\/CVE-2022-0213", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0213", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0213 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:45Z", + "updated_at": "2022-12-23T22:26:45Z", + "pushed_at": "2022-12-23T22:26:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0222.json b/2022/CVE-2022-0222.json deleted file mode 100644 index 90aa637831..0000000000 --- a/2022/CVE-2022-0222.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526566, - "name": "CVE-2022-0222", - "full_name": "Live-Hack-CVE\/CVE-2022-0222", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0222", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0222 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:51Z", - "updated_at": "2022-12-23T12:55:51Z", - "pushed_at": "2022-12-23T12:55:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0261.json b/2022/CVE-2022-0261.json new file mode 100644 index 0000000000..f738c21c13 --- /dev/null +++ b/2022/CVE-2022-0261.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668659, + "name": "CVE-2022-0261", + "full_name": "Live-Hack-CVE\/CVE-2022-0261", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0261", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0261 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:41Z", + "updated_at": "2022-12-23T22:26:41Z", + "pushed_at": "2022-12-23T22:26:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0264.json b/2022/CVE-2022-0264.json new file mode 100644 index 0000000000..4cb06a4bcd --- /dev/null +++ b/2022/CVE-2022-0264.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636514, + "name": "CVE-2022-0264", + "full_name": "Live-Hack-CVE\/CVE-2022-0264", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0264", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0264 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:54Z", + "updated_at": "2022-12-23T19:43:54Z", + "pushed_at": "2022-12-23T19:43:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0318.json b/2022/CVE-2022-0318.json deleted file mode 100644 index 373e0ad8fb..0000000000 --- a/2022/CVE-2022-0318.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536818, - "name": "CVE-2022-0318", - "full_name": "Live-Hack-CVE\/CVE-2022-0318", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0318", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0318 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:09Z", - "updated_at": "2022-12-23T13:32:09Z", - "pushed_at": "2022-12-23T13:32:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0319.json b/2022/CVE-2022-0319.json new file mode 100644 index 0000000000..83df3e420f --- /dev/null +++ b/2022/CVE-2022-0319.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668643, + "name": "CVE-2022-0319", + "full_name": "Live-Hack-CVE\/CVE-2022-0319", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0319", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0319 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:37Z", + "updated_at": "2022-12-23T22:26:37Z", + "pushed_at": "2022-12-23T22:26:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0351.json b/2022/CVE-2022-0351.json new file mode 100644 index 0000000000..94bb61506a --- /dev/null +++ b/2022/CVE-2022-0351.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662155, + "name": "CVE-2022-0351", + "full_name": "Live-Hack-CVE\/CVE-2022-0351", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0351", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0351 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:39Z", + "updated_at": "2022-12-23T21:49:40Z", + "pushed_at": "2022-12-23T21:49:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0359.json b/2022/CVE-2022-0359.json new file mode 100644 index 0000000000..5fbfba64d8 --- /dev/null +++ b/2022/CVE-2022-0359.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662194, + "name": "CVE-2022-0359", + "full_name": "Live-Hack-CVE\/CVE-2022-0359", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0359", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0359 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:49Z", + "updated_at": "2022-12-23T21:49:50Z", + "pushed_at": "2022-12-23T21:49:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0361.json b/2022/CVE-2022-0361.json new file mode 100644 index 0000000000..6b868369bb --- /dev/null +++ b/2022/CVE-2022-0361.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662208, + "name": "CVE-2022-0361", + "full_name": "Live-Hack-CVE\/CVE-2022-0361", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0361", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0361 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:53Z", + "updated_at": "2022-12-23T21:49:53Z", + "pushed_at": "2022-12-23T21:49:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0368.json b/2022/CVE-2022-0368.json new file mode 100644 index 0000000000..7d16ff66d6 --- /dev/null +++ b/2022/CVE-2022-0368.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668629, + "name": "CVE-2022-0368", + "full_name": "Live-Hack-CVE\/CVE-2022-0368", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0368", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0368 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:26:33Z", + "updated_at": "2022-12-23T22:26:33Z", + "pushed_at": "2022-12-23T22:26:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0391.json b/2022/CVE-2022-0391.json new file mode 100644 index 0000000000..375ee409c3 --- /dev/null +++ b/2022/CVE-2022-0391.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627782, + "name": "CVE-2022-0391", + "full_name": "Live-Hack-CVE\/CVE-2022-0391", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0391", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0391 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:49Z", + "updated_at": "2022-12-23T19:04:49Z", + "pushed_at": "2022-12-23T19:04:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0392.json b/2022/CVE-2022-0392.json deleted file mode 100644 index 0ebd8eecfc..0000000000 --- a/2022/CVE-2022-0392.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536716, - "name": "CVE-2022-0392", - "full_name": "Live-Hack-CVE\/CVE-2022-0392", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0392", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0392 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:43Z", - "updated_at": "2022-12-23T13:31:43Z", - "pushed_at": "2022-12-23T13:31:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0396.json b/2022/CVE-2022-0396.json new file mode 100644 index 0000000000..06f0ab95e3 --- /dev/null +++ b/2022/CVE-2022-0396.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627380, + "name": "CVE-2022-0396", + "full_name": "Live-Hack-CVE\/CVE-2022-0396", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0396", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0396 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:01Z", + "updated_at": "2022-12-23T19:03:01Z", + "pushed_at": "2022-12-23T19:03:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0421.json b/2022/CVE-2022-0421.json deleted file mode 100644 index 0e2e5dcd74..0000000000 --- a/2022/CVE-2022-0421.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572221, - "name": "CVE-2022-0421", - "full_name": "Live-Hack-CVE\/CVE-2022-0421", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0421", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0421 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:56Z", - "updated_at": "2022-12-23T15:32:56Z", - "pushed_at": "2022-12-23T15:32:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0485.json b/2022/CVE-2022-0485.json deleted file mode 100644 index d0a9a5bf63..0000000000 --- a/2022/CVE-2022-0485.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525331, - "name": "CVE-2022-0485", - "full_name": "Live-Hack-CVE\/CVE-2022-0485", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0485", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0485 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:19Z", - "updated_at": "2022-12-23T12:51:19Z", - "pushed_at": "2022-12-23T12:51:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0561.json b/2022/CVE-2022-0561.json new file mode 100644 index 0000000000..159cba99e5 --- /dev/null +++ b/2022/CVE-2022-0561.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627570, + "name": "CVE-2022-0561", + "full_name": "Live-Hack-CVE\/CVE-2022-0561", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0561", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0561 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:54Z", + "updated_at": "2022-12-23T19:03:54Z", + "pushed_at": "2022-12-23T19:03:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0562.json b/2022/CVE-2022-0562.json new file mode 100644 index 0000000000..8dd1787e2e --- /dev/null +++ b/2022/CVE-2022-0562.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627552, + "name": "CVE-2022-0562", + "full_name": "Live-Hack-CVE\/CVE-2022-0562", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0562", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0562 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:47Z", + "updated_at": "2022-12-23T19:03:47Z", + "pushed_at": "2022-12-23T19:03:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0581.json b/2022/CVE-2022-0581.json new file mode 100644 index 0000000000..ae3653dda3 --- /dev/null +++ b/2022/CVE-2022-0581.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682241, + "name": "CVE-2022-0581", + "full_name": "Live-Hack-CVE\/CVE-2022-0581", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0581", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0581 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:24Z", + "updated_at": "2022-12-23T23:52:24Z", + "pushed_at": "2022-12-23T23:52:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0582.json b/2022/CVE-2022-0582.json new file mode 100644 index 0000000000..c20cc6d79a --- /dev/null +++ b/2022/CVE-2022-0582.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682193, + "name": "CVE-2022-0582", + "full_name": "Live-Hack-CVE\/CVE-2022-0582", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0582", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0582 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:08Z", + "updated_at": "2022-12-23T23:52:08Z", + "pushed_at": "2022-12-23T23:52:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0583.json b/2022/CVE-2022-0583.json new file mode 100644 index 0000000000..682b77da12 --- /dev/null +++ b/2022/CVE-2022-0583.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682247, + "name": "CVE-2022-0583", + "full_name": "Live-Hack-CVE\/CVE-2022-0583", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0583", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0583 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:27Z", + "updated_at": "2022-12-23T23:52:27Z", + "pushed_at": "2022-12-23T23:52:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0585.json b/2022/CVE-2022-0585.json new file mode 100644 index 0000000000..3f1aceeadd --- /dev/null +++ b/2022/CVE-2022-0585.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682173, + "name": "CVE-2022-0585", + "full_name": "Live-Hack-CVE\/CVE-2022-0585", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0585", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0585 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:01Z", + "updated_at": "2022-12-23T23:52:01Z", + "pushed_at": "2022-12-23T23:52:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0586.json b/2022/CVE-2022-0586.json new file mode 100644 index 0000000000..df35c351c5 --- /dev/null +++ b/2022/CVE-2022-0586.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682182, + "name": "CVE-2022-0586", + "full_name": "Live-Hack-CVE\/CVE-2022-0586", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0586", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0586 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:05Z", + "updated_at": "2022-12-23T23:52:05Z", + "pushed_at": "2022-12-23T23:52:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0594.json b/2022/CVE-2022-0594.json new file mode 100644 index 0000000000..89ac0579ac --- /dev/null +++ b/2022/CVE-2022-0594.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677155, + "name": "CVE-2022-0594", + "full_name": "Live-Hack-CVE\/CVE-2022-0594", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0594", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0594 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:04Z", + "updated_at": "2022-12-23T23:18:04Z", + "pushed_at": "2022-12-23T23:18:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0613.json b/2022/CVE-2022-0613.json deleted file mode 100644 index e3edab2320..0000000000 --- a/2022/CVE-2022-0613.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538416, - "name": "CVE-2022-0613", - "full_name": "Live-Hack-CVE\/CVE-2022-0613", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0613", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0613 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:27Z", - "updated_at": "2022-12-23T13:37:27Z", - "pushed_at": "2022-12-23T13:37:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0696.json b/2022/CVE-2022-0696.json deleted file mode 100644 index 63b177bd98..0000000000 --- a/2022/CVE-2022-0696.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536699, - "name": "CVE-2022-0696", - "full_name": "Live-Hack-CVE\/CVE-2022-0696", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0696", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0696 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:40Z", - "updated_at": "2022-12-23T13:31:40Z", - "pushed_at": "2022-12-23T13:31:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0698.json b/2022/CVE-2022-0698.json deleted file mode 100644 index c453c83ec8..0000000000 --- a/2022/CVE-2022-0698.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527048, - "name": "CVE-2022-0698", - "full_name": "Live-Hack-CVE\/CVE-2022-0698", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0698", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0698 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:44Z", - "updated_at": "2022-12-23T12:57:44Z", - "pushed_at": "2022-12-23T12:57:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-0778.json b/2022/CVE-2022-0778.json index d81bc40ee7..c64ebfe417 100644 --- a/2022/CVE-2022-0778.json +++ b/2022/CVE-2022-0778.json @@ -120,5 +120,34 @@ "forks": 2, "watchers": 2, "score": 0 + }, + { + "id": 581661726, + "name": "CVE-2022-0778", + "full_name": "Live-Hack-CVE\/CVE-2022-0778", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0778", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0778 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:34Z", + "updated_at": "2022-12-23T21:47:34Z", + "pushed_at": "2022-12-23T21:47:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0824.json b/2022/CVE-2022-0824.json index dacf0965f4..08eba71f98 100644 --- a/2022/CVE-2022-0824.json +++ b/2022/CVE-2022-0824.json @@ -66,34 +66,5 @@ "forks": 0, "watchers": 4, "score": 0 - }, - { - "id": 581584706, - "name": "CVE-2022-0824", - "full_name": "Live-Hack-CVE\/CVE-2022-0824", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0824", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0824 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:18:15Z", - "updated_at": "2022-12-23T16:18:15Z", - "pushed_at": "2022-12-23T16:18:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index c1606fa020..1c3877db83 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1180,13 +1180,13 @@ "stargazers_count": 363, "watchers_count": 363, "has_discussions": false, - "forks_count": 103, + "forks_count": 104, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 103, + "forks": 104, "watchers": 363, "score": 0 }, diff --git a/2022/CVE-2022-0865.json b/2022/CVE-2022-0865.json new file mode 100644 index 0000000000..74c3d3cfac --- /dev/null +++ b/2022/CVE-2022-0865.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675939, + "name": "CVE-2022-0865", + "full_name": "Live-Hack-CVE\/CVE-2022-0865", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0865", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0865 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:14Z", + "updated_at": "2022-12-23T23:10:14Z", + "pushed_at": "2022-12-23T23:10:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0891.json b/2022/CVE-2022-0891.json new file mode 100644 index 0000000000..f3f12ca1e5 --- /dev/null +++ b/2022/CVE-2022-0891.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675952, + "name": "CVE-2022-0891", + "full_name": "Live-Hack-CVE\/CVE-2022-0891", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0891", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0891 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:18Z", + "updated_at": "2022-12-23T23:10:18Z", + "pushed_at": "2022-12-23T23:10:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0907.json b/2022/CVE-2022-0907.json new file mode 100644 index 0000000000..b395f20eeb --- /dev/null +++ b/2022/CVE-2022-0907.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675931, + "name": "CVE-2022-0907", + "full_name": "Live-Hack-CVE\/CVE-2022-0907", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0907", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0907 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:10Z", + "updated_at": "2022-12-23T23:10:10Z", + "pushed_at": "2022-12-23T23:10:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0908.json b/2022/CVE-2022-0908.json new file mode 100644 index 0000000000..b6d02ebc70 --- /dev/null +++ b/2022/CVE-2022-0908.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675922, + "name": "CVE-2022-0908", + "full_name": "Live-Hack-CVE\/CVE-2022-0908", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0908", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0908 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:07Z", + "updated_at": "2022-12-23T23:10:07Z", + "pushed_at": "2022-12-23T23:10:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0909.json b/2022/CVE-2022-0909.json new file mode 100644 index 0000000000..794e804baa --- /dev/null +++ b/2022/CVE-2022-0909.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675906, + "name": "CVE-2022-0909", + "full_name": "Live-Hack-CVE\/CVE-2022-0909", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0909", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0909 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:03Z", + "updated_at": "2022-12-23T23:10:03Z", + "pushed_at": "2022-12-23T23:10:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-0924.json b/2022/CVE-2022-0924.json new file mode 100644 index 0000000000..cabe276b5c --- /dev/null +++ b/2022/CVE-2022-0924.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627501, + "name": "CVE-2022-0924", + "full_name": "Live-Hack-CVE\/CVE-2022-0924", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-0924", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-0924 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:34Z", + "updated_at": "2022-12-23T19:03:34Z", + "pushed_at": "2022-12-23T19:03:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1015.json b/2022/CVE-2022-1015.json index 3402721cb3..e2043a8940 100644 --- a/2022/CVE-2022-1015.json +++ b/2022/CVE-2022-1015.json @@ -56,34 +56,5 @@ "forks": 1, "watchers": 0, "score": 0 - }, - { - "id": 581585023, - "name": "CVE-2022-1015", - "full_name": "Live-Hack-CVE\/CVE-2022-1015", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1015", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1015 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:31Z", - "updated_at": "2022-12-23T16:19:31Z", - "pushed_at": "2022-12-23T16:19:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1056.json b/2022/CVE-2022-1056.json new file mode 100644 index 0000000000..0ff4ccc65f --- /dev/null +++ b/2022/CVE-2022-1056.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627204, + "name": "CVE-2022-1056", + "full_name": "Live-Hack-CVE\/CVE-2022-1056", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1056", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1056 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:16Z", + "updated_at": "2022-12-23T19:02:16Z", + "pushed_at": "2022-12-23T19:02:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1184.json b/2022/CVE-2022-1184.json deleted file mode 100644 index 7526e78c85..0000000000 --- a/2022/CVE-2022-1184.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584067, - "name": "CVE-2022-1184", - "full_name": "Live-Hack-CVE\/CVE-2022-1184", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1184", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1184 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:53Z", - "updated_at": "2022-12-23T16:15:53Z", - "pushed_at": "2022-12-23T16:15:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1203.json b/2022/CVE-2022-1203.json new file mode 100644 index 0000000000..5678ede279 --- /dev/null +++ b/2022/CVE-2022-1203.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628468, + "name": "CVE-2022-1203", + "full_name": "Live-Hack-CVE\/CVE-2022-1203", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1203", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1203 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:32Z", + "updated_at": "2022-12-23T19:07:32Z", + "pushed_at": "2022-12-23T19:07:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1210.json b/2022/CVE-2022-1210.json new file mode 100644 index 0000000000..2561a861bb --- /dev/null +++ b/2022/CVE-2022-1210.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626978, + "name": "CVE-2022-1210", + "full_name": "Live-Hack-CVE\/CVE-2022-1210", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1210", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1210 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:15Z", + "updated_at": "2022-12-23T19:01:15Z", + "pushed_at": "2022-12-23T19:01:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1233.json b/2022/CVE-2022-1233.json deleted file mode 100644 index 777c5bf623..0000000000 --- a/2022/CVE-2022-1233.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538488, - "name": "CVE-2022-1233", - "full_name": "Live-Hack-CVE\/CVE-2022-1233", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1233", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1233 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:40Z", - "updated_at": "2022-12-23T13:37:40Z", - "pushed_at": "2022-12-23T13:37:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1259.json b/2022/CVE-2022-1259.json new file mode 100644 index 0000000000..dcd7079bb8 --- /dev/null +++ b/2022/CVE-2022-1259.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676257, + "name": "CVE-2022-1259", + "full_name": "Live-Hack-CVE\/CVE-2022-1259", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1259", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1259 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:21Z", + "updated_at": "2022-12-23T23:12:21Z", + "pushed_at": "2022-12-23T23:12:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1270.json b/2022/CVE-2022-1270.json deleted file mode 100644 index 9d0077c7ad..0000000000 --- a/2022/CVE-2022-1270.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560067, - "name": "CVE-2022-1270", - "full_name": "Live-Hack-CVE\/CVE-2022-1270", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1270", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1270 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:22Z", - "updated_at": "2022-12-23T14:51:22Z", - "pushed_at": "2022-12-23T14:51:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1319.json b/2022/CVE-2022-1319.json new file mode 100644 index 0000000000..8beb3cdd95 --- /dev/null +++ b/2022/CVE-2022-1319.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676239, + "name": "CVE-2022-1319", + "full_name": "Live-Hack-CVE\/CVE-2022-1319", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1319", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1319 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:14Z", + "updated_at": "2022-12-23T23:12:14Z", + "pushed_at": "2022-12-23T23:12:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json index 1c6f8c9250..e50f775dc5 100644 --- a/2022/CVE-2022-1329.json +++ b/2022/CVE-2022-1329.json @@ -91,5 +91,34 @@ "forks": 1, "watchers": 2, "score": 0 + }, + { + "id": 581669175, + "name": "CVE-2022-1329", + "full_name": "Live-Hack-CVE\/CVE-2022-1329", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1329", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1329 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:34Z", + "updated_at": "2022-12-23T22:29:34Z", + "pushed_at": "2022-12-23T22:29:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1354.json b/2022/CVE-2022-1354.json new file mode 100644 index 0000000000..6d7a03fb03 --- /dev/null +++ b/2022/CVE-2022-1354.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676218, + "name": "CVE-2022-1354", + "full_name": "Live-Hack-CVE\/CVE-2022-1354", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1354", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1354 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:07Z", + "updated_at": "2022-12-23T23:12:07Z", + "pushed_at": "2022-12-23T23:12:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1355.json b/2022/CVE-2022-1355.json new file mode 100644 index 0000000000..dfe0f9eba0 --- /dev/null +++ b/2022/CVE-2022-1355.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676140, + "name": "CVE-2022-1355", + "full_name": "Live-Hack-CVE\/CVE-2022-1355", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1355", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1355 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:28Z", + "updated_at": "2022-12-23T23:11:28Z", + "pushed_at": "2022-12-23T23:11:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1365.json b/2022/CVE-2022-1365.json deleted file mode 100644 index 81eac3c385..0000000000 --- a/2022/CVE-2022-1365.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573589, - "name": "CVE-2022-1365", - "full_name": "Live-Hack-CVE\/CVE-2022-1365", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1365", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1365 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:33Z", - "updated_at": "2022-12-23T15:37:33Z", - "pushed_at": "2022-12-23T15:37:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1381.json b/2022/CVE-2022-1381.json new file mode 100644 index 0000000000..bb9baa6e82 --- /dev/null +++ b/2022/CVE-2022-1381.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682535, + "name": "CVE-2022-1381", + "full_name": "Live-Hack-CVE\/CVE-2022-1381", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1381", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1381 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:14Z", + "updated_at": "2022-12-23T23:54:14Z", + "pushed_at": "2022-12-23T23:54:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1391.json b/2022/CVE-2022-1391.json new file mode 100644 index 0000000000..53ae7ddb22 --- /dev/null +++ b/2022/CVE-2022-1391.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661632, + "name": "CVE-2022-1391", + "full_name": "Live-Hack-CVE\/CVE-2022-1391", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1391", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1391 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:06Z", + "updated_at": "2022-12-23T21:47:06Z", + "pushed_at": "2022-12-23T21:47:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1420.json b/2022/CVE-2022-1420.json new file mode 100644 index 0000000000..e29407bb0c --- /dev/null +++ b/2022/CVE-2022-1420.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682508, + "name": "CVE-2022-1420", + "full_name": "Live-Hack-CVE\/CVE-2022-1420", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1420", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1420 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:04Z", + "updated_at": "2022-12-23T23:54:04Z", + "pushed_at": "2022-12-23T23:54:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1566.json b/2022/CVE-2022-1566.json new file mode 100644 index 0000000000..e8fac4d4e6 --- /dev/null +++ b/2022/CVE-2022-1566.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628857, + "name": "CVE-2022-1566", + "full_name": "Live-Hack-CVE\/CVE-2022-1566", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1566", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1566 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:14Z", + "updated_at": "2022-12-23T19:09:14Z", + "pushed_at": "2022-12-23T19:09:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1578.json b/2022/CVE-2022-1578.json deleted file mode 100644 index 8a4178eb4a..0000000000 --- a/2022/CVE-2022-1578.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572204, - "name": "CVE-2022-1578", - "full_name": "Live-Hack-CVE\/CVE-2022-1578", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1578", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1578 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:53Z", - "updated_at": "2022-12-23T15:32:53Z", - "pushed_at": "2022-12-23T15:32:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1579.json b/2022/CVE-2022-1579.json deleted file mode 100644 index 832ee54455..0000000000 --- a/2022/CVE-2022-1579.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562754, - "name": "CVE-2022-1579", - "full_name": "Live-Hack-CVE\/CVE-2022-1579", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1579", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1579 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:03Z", - "updated_at": "2022-12-23T15:00:03Z", - "pushed_at": "2022-12-23T15:00:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1581.json b/2022/CVE-2022-1581.json deleted file mode 100644 index 571ff6257a..0000000000 --- a/2022/CVE-2022-1581.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572114, - "name": "CVE-2022-1581", - "full_name": "Live-Hack-CVE\/CVE-2022-1581", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1581", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1581 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:36Z", - "updated_at": "2022-12-23T15:32:36Z", - "pushed_at": "2022-12-23T15:32:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1620.json b/2022/CVE-2022-1620.json new file mode 100644 index 0000000000..c094a487a6 --- /dev/null +++ b/2022/CVE-2022-1620.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676542, + "name": "CVE-2022-1620", + "full_name": "Live-Hack-CVE\/CVE-2022-1620", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1620", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1620 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:10Z", + "updated_at": "2022-12-23T23:14:10Z", + "pushed_at": "2022-12-23T23:14:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1621.json b/2022/CVE-2022-1621.json deleted file mode 100644 index 5480c275d0..0000000000 --- a/2022/CVE-2022-1621.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538024, - "name": "CVE-2022-1621", - "full_name": "Live-Hack-CVE\/CVE-2022-1621", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1621", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1621 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:08Z", - "updated_at": "2022-12-23T13:36:08Z", - "pushed_at": "2022-12-23T13:36:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1622.json b/2022/CVE-2022-1622.json new file mode 100644 index 0000000000..5ca9bdef56 --- /dev/null +++ b/2022/CVE-2022-1622.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675894, + "name": "CVE-2022-1622", + "full_name": "Live-Hack-CVE\/CVE-2022-1622", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1622", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1622 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:00Z", + "updated_at": "2022-12-23T23:10:00Z", + "pushed_at": "2022-12-23T23:10:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1725.json b/2022/CVE-2022-1725.json new file mode 100644 index 0000000000..8be70ec4e3 --- /dev/null +++ b/2022/CVE-2022-1725.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682849, + "name": "CVE-2022-1725", + "full_name": "Live-Hack-CVE\/CVE-2022-1725", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1725", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1725 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:13Z", + "updated_at": "2022-12-23T23:56:13Z", + "pushed_at": "2022-12-23T23:56:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1785.json b/2022/CVE-2022-1785.json deleted file mode 100644 index e084504927..0000000000 --- a/2022/CVE-2022-1785.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548101, - "name": "CVE-2022-1785", - "full_name": "Live-Hack-CVE\/CVE-2022-1785", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1785", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1785 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:11:21Z", - "updated_at": "2022-12-23T14:11:21Z", - "pushed_at": "2022-12-23T14:11:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1921.json b/2022/CVE-2022-1921.json new file mode 100644 index 0000000000..6c23d69285 --- /dev/null +++ b/2022/CVE-2022-1921.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676519, + "name": "CVE-2022-1921", + "full_name": "Live-Hack-CVE\/CVE-2022-1921", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1921", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1921 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:03Z", + "updated_at": "2022-12-23T23:14:03Z", + "pushed_at": "2022-12-23T23:14:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1928.json b/2022/CVE-2022-1928.json new file mode 100644 index 0000000000..845cf0dfdb --- /dev/null +++ b/2022/CVE-2022-1928.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626912, + "name": "CVE-2022-1928", + "full_name": "Live-Hack-CVE\/CVE-2022-1928", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1928", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1928 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:01Z", + "updated_at": "2022-12-23T19:01:01Z", + "pushed_at": "2022-12-23T19:01:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1938.json b/2022/CVE-2022-1938.json new file mode 100644 index 0000000000..7f3be61d9c --- /dev/null +++ b/2022/CVE-2022-1938.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681716, + "name": "CVE-2022-1938", + "full_name": "Live-Hack-CVE\/CVE-2022-1938", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1938", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1938 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:09Z", + "updated_at": "2022-12-23T23:49:09Z", + "pushed_at": "2022-12-23T23:49:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1942.json b/2022/CVE-2022-1942.json deleted file mode 100644 index 95333c8198..0000000000 --- a/2022/CVE-2022-1942.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537778, - "name": "CVE-2022-1942", - "full_name": "Live-Hack-CVE\/CVE-2022-1942", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1942", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1942 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:35:16Z", - "updated_at": "2022-12-23T13:35:16Z", - "pushed_at": "2022-12-23T13:35:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-1943.json b/2022/CVE-2022-1943.json new file mode 100644 index 0000000000..eb1cc75d48 --- /dev/null +++ b/2022/CVE-2022-1943.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676391, + "name": "CVE-2022-1943", + "full_name": "Live-Hack-CVE\/CVE-2022-1943", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1943", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1943 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:12Z", + "updated_at": "2022-12-23T23:13:12Z", + "pushed_at": "2022-12-23T23:13:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-1973.json b/2022/CVE-2022-1973.json new file mode 100644 index 0000000000..594633db06 --- /dev/null +++ b/2022/CVE-2022-1973.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676489, + "name": "CVE-2022-1973", + "full_name": "Live-Hack-CVE\/CVE-2022-1973", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-1973", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-1973 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:52Z", + "updated_at": "2022-12-23T23:13:52Z", + "pushed_at": "2022-12-23T23:13:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2000.json b/2022/CVE-2022-2000.json deleted file mode 100644 index c2f13ae26b..0000000000 --- a/2022/CVE-2022-2000.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537938, - "name": "CVE-2022-2000", - "full_name": "Live-Hack-CVE\/CVE-2022-2000", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2000", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2000 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:35:54Z", - "updated_at": "2022-12-23T13:35:54Z", - "pushed_at": "2022-12-23T13:35:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20231.json b/2022/CVE-2022-20231.json new file mode 100644 index 0000000000..dc2322384a --- /dev/null +++ b/2022/CVE-2022-20231.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655342, + "name": "CVE-2022-20231", + "full_name": "Live-Hack-CVE\/CVE-2022-20231", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20231", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20231 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:35Z", + "updated_at": "2022-12-23T21:13:35Z", + "pushed_at": "2022-12-23T21:13:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20239.json b/2022/CVE-2022-20239.json new file mode 100644 index 0000000000..4701069aba --- /dev/null +++ b/2022/CVE-2022-20239.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677164, + "name": "CVE-2022-20239", + "full_name": "Live-Hack-CVE\/CVE-2022-20239", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20239", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20239 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:08Z", + "updated_at": "2022-12-23T23:18:08Z", + "pushed_at": "2022-12-23T23:18:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20364.json b/2022/CVE-2022-20364.json new file mode 100644 index 0000000000..7765029e74 --- /dev/null +++ b/2022/CVE-2022-20364.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655363, + "name": "CVE-2022-20364", + "full_name": "Live-Hack-CVE\/CVE-2022-20364", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20364", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20364 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:41Z", + "updated_at": "2022-12-23T21:13:41Z", + "pushed_at": "2022-12-23T21:13:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20409.json b/2022/CVE-2022-20409.json new file mode 100644 index 0000000000..fd18d52040 --- /dev/null +++ b/2022/CVE-2022-20409.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675507, + "name": "CVE-2022-20409", + "full_name": "Live-Hack-CVE\/CVE-2022-20409", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20409", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20409 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:07:46Z", + "updated_at": "2022-12-23T23:07:46Z", + "pushed_at": "2022-12-23T23:07:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20414.json b/2022/CVE-2022-20414.json new file mode 100644 index 0000000000..9b2719ef01 --- /dev/null +++ b/2022/CVE-2022-20414.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662772, + "name": "CVE-2022-20414", + "full_name": "Live-Hack-CVE\/CVE-2022-20414", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20414", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20414 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:53Z", + "updated_at": "2022-12-23T21:52:53Z", + "pushed_at": "2022-12-23T21:52:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2042.json b/2022/CVE-2022-2042.json new file mode 100644 index 0000000000..ddf488a4e4 --- /dev/null +++ b/2022/CVE-2022-2042.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669429, + "name": "CVE-2022-2042", + "full_name": "Live-Hack-CVE\/CVE-2022-2042", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2042", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2042 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:53Z", + "updated_at": "2022-12-23T22:30:53Z", + "pushed_at": "2022-12-23T22:30:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20426.json b/2022/CVE-2022-20426.json new file mode 100644 index 0000000000..70a10d6dfa --- /dev/null +++ b/2022/CVE-2022-20426.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662860, + "name": "CVE-2022-20426", + "full_name": "Live-Hack-CVE\/CVE-2022-20426", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20426", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20426 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:20Z", + "updated_at": "2022-12-23T21:53:20Z", + "pushed_at": "2022-12-23T21:53:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20427.json b/2022/CVE-2022-20427.json deleted file mode 100644 index c4bc1cf80f..0000000000 --- a/2022/CVE-2022-20427.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573980, - "name": "CVE-2022-20427", - "full_name": "Live-Hack-CVE\/CVE-2022-20427", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20427", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20427 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:47Z", - "updated_at": "2022-12-23T15:38:47Z", - "pushed_at": "2022-12-23T15:38:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20428.json b/2022/CVE-2022-20428.json deleted file mode 100644 index a61269d3ba..0000000000 --- a/2022/CVE-2022-20428.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574000, - "name": "CVE-2022-20428", - "full_name": "Live-Hack-CVE\/CVE-2022-20428", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20428", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20428 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:51Z", - "updated_at": "2022-12-23T15:38:51Z", - "pushed_at": "2022-12-23T15:38:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20441.json b/2022/CVE-2022-20441.json new file mode 100644 index 0000000000..f7037dc3bf --- /dev/null +++ b/2022/CVE-2022-20441.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662846, + "name": "CVE-2022-20441", + "full_name": "Live-Hack-CVE\/CVE-2022-20441", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20441", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20441 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:17Z", + "updated_at": "2022-12-23T21:53:17Z", + "pushed_at": "2022-12-23T21:53:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20445.json b/2022/CVE-2022-20445.json new file mode 100644 index 0000000000..a1ea9efa4a --- /dev/null +++ b/2022/CVE-2022-20445.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662821, + "name": "CVE-2022-20445", + "full_name": "Live-Hack-CVE\/CVE-2022-20445", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20445", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20445 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:10Z", + "updated_at": "2022-12-23T21:53:10Z", + "pushed_at": "2022-12-23T21:53:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20446.json b/2022/CVE-2022-20446.json new file mode 100644 index 0000000000..b94f46cc60 --- /dev/null +++ b/2022/CVE-2022-20446.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662764, + "name": "CVE-2022-20446", + "full_name": "Live-Hack-CVE\/CVE-2022-20446", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20446", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20446 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:50Z", + "updated_at": "2022-12-23T21:52:50Z", + "pushed_at": "2022-12-23T21:52:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20447.json b/2022/CVE-2022-20447.json new file mode 100644 index 0000000000..6a02682c0e --- /dev/null +++ b/2022/CVE-2022-20447.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663124, + "name": "CVE-2022-20447", + "full_name": "Live-Hack-CVE\/CVE-2022-20447", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20447", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20447 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:54Z", + "updated_at": "2022-12-23T21:54:54Z", + "pushed_at": "2022-12-23T21:54:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20448.json b/2022/CVE-2022-20448.json new file mode 100644 index 0000000000..0fd676e04c --- /dev/null +++ b/2022/CVE-2022-20448.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663095, + "name": "CVE-2022-20448", + "full_name": "Live-Hack-CVE\/CVE-2022-20448", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20448", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20448 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:44Z", + "updated_at": "2022-12-23T21:54:44Z", + "pushed_at": "2022-12-23T21:54:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20450.json b/2022/CVE-2022-20450.json new file mode 100644 index 0000000000..2ac8edaf0e --- /dev/null +++ b/2022/CVE-2022-20450.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662972, + "name": "CVE-2022-20450", + "full_name": "Live-Hack-CVE\/CVE-2022-20450", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20450", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20450 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:58Z", + "updated_at": "2022-12-23T21:53:58Z", + "pushed_at": "2022-12-23T21:54:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20451.json b/2022/CVE-2022-20451.json new file mode 100644 index 0000000000..b5da02467e --- /dev/null +++ b/2022/CVE-2022-20451.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662967, + "name": "CVE-2022-20451", + "full_name": "Live-Hack-CVE\/CVE-2022-20451", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20451", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20451 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:55Z", + "updated_at": "2022-12-23T21:53:55Z", + "pushed_at": "2022-12-23T21:53:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json new file mode 100644 index 0000000000..a9de0734db --- /dev/null +++ b/2022/CVE-2022-20452.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662878, + "name": "CVE-2022-20452", + "full_name": "Live-Hack-CVE\/CVE-2022-20452", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20452", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20452 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:26Z", + "updated_at": "2022-12-23T21:53:26Z", + "pushed_at": "2022-12-23T21:53:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20453.json b/2022/CVE-2022-20453.json new file mode 100644 index 0000000000..10a5f89618 --- /dev/null +++ b/2022/CVE-2022-20453.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662632, + "name": "CVE-2022-20453", + "full_name": "Live-Hack-CVE\/CVE-2022-20453", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20453", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20453 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:05Z", + "updated_at": "2022-12-23T21:52:05Z", + "pushed_at": "2022-12-23T21:52:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20454.json b/2022/CVE-2022-20454.json new file mode 100644 index 0000000000..01584f2037 --- /dev/null +++ b/2022/CVE-2022-20454.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662570, + "name": "CVE-2022-20454", + "full_name": "Live-Hack-CVE\/CVE-2022-20454", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20454", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20454 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:46Z", + "updated_at": "2022-12-23T21:51:46Z", + "pushed_at": "2022-12-23T21:51:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20457.json b/2022/CVE-2022-20457.json new file mode 100644 index 0000000000..bd41dde3fd --- /dev/null +++ b/2022/CVE-2022-20457.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662714, + "name": "CVE-2022-20457", + "full_name": "Live-Hack-CVE\/CVE-2022-20457", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20457", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20457 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:34Z", + "updated_at": "2022-12-23T21:52:34Z", + "pushed_at": "2022-12-23T21:52:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20459.json b/2022/CVE-2022-20459.json deleted file mode 100644 index 685eb24336..0000000000 --- a/2022/CVE-2022-20459.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573947, - "name": "CVE-2022-20459", - "full_name": "Live-Hack-CVE\/CVE-2022-20459", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20459", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20459 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:40Z", - "updated_at": "2022-12-23T15:38:40Z", - "pushed_at": "2022-12-23T15:38:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20460.json b/2022/CVE-2022-20460.json deleted file mode 100644 index 281ceb3f22..0000000000 --- a/2022/CVE-2022-20460.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573966, - "name": "CVE-2022-20460", - "full_name": "Live-Hack-CVE\/CVE-2022-20460", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20460", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20460 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:44Z", - "updated_at": "2022-12-23T15:38:44Z", - "pushed_at": "2022-12-23T15:38:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20462.json b/2022/CVE-2022-20462.json new file mode 100644 index 0000000000..789befe585 --- /dev/null +++ b/2022/CVE-2022-20462.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662613, + "name": "CVE-2022-20462", + "full_name": "Live-Hack-CVE\/CVE-2022-20462", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20462", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20462 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:59Z", + "updated_at": "2022-12-23T21:51:59Z", + "pushed_at": "2022-12-23T21:52:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20465.json b/2022/CVE-2022-20465.json new file mode 100644 index 0000000000..9c7f42baf3 --- /dev/null +++ b/2022/CVE-2022-20465.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662624, + "name": "CVE-2022-20465", + "full_name": "Live-Hack-CVE\/CVE-2022-20465", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20465", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20465 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:02Z", + "updated_at": "2022-12-23T21:52:02Z", + "pushed_at": "2022-12-23T21:52:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20772.json b/2022/CVE-2022-20772.json new file mode 100644 index 0000000000..d1826562b6 --- /dev/null +++ b/2022/CVE-2022-20772.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670067, + "name": "CVE-2022-20772", + "full_name": "Live-Hack-CVE\/CVE-2022-20772", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20772", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20772 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:20Z", + "updated_at": "2022-12-23T22:34:20Z", + "pushed_at": "2022-12-23T22:34:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20775.json b/2022/CVE-2022-20775.json new file mode 100644 index 0000000000..972208c4f1 --- /dev/null +++ b/2022/CVE-2022-20775.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655380, + "name": "CVE-2022-20775", + "full_name": "Live-Hack-CVE\/CVE-2022-20775", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20775", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20775 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:48Z", + "updated_at": "2022-12-23T21:13:48Z", + "pushed_at": "2022-12-23T21:13:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20812.json b/2022/CVE-2022-20812.json new file mode 100644 index 0000000000..c654fc881c --- /dev/null +++ b/2022/CVE-2022-20812.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655371, + "name": "CVE-2022-20812", + "full_name": "Live-Hack-CVE\/CVE-2022-20812", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20812", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20812 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:45Z", + "updated_at": "2022-12-23T21:13:45Z", + "pushed_at": "2022-12-23T21:13:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20826.json b/2022/CVE-2022-20826.json deleted file mode 100644 index 779e820153..0000000000 --- a/2022/CVE-2022-20826.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596268, - "name": "CVE-2022-20826", - "full_name": "Live-Hack-CVE\/CVE-2022-20826", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20826", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20826 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:19Z", - "updated_at": "2022-12-23T17:01:19Z", - "pushed_at": "2022-12-23T17:01:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20832.json b/2022/CVE-2022-20832.json deleted file mode 100644 index 4c90aa1afa..0000000000 --- a/2022/CVE-2022-20832.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596490, - "name": "CVE-2022-20832", - "full_name": "Live-Hack-CVE\/CVE-2022-20832", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20832", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20832 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:10Z", - "updated_at": "2022-12-23T17:02:10Z", - "pushed_at": "2022-12-23T17:02:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20833.json b/2022/CVE-2022-20833.json deleted file mode 100644 index 499bd33f0b..0000000000 --- a/2022/CVE-2022-20833.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596443, - "name": "CVE-2022-20833", - "full_name": "Live-Hack-CVE\/CVE-2022-20833", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20833", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20833 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:59Z", - "updated_at": "2022-12-23T17:01:59Z", - "pushed_at": "2022-12-23T17:02:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20834.json b/2022/CVE-2022-20834.json deleted file mode 100644 index a0a97333ae..0000000000 --- a/2022/CVE-2022-20834.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596283, - "name": "CVE-2022-20834", - "full_name": "Live-Hack-CVE\/CVE-2022-20834", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20834", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20834 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:22Z", - "updated_at": "2022-12-23T17:01:22Z", - "pushed_at": "2022-12-23T17:01:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20835.json b/2022/CVE-2022-20835.json deleted file mode 100644 index a660d35f52..0000000000 --- a/2022/CVE-2022-20835.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596300, - "name": "CVE-2022-20835", - "full_name": "Live-Hack-CVE\/CVE-2022-20835", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20835", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20835 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:26Z", - "updated_at": "2022-12-23T17:01:26Z", - "pushed_at": "2022-12-23T17:01:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20836.json b/2022/CVE-2022-20836.json deleted file mode 100644 index 765a940460..0000000000 --- a/2022/CVE-2022-20836.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596330, - "name": "CVE-2022-20836", - "full_name": "Live-Hack-CVE\/CVE-2022-20836", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20836", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20836 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:33Z", - "updated_at": "2022-12-23T17:01:33Z", - "pushed_at": "2022-12-23T17:01:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20838.json b/2022/CVE-2022-20838.json deleted file mode 100644 index d761735129..0000000000 --- a/2022/CVE-2022-20838.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596459, - "name": "CVE-2022-20838", - "full_name": "Live-Hack-CVE\/CVE-2022-20838", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20838", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20838 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:03Z", - "updated_at": "2022-12-23T17:02:03Z", - "pushed_at": "2022-12-23T17:02:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20839.json b/2022/CVE-2022-20839.json deleted file mode 100644 index d7804043b3..0000000000 --- a/2022/CVE-2022-20839.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596429, - "name": "CVE-2022-20839", - "full_name": "Live-Hack-CVE\/CVE-2022-20839", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20839", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20839 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:56Z", - "updated_at": "2022-12-23T17:01:56Z", - "pushed_at": "2022-12-23T17:01:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20840.json b/2022/CVE-2022-20840.json deleted file mode 100644 index 28e54f508b..0000000000 --- a/2022/CVE-2022-20840.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596472, - "name": "CVE-2022-20840", - "full_name": "Live-Hack-CVE\/CVE-2022-20840", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20840", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20840 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:06Z", - "updated_at": "2022-12-23T17:02:06Z", - "pushed_at": "2022-12-23T17:02:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20843.json b/2022/CVE-2022-20843.json deleted file mode 100644 index 421792d5e5..0000000000 --- a/2022/CVE-2022-20843.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596318, - "name": "CVE-2022-20843", - "full_name": "Live-Hack-CVE\/CVE-2022-20843", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20843", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20843 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:30Z", - "updated_at": "2022-12-23T17:01:30Z", - "pushed_at": "2022-12-23T17:01:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20867.json b/2022/CVE-2022-20867.json new file mode 100644 index 0000000000..0925f73dd6 --- /dev/null +++ b/2022/CVE-2022-20867.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670085, + "name": "CVE-2022-20867", + "full_name": "Live-Hack-CVE\/CVE-2022-20867", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20867", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20867 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:31Z", + "updated_at": "2022-12-23T22:34:31Z", + "pushed_at": "2022-12-23T22:34:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20868.json b/2022/CVE-2022-20868.json new file mode 100644 index 0000000000..8d3beefde6 --- /dev/null +++ b/2022/CVE-2022-20868.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670113, + "name": "CVE-2022-20868", + "full_name": "Live-Hack-CVE\/CVE-2022-20868", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20868", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20868 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:41Z", + "updated_at": "2022-12-23T22:34:41Z", + "pushed_at": "2022-12-23T22:34:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20872.json b/2022/CVE-2022-20872.json deleted file mode 100644 index 72a5a8e53c..0000000000 --- a/2022/CVE-2022-20872.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596505, - "name": "CVE-2022-20872", - "full_name": "Live-Hack-CVE\/CVE-2022-20872", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20872", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20872 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:13Z", - "updated_at": "2022-12-23T17:02:13Z", - "pushed_at": "2022-12-23T17:02:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20905.json b/2022/CVE-2022-20905.json deleted file mode 100644 index 31f1f7b06b..0000000000 --- a/2022/CVE-2022-20905.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596563, - "name": "CVE-2022-20905", - "full_name": "Live-Hack-CVE\/CVE-2022-20905", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20905", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20905 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:27Z", - "updated_at": "2022-12-23T17:02:27Z", - "pushed_at": "2022-12-23T17:02:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20918.json b/2022/CVE-2022-20918.json deleted file mode 100644 index 143069f51c..0000000000 --- a/2022/CVE-2022-20918.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574974, - "name": "CVE-2022-20918", - "full_name": "Live-Hack-CVE\/CVE-2022-20918", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20918", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20918 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:15Z", - "updated_at": "2022-12-23T15:42:15Z", - "pushed_at": "2022-12-23T15:42:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20922.json b/2022/CVE-2022-20922.json deleted file mode 100644 index c83eab8298..0000000000 --- a/2022/CVE-2022-20922.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574986, - "name": "CVE-2022-20922", - "full_name": "Live-Hack-CVE\/CVE-2022-20922", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20922", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20922 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:18Z", - "updated_at": "2022-12-23T15:42:18Z", - "pushed_at": "2022-12-23T15:42:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20924.json b/2022/CVE-2022-20924.json deleted file mode 100644 index e17cfcec03..0000000000 --- a/2022/CVE-2022-20924.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574341, - "name": "CVE-2022-20924", - "full_name": "Live-Hack-CVE\/CVE-2022-20924", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20924", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20924 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:01Z", - "updated_at": "2022-12-23T15:40:01Z", - "pushed_at": "2022-12-23T15:40:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20925.json b/2022/CVE-2022-20925.json deleted file mode 100644 index 29fa76e984..0000000000 --- a/2022/CVE-2022-20925.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575004, - "name": "CVE-2022-20925", - "full_name": "Live-Hack-CVE\/CVE-2022-20925", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20925", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20925 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:21Z", - "updated_at": "2022-12-23T15:42:21Z", - "pushed_at": "2022-12-23T15:42:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20926.json b/2022/CVE-2022-20926.json deleted file mode 100644 index 3bb33bc997..0000000000 --- a/2022/CVE-2022-20926.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575092, - "name": "CVE-2022-20926", - "full_name": "Live-Hack-CVE\/CVE-2022-20926", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20926", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20926 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:44Z", - "updated_at": "2022-12-23T15:42:44Z", - "pushed_at": "2022-12-23T15:42:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20927.json b/2022/CVE-2022-20927.json deleted file mode 100644 index 58c0f273ea..0000000000 --- a/2022/CVE-2022-20927.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574289, - "name": "CVE-2022-20927", - "full_name": "Live-Hack-CVE\/CVE-2022-20927", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20927", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20927 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:50Z", - "updated_at": "2022-12-23T15:39:50Z", - "pushed_at": "2022-12-23T15:39:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20928.json b/2022/CVE-2022-20928.json deleted file mode 100644 index 055f905f77..0000000000 --- a/2022/CVE-2022-20928.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585810, - "name": "CVE-2022-20928", - "full_name": "Live-Hack-CVE\/CVE-2022-20928", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20928", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20928 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:10Z", - "updated_at": "2022-12-23T16:22:11Z", - "pushed_at": "2022-12-23T16:22:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20932.json b/2022/CVE-2022-20932.json deleted file mode 100644 index b9cad308c4..0000000000 --- a/2022/CVE-2022-20932.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596543, - "name": "CVE-2022-20932", - "full_name": "Live-Hack-CVE\/CVE-2022-20932", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20932", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20932 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:20Z", - "updated_at": "2022-12-23T17:02:20Z", - "pushed_at": "2022-12-23T17:02:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20934.json b/2022/CVE-2022-20934.json deleted file mode 100644 index bf5e54a98b..0000000000 --- a/2022/CVE-2022-20934.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538602, - "name": "CVE-2022-20934", - "full_name": "Live-Hack-CVE\/CVE-2022-20934", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20934", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20934 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:05Z", - "updated_at": "2022-12-23T13:38:05Z", - "pushed_at": "2022-12-23T13:38:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20935.json b/2022/CVE-2022-20935.json deleted file mode 100644 index c37001ec3e..0000000000 --- a/2022/CVE-2022-20935.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596521, - "name": "CVE-2022-20935", - "full_name": "Live-Hack-CVE\/CVE-2022-20935", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20935", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20935 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:16Z", - "updated_at": "2022-12-23T17:02:17Z", - "pushed_at": "2022-12-23T17:02:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20936.json b/2022/CVE-2022-20936.json deleted file mode 100644 index 116130251d..0000000000 --- a/2022/CVE-2022-20936.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596555, - "name": "CVE-2022-20936", - "full_name": "Live-Hack-CVE\/CVE-2022-20936", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20936", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20936 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:24Z", - "updated_at": "2022-12-23T17:02:24Z", - "pushed_at": "2022-12-23T17:02:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20937.json b/2022/CVE-2022-20937.json new file mode 100644 index 0000000000..c477f33678 --- /dev/null +++ b/2022/CVE-2022-20937.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676572, + "name": "CVE-2022-20937", + "full_name": "Live-Hack-CVE\/CVE-2022-20937", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20937", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20937 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:24Z", + "updated_at": "2022-12-23T23:14:24Z", + "pushed_at": "2022-12-23T23:14:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20938.json b/2022/CVE-2022-20938.json deleted file mode 100644 index 34a1caf9ce..0000000000 --- a/2022/CVE-2022-20938.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585786, - "name": "CVE-2022-20938", - "full_name": "Live-Hack-CVE\/CVE-2022-20938", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20938", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20938 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:04Z", - "updated_at": "2022-12-23T16:22:04Z", - "pushed_at": "2022-12-23T16:22:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20940.json b/2022/CVE-2022-20940.json deleted file mode 100644 index 4375dadc1a..0000000000 --- a/2022/CVE-2022-20940.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574275, - "name": "CVE-2022-20940", - "full_name": "Live-Hack-CVE\/CVE-2022-20940", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20940", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20940 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:46Z", - "updated_at": "2022-12-23T15:39:46Z", - "pushed_at": "2022-12-23T15:39:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20941.json b/2022/CVE-2022-20941.json deleted file mode 100644 index f42a0b1c66..0000000000 --- a/2022/CVE-2022-20941.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585751, - "name": "CVE-2022-20941", - "full_name": "Live-Hack-CVE\/CVE-2022-20941", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20941", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20941 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:57Z", - "updated_at": "2022-12-23T16:21:57Z", - "pushed_at": "2022-12-23T16:21:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20942.json b/2022/CVE-2022-20942.json new file mode 100644 index 0000000000..0b7ab53f15 --- /dev/null +++ b/2022/CVE-2022-20942.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670105, + "name": "CVE-2022-20942", + "full_name": "Live-Hack-CVE\/CVE-2022-20942", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20942", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20942 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:37Z", + "updated_at": "2022-12-23T22:34:37Z", + "pushed_at": "2022-12-23T22:34:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20943.json b/2022/CVE-2022-20943.json deleted file mode 100644 index a532325508..0000000000 --- a/2022/CVE-2022-20943.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572490, - "name": "CVE-2022-20943", - "full_name": "Live-Hack-CVE\/CVE-2022-20943", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20943", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20943 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:51Z", - "updated_at": "2022-12-23T15:33:52Z", - "pushed_at": "2022-12-23T15:33:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20946.json b/2022/CVE-2022-20946.json deleted file mode 100644 index cb2c853be0..0000000000 --- a/2022/CVE-2022-20946.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574255, - "name": "CVE-2022-20946", - "full_name": "Live-Hack-CVE\/CVE-2022-20946", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20946", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20946 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:43Z", - "updated_at": "2022-12-23T15:39:43Z", - "pushed_at": "2022-12-23T15:39:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20947.json b/2022/CVE-2022-20947.json deleted file mode 100644 index e0b2c23917..0000000000 --- a/2022/CVE-2022-20947.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585712, - "name": "CVE-2022-20947", - "full_name": "Live-Hack-CVE\/CVE-2022-20947", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20947", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20947 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:50Z", - "updated_at": "2022-12-23T16:21:50Z", - "pushed_at": "2022-12-23T16:21:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20949.json b/2022/CVE-2022-20949.json deleted file mode 100644 index 9aa9a65656..0000000000 --- a/2022/CVE-2022-20949.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574237, - "name": "CVE-2022-20949", - "full_name": "Live-Hack-CVE\/CVE-2022-20949", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20949", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20949 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:40Z", - "updated_at": "2022-12-23T15:39:40Z", - "pushed_at": "2022-12-23T15:39:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20950.json b/2022/CVE-2022-20950.json deleted file mode 100644 index 1b7ce443c2..0000000000 --- a/2022/CVE-2022-20950.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574224, - "name": "CVE-2022-20950", - "full_name": "Live-Hack-CVE\/CVE-2022-20950", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20950", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20950 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:36Z", - "updated_at": "2022-12-23T15:39:36Z", - "pushed_at": "2022-12-23T15:39:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-20951.json b/2022/CVE-2022-20951.json new file mode 100644 index 0000000000..26a8b07350 --- /dev/null +++ b/2022/CVE-2022-20951.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676871, + "name": "CVE-2022-20951", + "full_name": "Live-Hack-CVE\/CVE-2022-20951", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20951", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20951 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:20Z", + "updated_at": "2022-12-23T23:16:20Z", + "pushed_at": "2022-12-23T23:16:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20956.json b/2022/CVE-2022-20956.json new file mode 100644 index 0000000000..9f567ae3f9 --- /dev/null +++ b/2022/CVE-2022-20956.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669849, + "name": "CVE-2022-20956", + "full_name": "Live-Hack-CVE\/CVE-2022-20956", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20956", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20956 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:17Z", + "updated_at": "2022-12-23T22:33:17Z", + "pushed_at": "2022-12-23T22:33:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20958.json b/2022/CVE-2022-20958.json new file mode 100644 index 0000000000..8d640f41bb --- /dev/null +++ b/2022/CVE-2022-20958.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669864, + "name": "CVE-2022-20958", + "full_name": "Live-Hack-CVE\/CVE-2022-20958", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20958", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20958 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:20Z", + "updated_at": "2022-12-23T22:33:20Z", + "pushed_at": "2022-12-23T22:33:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20960.json b/2022/CVE-2022-20960.json new file mode 100644 index 0000000000..5d73a03fbf --- /dev/null +++ b/2022/CVE-2022-20960.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669883, + "name": "CVE-2022-20960", + "full_name": "Live-Hack-CVE\/CVE-2022-20960", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20960", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20960 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:23Z", + "updated_at": "2022-12-23T22:33:23Z", + "pushed_at": "2022-12-23T22:33:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20961.json b/2022/CVE-2022-20961.json new file mode 100644 index 0000000000..5bc2d343dd --- /dev/null +++ b/2022/CVE-2022-20961.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669902, + "name": "CVE-2022-20961", + "full_name": "Live-Hack-CVE\/CVE-2022-20961", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20961", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20961 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:27Z", + "updated_at": "2022-12-23T22:33:27Z", + "pushed_at": "2022-12-23T22:33:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20962.json b/2022/CVE-2022-20962.json new file mode 100644 index 0000000000..c202d57686 --- /dev/null +++ b/2022/CVE-2022-20962.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669946, + "name": "CVE-2022-20962", + "full_name": "Live-Hack-CVE\/CVE-2022-20962", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20962", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20962 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:38Z", + "updated_at": "2022-12-23T22:33:38Z", + "pushed_at": "2022-12-23T22:33:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20963.json b/2022/CVE-2022-20963.json new file mode 100644 index 0000000000..d6844b0bf0 --- /dev/null +++ b/2022/CVE-2022-20963.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669954, + "name": "CVE-2022-20963", + "full_name": "Live-Hack-CVE\/CVE-2022-20963", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20963", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20963 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:41Z", + "updated_at": "2022-12-23T22:33:41Z", + "pushed_at": "2022-12-23T22:33:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-20969.json b/2022/CVE-2022-20969.json new file mode 100644 index 0000000000..2caaf0eee3 --- /dev/null +++ b/2022/CVE-2022-20969.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669969, + "name": "CVE-2022-20969", + "full_name": "Live-Hack-CVE\/CVE-2022-20969", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-20969", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-20969 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:47Z", + "updated_at": "2022-12-23T22:33:47Z", + "pushed_at": "2022-12-23T22:33:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21126.json b/2022/CVE-2022-21126.json deleted file mode 100644 index c6d50b78d8..0000000000 --- a/2022/CVE-2022-21126.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515800, - "name": "CVE-2022-21126", - "full_name": "Live-Hack-CVE\/CVE-2022-21126", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21126", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21126 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:22Z", - "updated_at": "2022-12-23T12:16:22Z", - "pushed_at": "2022-12-23T12:16:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-21198.json b/2022/CVE-2022-21198.json deleted file mode 100644 index 70aa1c9a28..0000000000 --- a/2022/CVE-2022-21198.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596797, - "name": "CVE-2022-21198", - "full_name": "Live-Hack-CVE\/CVE-2022-21198", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21198", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21198 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:03:19Z", - "updated_at": "2022-12-23T17:03:19Z", - "pushed_at": "2022-12-23T17:03:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2129.json b/2022/CVE-2022-2129.json deleted file mode 100644 index e39d23339a..0000000000 --- a/2022/CVE-2022-2129.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537637, - "name": "CVE-2022-2129", - "full_name": "Live-Hack-CVE\/CVE-2022-2129", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2129", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2129 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:48Z", - "updated_at": "2022-12-23T13:34:48Z", - "pushed_at": "2022-12-23T13:34:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2153.json b/2022/CVE-2022-2153.json deleted file mode 100644 index 48e7ee9940..0000000000 --- a/2022/CVE-2022-2153.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584147, - "name": "CVE-2022-2153", - "full_name": "Live-Hack-CVE\/CVE-2022-2153", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2153", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2153 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:10Z", - "updated_at": "2022-12-23T16:16:11Z", - "pushed_at": "2022-12-23T16:16:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-21589.json b/2022/CVE-2022-21589.json new file mode 100644 index 0000000000..26d887f816 --- /dev/null +++ b/2022/CVE-2022-21589.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682564, + "name": "CVE-2022-21589", + "full_name": "Live-Hack-CVE\/CVE-2022-21589", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21589", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21589 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:24Z", + "updated_at": "2022-12-23T23:54:24Z", + "pushed_at": "2022-12-23T23:54:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21592.json b/2022/CVE-2022-21592.json new file mode 100644 index 0000000000..a658d5d8a7 --- /dev/null +++ b/2022/CVE-2022-21592.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682544, + "name": "CVE-2022-21592", + "full_name": "Live-Hack-CVE\/CVE-2022-21592", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21592", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21592 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:17Z", + "updated_at": "2022-12-23T23:54:17Z", + "pushed_at": "2022-12-23T23:54:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21594.json b/2022/CVE-2022-21594.json new file mode 100644 index 0000000000..0f8a158705 --- /dev/null +++ b/2022/CVE-2022-21594.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682556, + "name": "CVE-2022-21594", + "full_name": "Live-Hack-CVE\/CVE-2022-21594", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21594", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21594 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:20Z", + "updated_at": "2022-12-23T23:54:20Z", + "pushed_at": "2022-12-23T23:54:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21595.json b/2022/CVE-2022-21595.json new file mode 100644 index 0000000000..a4f9e535f2 --- /dev/null +++ b/2022/CVE-2022-21595.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669379, + "name": "CVE-2022-21595", + "full_name": "Live-Hack-CVE\/CVE-2022-21595", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21595", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21595 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:37Z", + "updated_at": "2022-12-23T22:30:37Z", + "pushed_at": "2022-12-23T22:30:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21599.json b/2022/CVE-2022-21599.json new file mode 100644 index 0000000000..5998c7c144 --- /dev/null +++ b/2022/CVE-2022-21599.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682600, + "name": "CVE-2022-21599", + "full_name": "Live-Hack-CVE\/CVE-2022-21599", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21599", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21599 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:37Z", + "updated_at": "2022-12-23T23:54:37Z", + "pushed_at": "2022-12-23T23:54:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21600.json b/2022/CVE-2022-21600.json new file mode 100644 index 0000000000..2df5d6b59f --- /dev/null +++ b/2022/CVE-2022-21600.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682581, + "name": "CVE-2022-21600", + "full_name": "Live-Hack-CVE\/CVE-2022-21600", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21600", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21600 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:30Z", + "updated_at": "2022-12-23T23:54:30Z", + "pushed_at": "2022-12-23T23:54:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21604.json b/2022/CVE-2022-21604.json new file mode 100644 index 0000000000..547189a07d --- /dev/null +++ b/2022/CVE-2022-21604.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682591, + "name": "CVE-2022-21604", + "full_name": "Live-Hack-CVE\/CVE-2022-21604", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21604", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21604 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:33Z", + "updated_at": "2022-12-23T23:54:33Z", + "pushed_at": "2022-12-23T23:54:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21605.json b/2022/CVE-2022-21605.json new file mode 100644 index 0000000000..991a1c5c91 --- /dev/null +++ b/2022/CVE-2022-21605.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682728, + "name": "CVE-2022-21605", + "full_name": "Live-Hack-CVE\/CVE-2022-21605", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21605", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21605 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:27Z", + "updated_at": "2022-12-23T23:55:27Z", + "pushed_at": "2022-12-23T23:55:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21607.json b/2022/CVE-2022-21607.json new file mode 100644 index 0000000000..81b814c3fc --- /dev/null +++ b/2022/CVE-2022-21607.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682702, + "name": "CVE-2022-21607", + "full_name": "Live-Hack-CVE\/CVE-2022-21607", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21607", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21607 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:18Z", + "updated_at": "2022-12-23T23:55:18Z", + "pushed_at": "2022-12-23T23:55:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21608.json b/2022/CVE-2022-21608.json new file mode 100644 index 0000000000..1842620b37 --- /dev/null +++ b/2022/CVE-2022-21608.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682674, + "name": "CVE-2022-21608", + "full_name": "Live-Hack-CVE\/CVE-2022-21608", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21608", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21608 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:05Z", + "updated_at": "2022-12-24T00:00:42Z", + "pushed_at": "2022-12-23T23:55:07Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21611.json b/2022/CVE-2022-21611.json new file mode 100644 index 0000000000..75a5797de5 --- /dev/null +++ b/2022/CVE-2022-21611.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682679, + "name": "CVE-2022-21611", + "full_name": "Live-Hack-CVE\/CVE-2022-21611", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21611", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21611 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:08Z", + "updated_at": "2022-12-23T23:55:08Z", + "pushed_at": "2022-12-23T23:55:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21617.json b/2022/CVE-2022-21617.json new file mode 100644 index 0000000000..f2b9d905b1 --- /dev/null +++ b/2022/CVE-2022-21617.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682683, + "name": "CVE-2022-21617", + "full_name": "Live-Hack-CVE\/CVE-2022-21617", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21617", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21617 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:11Z", + "updated_at": "2022-12-23T23:55:11Z", + "pushed_at": "2022-12-23T23:55:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21625.json b/2022/CVE-2022-21625.json new file mode 100644 index 0000000000..5a05b36fa6 --- /dev/null +++ b/2022/CVE-2022-21625.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682693, + "name": "CVE-2022-21625", + "full_name": "Live-Hack-CVE\/CVE-2022-21625", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21625", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21625 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:15Z", + "updated_at": "2022-12-23T23:55:15Z", + "pushed_at": "2022-12-23T23:55:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21632.json b/2022/CVE-2022-21632.json new file mode 100644 index 0000000000..e77bb665d0 --- /dev/null +++ b/2022/CVE-2022-21632.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682570, + "name": "CVE-2022-21632", + "full_name": "Live-Hack-CVE\/CVE-2022-21632", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21632", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21632 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:27Z", + "updated_at": "2022-12-23T23:54:27Z", + "pushed_at": "2022-12-23T23:54:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21633.json b/2022/CVE-2022-21633.json new file mode 100644 index 0000000000..3d22833368 --- /dev/null +++ b/2022/CVE-2022-21633.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682798, + "name": "CVE-2022-21633", + "full_name": "Live-Hack-CVE\/CVE-2022-21633", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21633", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21633 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:55Z", + "updated_at": "2022-12-23T23:55:55Z", + "pushed_at": "2022-12-23T23:55:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21635.json b/2022/CVE-2022-21635.json new file mode 100644 index 0000000000..2407cc7f59 --- /dev/null +++ b/2022/CVE-2022-21635.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682790, + "name": "CVE-2022-21635", + "full_name": "Live-Hack-CVE\/CVE-2022-21635", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21635", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21635 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:52Z", + "updated_at": "2022-12-23T23:55:52Z", + "pushed_at": "2022-12-23T23:55:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21637.json b/2022/CVE-2022-21637.json new file mode 100644 index 0000000000..90d77d5b5b --- /dev/null +++ b/2022/CVE-2022-21637.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682781, + "name": "CVE-2022-21637", + "full_name": "Live-Hack-CVE\/CVE-2022-21637", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21637", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21637 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:48Z", + "updated_at": "2022-12-23T23:55:48Z", + "pushed_at": "2022-12-23T23:55:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21638.json b/2022/CVE-2022-21638.json new file mode 100644 index 0000000000..7a614ce6f6 --- /dev/null +++ b/2022/CVE-2022-21638.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682733, + "name": "CVE-2022-21638", + "full_name": "Live-Hack-CVE\/CVE-2022-21638", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21638", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21638 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:31Z", + "updated_at": "2022-12-23T23:55:31Z", + "pushed_at": "2022-12-23T23:55:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21640.json b/2022/CVE-2022-21640.json new file mode 100644 index 0000000000..1b91d57115 --- /dev/null +++ b/2022/CVE-2022-21640.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682771, + "name": "CVE-2022-21640", + "full_name": "Live-Hack-CVE\/CVE-2022-21640", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21640", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21640 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:45Z", + "updated_at": "2022-12-23T23:55:45Z", + "pushed_at": "2022-12-23T23:55:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21641.json b/2022/CVE-2022-21641.json new file mode 100644 index 0000000000..7774511e51 --- /dev/null +++ b/2022/CVE-2022-21641.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682834, + "name": "CVE-2022-21641", + "full_name": "Live-Hack-CVE\/CVE-2022-21641", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21641", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21641 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:05Z", + "updated_at": "2022-12-23T23:56:05Z", + "pushed_at": "2022-12-23T23:56:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21680.json b/2022/CVE-2022-21680.json new file mode 100644 index 0000000000..0314ce604e --- /dev/null +++ b/2022/CVE-2022-21680.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637084, + "name": "CVE-2022-21680", + "full_name": "Live-Hack-CVE\/CVE-2022-21680", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21680", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21680 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:05Z", + "updated_at": "2022-12-23T19:46:05Z", + "pushed_at": "2022-12-23T19:46:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21681.json b/2022/CVE-2022-21681.json new file mode 100644 index 0000000000..884fe3e877 --- /dev/null +++ b/2022/CVE-2022-21681.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637067, + "name": "CVE-2022-21681", + "full_name": "Live-Hack-CVE\/CVE-2022-21681", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21681", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21681 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:02Z", + "updated_at": "2022-12-23T19:46:02Z", + "pushed_at": "2022-12-23T19:46:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21724.json b/2022/CVE-2022-21724.json new file mode 100644 index 0000000000..26719d7d7f --- /dev/null +++ b/2022/CVE-2022-21724.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661263, + "name": "CVE-2022-21724", + "full_name": "Live-Hack-CVE\/CVE-2022-21724", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21724", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21724 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:02Z", + "updated_at": "2022-12-23T21:45:02Z", + "pushed_at": "2022-12-23T21:45:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21778.json b/2022/CVE-2022-21778.json new file mode 100644 index 0000000000..52a8f6af12 --- /dev/null +++ b/2022/CVE-2022-21778.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662303, + "name": "CVE-2022-21778", + "full_name": "Live-Hack-CVE\/CVE-2022-21778", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21778", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21778 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:20Z", + "updated_at": "2022-12-23T21:50:20Z", + "pushed_at": "2022-12-23T21:50:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21824.json b/2022/CVE-2022-21824.json new file mode 100644 index 0000000000..787bc5a12e --- /dev/null +++ b/2022/CVE-2022-21824.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655391, + "name": "CVE-2022-21824", + "full_name": "Live-Hack-CVE\/CVE-2022-21824", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21824", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21824 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:51Z", + "updated_at": "2022-12-23T21:13:51Z", + "pushed_at": "2022-12-23T21:13:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21831.json b/2022/CVE-2022-21831.json deleted file mode 100644 index c5e93ee2d1..0000000000 --- a/2022/CVE-2022-21831.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595692, - "name": "CVE-2022-21831", - "full_name": "Live-Hack-CVE\/CVE-2022-21831", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21831", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21831 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:18Z", - "updated_at": "2022-12-23T16:59:18Z", - "pushed_at": "2022-12-23T16:59:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2188.json b/2022/CVE-2022-2188.json new file mode 100644 index 0000000000..7194d4320c --- /dev/null +++ b/2022/CVE-2022-2188.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670377, + "name": "CVE-2022-2188", + "full_name": "Live-Hack-CVE\/CVE-2022-2188", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2188", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2188 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:07Z", + "updated_at": "2022-12-23T22:36:07Z", + "pushed_at": "2022-12-23T22:36:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-21944.json b/2022/CVE-2022-21944.json new file mode 100644 index 0000000000..cd46ccd327 --- /dev/null +++ b/2022/CVE-2022-21944.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670248, + "name": "CVE-2022-21944", + "full_name": "Live-Hack-CVE\/CVE-2022-21944", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-21944", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-21944 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:24Z", + "updated_at": "2022-12-23T22:35:24Z", + "pushed_at": "2022-12-23T22:35:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2214.json b/2022/CVE-2022-2214.json new file mode 100644 index 0000000000..3ab71aad7d --- /dev/null +++ b/2022/CVE-2022-2214.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628696, + "name": "CVE-2022-2214", + "full_name": "Live-Hack-CVE\/CVE-2022-2214", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2214", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2214 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:27Z", + "updated_at": "2022-12-23T19:08:27Z", + "pushed_at": "2022-12-23T19:08:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22425.json b/2022/CVE-2022-22425.json new file mode 100644 index 0000000000..5729980a39 --- /dev/null +++ b/2022/CVE-2022-22425.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683231, + "name": "CVE-2022-22425", + "full_name": "Live-Hack-CVE\/CVE-2022-22425", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22425", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22425 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:47Z", + "updated_at": "2022-12-23T23:58:47Z", + "pushed_at": "2022-12-23T23:58:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22442.json b/2022/CVE-2022-22442.json new file mode 100644 index 0000000000..07688d2b5b --- /dev/null +++ b/2022/CVE-2022-22442.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683265, + "name": "CVE-2022-22442", + "full_name": "Live-Hack-CVE\/CVE-2022-22442", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22442", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22442 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:59Z", + "updated_at": "2022-12-23T23:58:59Z", + "pushed_at": "2022-12-23T23:59:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22503.json b/2022/CVE-2022-22503.json new file mode 100644 index 0000000000..47346dea40 --- /dev/null +++ b/2022/CVE-2022-22503.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669320, + "name": "CVE-2022-22503", + "full_name": "Live-Hack-CVE\/CVE-2022-22503", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22503", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22503 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:20Z", + "updated_at": "2022-12-23T22:30:20Z", + "pushed_at": "2022-12-23T22:30:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22577.json b/2022/CVE-2022-22577.json deleted file mode 100644 index 70e1ea0eb0..0000000000 --- a/2022/CVE-2022-22577.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595706, - "name": "CVE-2022-22577", - "full_name": "Live-Hack-CVE\/CVE-2022-22577", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22577", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22577 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:22Z", - "updated_at": "2022-12-23T16:59:22Z", - "pushed_at": "2022-12-23T16:59:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2268.json b/2022/CVE-2022-2268.json new file mode 100644 index 0000000000..74d3fbaf99 --- /dev/null +++ b/2022/CVE-2022-2268.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677196, + "name": "CVE-2022-2268", + "full_name": "Live-Hack-CVE\/CVE-2022-2268", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2268", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2268 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:18Z", + "updated_at": "2022-12-23T23:18:18Z", + "pushed_at": "2022-12-23T23:18:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22808.json b/2022/CVE-2022-22808.json new file mode 100644 index 0000000000..6ebcd2ba05 --- /dev/null +++ b/2022/CVE-2022-22808.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647111, + "name": "CVE-2022-22808", + "full_name": "Live-Hack-CVE\/CVE-2022-22808", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22808", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22808 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:51Z", + "updated_at": "2022-12-23T20:32:51Z", + "pushed_at": "2022-12-23T20:32:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22815.json b/2022/CVE-2022-22815.json deleted file mode 100644 index 806a9cc479..0000000000 --- a/2022/CVE-2022-22815.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574633, - "name": "CVE-2022-22815", - "full_name": "Live-Hack-CVE\/CVE-2022-22815", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22815", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22815 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:05Z", - "updated_at": "2022-12-23T15:41:05Z", - "pushed_at": "2022-12-23T15:41:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-22816.json b/2022/CVE-2022-22816.json deleted file mode 100644 index 1d04ada39c..0000000000 --- a/2022/CVE-2022-22816.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574651, - "name": "CVE-2022-22816", - "full_name": "Live-Hack-CVE\/CVE-2022-22816", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22816", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22816 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:08Z", - "updated_at": "2022-12-23T15:41:08Z", - "pushed_at": "2022-12-23T15:41:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-22817.json b/2022/CVE-2022-22817.json deleted file mode 100644 index 22c0c663b3..0000000000 --- a/2022/CVE-2022-22817.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574666, - "name": "CVE-2022-22817", - "full_name": "Live-Hack-CVE\/CVE-2022-22817", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22817", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22817 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:11Z", - "updated_at": "2022-12-23T15:41:11Z", - "pushed_at": "2022-12-23T15:41:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-22818.json b/2022/CVE-2022-22818.json new file mode 100644 index 0000000000..2e45ac9393 --- /dev/null +++ b/2022/CVE-2022-22818.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676498, + "name": "CVE-2022-22818", + "full_name": "Live-Hack-CVE\/CVE-2022-22818", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22818", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22818 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:56Z", + "updated_at": "2022-12-23T23:13:56Z", + "pushed_at": "2022-12-23T23:13:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-22844.json b/2022/CVE-2022-22844.json new file mode 100644 index 0000000000..e767b38827 --- /dev/null +++ b/2022/CVE-2022-22844.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627635, + "name": "CVE-2022-22844", + "full_name": "Live-Hack-CVE\/CVE-2022-22844", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-22844", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-22844 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:13Z", + "updated_at": "2022-12-23T19:04:13Z", + "pushed_at": "2022-12-23T19:04:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2294.json b/2022/CVE-2022-2294.json deleted file mode 100644 index 2d9184ef09..0000000000 --- a/2022/CVE-2022-2294.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538131, - "name": "CVE-2022-2294", - "full_name": "Live-Hack-CVE\/CVE-2022-2294", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2294", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2294 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:28Z", - "updated_at": "2022-12-23T13:36:28Z", - "pushed_at": "2022-12-23T13:36:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23036.json b/2022/CVE-2022-23036.json deleted file mode 100644 index 2a12604319..0000000000 --- a/2022/CVE-2022-23036.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547823, - "name": "CVE-2022-23036", - "full_name": "Live-Hack-CVE\/CVE-2022-23036", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23036", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23036 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:10:22Z", - "updated_at": "2022-12-23T14:10:22Z", - "pushed_at": "2022-12-23T14:10:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23037.json b/2022/CVE-2022-23037.json deleted file mode 100644 index 673f00d92f..0000000000 --- a/2022/CVE-2022-23037.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547793, - "name": "CVE-2022-23037", - "full_name": "Live-Hack-CVE\/CVE-2022-23037", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23037", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23037 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:10:17Z", - "updated_at": "2022-12-23T14:10:17Z", - "pushed_at": "2022-12-23T14:10:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23038.json b/2022/CVE-2022-23038.json deleted file mode 100644 index 95e3b1ca3f..0000000000 --- a/2022/CVE-2022-23038.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547645, - "name": "CVE-2022-23038", - "full_name": "Live-Hack-CVE\/CVE-2022-23038", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23038", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23038 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:09:47Z", - "updated_at": "2022-12-23T14:09:47Z", - "pushed_at": "2022-12-23T14:09:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23039.json b/2022/CVE-2022-23039.json deleted file mode 100644 index 4eb655643d..0000000000 --- a/2022/CVE-2022-23039.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547626, - "name": "CVE-2022-23039", - "full_name": "Live-Hack-CVE\/CVE-2022-23039", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23039", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23039 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:09:44Z", - "updated_at": "2022-12-23T14:09:44Z", - "pushed_at": "2022-12-23T14:09:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23040.json b/2022/CVE-2022-23040.json deleted file mode 100644 index 00afea96aa..0000000000 --- a/2022/CVE-2022-23040.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547608, - "name": "CVE-2022-23040", - "full_name": "Live-Hack-CVE\/CVE-2022-23040", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23040", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23040 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:09:41Z", - "updated_at": "2022-12-23T14:09:41Z", - "pushed_at": "2022-12-23T14:09:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23041.json b/2022/CVE-2022-23041.json deleted file mode 100644 index bcfc6db795..0000000000 --- a/2022/CVE-2022-23041.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547853, - "name": "CVE-2022-23041", - "full_name": "Live-Hack-CVE\/CVE-2022-23041", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23041", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23041 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:10:28Z", - "updated_at": "2022-12-23T14:10:28Z", - "pushed_at": "2022-12-23T14:10:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23042.json b/2022/CVE-2022-23042.json deleted file mode 100644 index 2566b72009..0000000000 --- a/2022/CVE-2022-23042.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547838, - "name": "CVE-2022-23042", - "full_name": "Live-Hack-CVE\/CVE-2022-23042", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23042", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23042 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:10:25Z", - "updated_at": "2022-12-23T14:10:25Z", - "pushed_at": "2022-12-23T14:10:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2311.json b/2022/CVE-2022-2311.json deleted file mode 100644 index d30b7ff79b..0000000000 --- a/2022/CVE-2022-2311.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536652, - "name": "CVE-2022-2311", - "full_name": "Live-Hack-CVE\/CVE-2022-2311", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2311", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2311 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:29Z", - "updated_at": "2022-12-23T13:31:30Z", - "pushed_at": "2022-12-23T13:31:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23181.json b/2022/CVE-2022-23181.json new file mode 100644 index 0000000000..7c31315047 --- /dev/null +++ b/2022/CVE-2022-23181.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676439, + "name": "CVE-2022-23181", + "full_name": "Live-Hack-CVE\/CVE-2022-23181", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23181", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23181 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:32Z", + "updated_at": "2022-12-23T23:13:32Z", + "pushed_at": "2022-12-23T23:13:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23218.json b/2022/CVE-2022-23218.json new file mode 100644 index 0000000000..c6e453e38e --- /dev/null +++ b/2022/CVE-2022-23218.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670269, + "name": "CVE-2022-23218", + "full_name": "Live-Hack-CVE\/CVE-2022-23218", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23218", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23218 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:30Z", + "updated_at": "2022-12-23T22:35:30Z", + "pushed_at": "2022-12-23T22:35:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23219.json b/2022/CVE-2022-23219.json new file mode 100644 index 0000000000..90ed286227 --- /dev/null +++ b/2022/CVE-2022-23219.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670276, + "name": "CVE-2022-23219", + "full_name": "Live-Hack-CVE\/CVE-2022-23219", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23219", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23219 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:34Z", + "updated_at": "2022-12-23T22:35:34Z", + "pushed_at": "2022-12-23T22:35:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23632.json b/2022/CVE-2022-23632.json deleted file mode 100644 index a3b6a75a98..0000000000 --- a/2022/CVE-2022-23632.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562120, - "name": "CVE-2022-23632", - "full_name": "Live-Hack-CVE\/CVE-2022-23632", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23632", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23632 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:56Z", - "updated_at": "2022-12-23T14:57:56Z", - "pushed_at": "2022-12-23T14:57:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23708.json b/2022/CVE-2022-23708.json new file mode 100644 index 0000000000..4a140a385b --- /dev/null +++ b/2022/CVE-2022-23708.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661593, + "name": "CVE-2022-23708", + "full_name": "Live-Hack-CVE\/CVE-2022-23708", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23708", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23708 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:52Z", + "updated_at": "2022-12-23T21:46:52Z", + "pushed_at": "2022-12-23T21:46:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23740.json b/2022/CVE-2022-23740.json deleted file mode 100644 index d43f82450f..0000000000 --- a/2022/CVE-2022-23740.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526802, - "name": "CVE-2022-23740", - "full_name": "Live-Hack-CVE\/CVE-2022-23740", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23740", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23740 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:46Z", - "updated_at": "2022-12-23T12:56:46Z", - "pushed_at": "2022-12-23T12:56:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23743.json b/2022/CVE-2022-23743.json deleted file mode 100644 index ec05a3c882..0000000000 --- a/2022/CVE-2022-23743.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526734, - "name": "CVE-2022-23743", - "full_name": "Live-Hack-CVE\/CVE-2022-23743", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23743", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23743 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:29Z", - "updated_at": "2022-12-23T12:56:40Z", - "pushed_at": "2022-12-23T12:56:31Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-23772.json b/2022/CVE-2022-23772.json new file mode 100644 index 0000000000..312b105bdb --- /dev/null +++ b/2022/CVE-2022-23772.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661248, + "name": "CVE-2022-23772", + "full_name": "Live-Hack-CVE\/CVE-2022-23772", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23772", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23772 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:59Z", + "updated_at": "2022-12-23T21:44:59Z", + "pushed_at": "2022-12-23T21:45:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23773.json b/2022/CVE-2022-23773.json new file mode 100644 index 0000000000..3cc7fa8cd3 --- /dev/null +++ b/2022/CVE-2022-23773.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661293, + "name": "CVE-2022-23773", + "full_name": "Live-Hack-CVE\/CVE-2022-23773", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23773", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23773 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:45:12Z", + "updated_at": "2022-12-23T21:45:12Z", + "pushed_at": "2022-12-23T21:45:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23806.json b/2022/CVE-2022-23806.json new file mode 100644 index 0000000000..bd2c2250bd --- /dev/null +++ b/2022/CVE-2022-23806.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661673, + "name": "CVE-2022-23806", + "full_name": "Live-Hack-CVE\/CVE-2022-23806", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23806", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23806 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:18Z", + "updated_at": "2022-12-23T21:47:18Z", + "pushed_at": "2022-12-23T21:47:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23825.json b/2022/CVE-2022-23825.json new file mode 100644 index 0000000000..633b2890b9 --- /dev/null +++ b/2022/CVE-2022-23825.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653538, + "name": "CVE-2022-23825", + "full_name": "Live-Hack-CVE\/CVE-2022-23825", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23825", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23825 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:56Z", + "updated_at": "2022-12-23T21:04:56Z", + "pushed_at": "2022-12-23T21:04:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-23833.json b/2022/CVE-2022-23833.json new file mode 100644 index 0000000000..10cc74b31e --- /dev/null +++ b/2022/CVE-2022-23833.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676474, + "name": "CVE-2022-23833", + "full_name": "Live-Hack-CVE\/CVE-2022-23833", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-23833", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-23833 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:13:44Z", + "updated_at": "2022-12-23T23:13:44Z", + "pushed_at": "2022-12-23T23:13:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2387.json b/2022/CVE-2022-2387.json new file mode 100644 index 0000000000..f05f1a350a --- /dev/null +++ b/2022/CVE-2022-2387.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662112, + "name": "CVE-2022-2387", + "full_name": "Live-Hack-CVE\/CVE-2022-2387", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2387", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2387 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:26Z", + "updated_at": "2022-12-23T21:49:26Z", + "pushed_at": "2022-12-23T21:49:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24036.json b/2022/CVE-2022-24036.json deleted file mode 100644 index 332a684545..0000000000 --- a/2022/CVE-2022-24036.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595071, - "name": "CVE-2022-24036", - "full_name": "Live-Hack-CVE\/CVE-2022-24036", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24036", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24036 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:02Z", - "updated_at": "2022-12-23T16:57:02Z", - "pushed_at": "2022-12-23T16:57:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24037.json b/2022/CVE-2022-24037.json deleted file mode 100644 index 588a3dc223..0000000000 --- a/2022/CVE-2022-24037.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573434, - "name": "CVE-2022-24037", - "full_name": "Live-Hack-CVE\/CVE-2022-24037", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24037", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24037 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:01Z", - "updated_at": "2022-12-23T15:37:01Z", - "pushed_at": "2022-12-23T15:37:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24038.json b/2022/CVE-2022-24038.json deleted file mode 100644 index 391376697e..0000000000 --- a/2022/CVE-2022-24038.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573417, - "name": "CVE-2022-24038", - "full_name": "Live-Hack-CVE\/CVE-2022-24038", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24038", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24038 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:57Z", - "updated_at": "2022-12-23T15:36:57Z", - "pushed_at": "2022-12-23T15:37:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24082.json b/2022/CVE-2022-24082.json new file mode 100644 index 0000000000..ff9f6d931c --- /dev/null +++ b/2022/CVE-2022-24082.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676564, + "name": "CVE-2022-24082", + "full_name": "Live-Hack-CVE\/CVE-2022-24082", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24082", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24082 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:21Z", + "updated_at": "2022-12-23T23:14:21Z", + "pushed_at": "2022-12-23T23:14:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24303.json b/2022/CVE-2022-24303.json deleted file mode 100644 index 2100176cf3..0000000000 --- a/2022/CVE-2022-24303.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574557, - "name": "CVE-2022-24303", - "full_name": "Live-Hack-CVE\/CVE-2022-24303", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24303", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24303 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:48Z", - "updated_at": "2022-12-23T15:40:48Z", - "pushed_at": "2022-12-23T15:40:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24407.json b/2022/CVE-2022-24407.json new file mode 100644 index 0000000000..c54c232b10 --- /dev/null +++ b/2022/CVE-2022-24407.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676617, + "name": "CVE-2022-24407", + "full_name": "Live-Hack-CVE\/CVE-2022-24407", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24407", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24407 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:38Z", + "updated_at": "2022-12-23T23:14:38Z", + "pushed_at": "2022-12-23T23:14:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2449.json b/2022/CVE-2022-2449.json new file mode 100644 index 0000000000..5a02a99714 --- /dev/null +++ b/2022/CVE-2022-2449.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627750, + "name": "CVE-2022-2449", + "full_name": "Live-Hack-CVE\/CVE-2022-2449", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2449", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2449 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:42Z", + "updated_at": "2022-12-23T19:04:42Z", + "pushed_at": "2022-12-23T19:04:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24495.json b/2022/CVE-2022-24495.json new file mode 100644 index 0000000000..dcae119ed6 --- /dev/null +++ b/2022/CVE-2022-24495.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682405, + "name": "CVE-2022-24495", + "full_name": "Live-Hack-CVE\/CVE-2022-24495", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24495", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24495 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:32Z", + "updated_at": "2022-12-23T23:53:32Z", + "pushed_at": "2022-12-23T23:53:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2450.json b/2022/CVE-2022-2450.json new file mode 100644 index 0000000000..0da853be73 --- /dev/null +++ b/2022/CVE-2022-2450.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627764, + "name": "CVE-2022-2450", + "full_name": "Live-Hack-CVE\/CVE-2022-2450", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2450", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2450 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:45Z", + "updated_at": "2022-12-23T19:04:45Z", + "pushed_at": "2022-12-23T19:04:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24706.json b/2022/CVE-2022-24706.json index 74d0bb4910..5fc4f6af08 100644 --- a/2022/CVE-2022-24706.json +++ b/2022/CVE-2022-24706.json @@ -56,34 +56,5 @@ "forks": 0, "watchers": 0, "score": 0 - }, - { - "id": 581584768, - "name": "CVE-2022-24706", - "full_name": "Live-Hack-CVE\/CVE-2022-24706", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24706", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24706 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:18:29Z", - "updated_at": "2022-12-23T16:18:29Z", - "pushed_at": "2022-12-23T16:18:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-24714.json b/2022/CVE-2022-24714.json new file mode 100644 index 0000000000..25d1c49974 --- /dev/null +++ b/2022/CVE-2022-24714.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661561, + "name": "CVE-2022-24714", + "full_name": "Live-Hack-CVE\/CVE-2022-24714", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24714", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24714 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:42Z", + "updated_at": "2022-12-23T21:46:42Z", + "pushed_at": "2022-12-23T21:46:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24715.json b/2022/CVE-2022-24715.json new file mode 100644 index 0000000000..cde6d51616 --- /dev/null +++ b/2022/CVE-2022-24715.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661664, + "name": "CVE-2022-24715", + "full_name": "Live-Hack-CVE\/CVE-2022-24715", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24715", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24715 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:15Z", + "updated_at": "2022-12-23T21:47:15Z", + "pushed_at": "2022-12-23T21:47:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24716.json b/2022/CVE-2022-24716.json new file mode 100644 index 0000000000..cd6746ebac --- /dev/null +++ b/2022/CVE-2022-24716.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661571, + "name": "CVE-2022-24716", + "full_name": "Live-Hack-CVE\/CVE-2022-24716", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24716", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24716 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:45Z", + "updated_at": "2022-12-23T21:46:45Z", + "pushed_at": "2022-12-23T21:46:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24723.json b/2022/CVE-2022-24723.json deleted file mode 100644 index 4c8835c034..0000000000 --- a/2022/CVE-2022-24723.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538457, - "name": "CVE-2022-24723", - "full_name": "Live-Hack-CVE\/CVE-2022-24723", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24723", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24723 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:34Z", - "updated_at": "2022-12-23T13:37:34Z", - "pushed_at": "2022-12-23T13:37:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24754.json b/2022/CVE-2022-24754.json new file mode 100644 index 0000000000..e2c252e30c --- /dev/null +++ b/2022/CVE-2022-24754.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627415, + "name": "CVE-2022-24754", + "full_name": "Live-Hack-CVE\/CVE-2022-24754", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24754", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24754 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:09Z", + "updated_at": "2022-12-23T19:03:09Z", + "pushed_at": "2022-12-23T19:03:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2476.json b/2022/CVE-2022-2476.json deleted file mode 100644 index db515bcd7a..0000000000 --- a/2022/CVE-2022-2476.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584863, - "name": "CVE-2022-2476", - "full_name": "Live-Hack-CVE\/CVE-2022-2476", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2476", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2476 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:18:49Z", - "updated_at": "2022-12-23T16:18:49Z", - "pushed_at": "2022-12-23T16:18:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24786.json b/2022/CVE-2022-24786.json deleted file mode 100644 index 5bb4622846..0000000000 --- a/2022/CVE-2022-24786.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597442, - "name": "CVE-2022-24786", - "full_name": "Live-Hack-CVE\/CVE-2022-24786", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24786", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24786 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:39Z", - "updated_at": "2022-12-23T17:05:39Z", - "pushed_at": "2022-12-23T17:05:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24882.json b/2022/CVE-2022-24882.json new file mode 100644 index 0000000000..2c0ce96a51 --- /dev/null +++ b/2022/CVE-2022-24882.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626945, + "name": "CVE-2022-24882", + "full_name": "Live-Hack-CVE\/CVE-2022-24882", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24882", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24882 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:08Z", + "updated_at": "2022-12-23T19:01:08Z", + "pushed_at": "2022-12-23T19:01:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24883.json b/2022/CVE-2022-24883.json new file mode 100644 index 0000000000..75a620a090 --- /dev/null +++ b/2022/CVE-2022-24883.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626922, + "name": "CVE-2022-24883", + "full_name": "Live-Hack-CVE\/CVE-2022-24883", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24883", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24883 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:04Z", + "updated_at": "2022-12-23T19:01:04Z", + "pushed_at": "2022-12-23T19:01:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24903.json b/2022/CVE-2022-24903.json new file mode 100644 index 0000000000..bb3ee5cc81 --- /dev/null +++ b/2022/CVE-2022-24903.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646316, + "name": "CVE-2022-24903", + "full_name": "Live-Hack-CVE\/CVE-2022-24903", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24903", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24903 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:48Z", + "updated_at": "2022-12-23T20:28:49Z", + "pushed_at": "2022-12-23T20:28:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24921.json b/2022/CVE-2022-24921.json new file mode 100644 index 0000000000..b046b2eb52 --- /dev/null +++ b/2022/CVE-2022-24921.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661583, + "name": "CVE-2022-24921", + "full_name": "Live-Hack-CVE\/CVE-2022-24921", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24921", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24921 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:48Z", + "updated_at": "2022-12-23T21:46:48Z", + "pushed_at": "2022-12-23T21:46:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-24939.json b/2022/CVE-2022-24939.json deleted file mode 100644 index f7d99f5b13..0000000000 --- a/2022/CVE-2022-24939.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563071, - "name": "CVE-2022-24939", - "full_name": "Live-Hack-CVE\/CVE-2022-24939", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24939", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24939 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:01Z", - "updated_at": "2022-12-23T15:01:01Z", - "pushed_at": "2022-12-23T15:01:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24942.json b/2022/CVE-2022-24942.json deleted file mode 100644 index d723d41994..0000000000 --- a/2022/CVE-2022-24942.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585677, - "name": "CVE-2022-24942", - "full_name": "Live-Hack-CVE\/CVE-2022-24942", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24942", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24942 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:43Z", - "updated_at": "2022-12-23T16:21:43Z", - "pushed_at": "2022-12-23T16:21:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-24999.json b/2022/CVE-2022-24999.json index ba2b65588c..b8f65f1883 100644 --- a/2022/CVE-2022-24999.json +++ b/2022/CVE-2022-24999.json @@ -27,34 +27,5 @@ "forks": 1, "watchers": 3, "score": 0 - }, - { - "id": 581549775, - "name": "CVE-2022-24999", - "full_name": "Live-Hack-CVE\/CVE-2022-24999", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-24999", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-24999 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:51Z", - "updated_at": "2022-12-23T14:16:51Z", - "pushed_at": "2022-12-23T14:16:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-25164.json b/2022/CVE-2022-25164.json deleted file mode 100644 index 5f3a385c77..0000000000 --- a/2022/CVE-2022-25164.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548695, - "name": "CVE-2022-25164", - "full_name": "Live-Hack-CVE\/CVE-2022-25164", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25164", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25164 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:23Z", - "updated_at": "2022-12-23T14:13:23Z", - "pushed_at": "2022-12-23T14:13:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-25169.json b/2022/CVE-2022-25169.json new file mode 100644 index 0000000000..37320e64b6 --- /dev/null +++ b/2022/CVE-2022-25169.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661644, + "name": "CVE-2022-25169", + "full_name": "Live-Hack-CVE\/CVE-2022-25169", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25169", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25169 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:09Z", + "updated_at": "2022-12-23T21:47:09Z", + "pushed_at": "2022-12-23T21:47:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25243.json b/2022/CVE-2022-25243.json new file mode 100644 index 0000000000..c0673e2ef9 --- /dev/null +++ b/2022/CVE-2022-25243.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661545, + "name": "CVE-2022-25243", + "full_name": "Live-Hack-CVE\/CVE-2022-25243", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25243", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25243 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:35Z", + "updated_at": "2022-12-23T21:46:35Z", + "pushed_at": "2022-12-23T21:46:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2526.json b/2022/CVE-2022-2526.json new file mode 100644 index 0000000000..85cc355ac5 --- /dev/null +++ b/2022/CVE-2022-2526.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646295, + "name": "CVE-2022-2526", + "full_name": "Live-Hack-CVE\/CVE-2022-2526", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2526", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2526 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:42Z", + "updated_at": "2022-12-23T20:28:42Z", + "pushed_at": "2022-12-23T20:28:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25271.json b/2022/CVE-2022-25271.json new file mode 100644 index 0000000000..e427a1e9ea --- /dev/null +++ b/2022/CVE-2022-25271.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676957, + "name": "CVE-2022-25271", + "full_name": "Live-Hack-CVE\/CVE-2022-25271", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25271", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25271 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:55Z", + "updated_at": "2022-12-23T23:16:55Z", + "pushed_at": "2022-12-23T23:16:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25647.json b/2022/CVE-2022-25647.json deleted file mode 100644 index 192b4a07b2..0000000000 --- a/2022/CVE-2022-25647.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550524, - "name": "CVE-2022-25647", - "full_name": "Live-Hack-CVE\/CVE-2022-25647", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25647", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25647 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:09Z", - "updated_at": "2022-12-23T14:19:09Z", - "pushed_at": "2022-12-23T14:19:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-25765.json b/2022/CVE-2022-25765.json new file mode 100644 index 0000000000..25bf8e1607 --- /dev/null +++ b/2022/CVE-2022-25765.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646308, + "name": "CVE-2022-25765", + "full_name": "Live-Hack-CVE\/CVE-2022-25765", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25765", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25765 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:45Z", + "updated_at": "2022-12-23T20:28:45Z", + "pushed_at": "2022-12-23T20:28:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25794.json b/2022/CVE-2022-25794.json new file mode 100644 index 0000000000..ad32b846b2 --- /dev/null +++ b/2022/CVE-2022-25794.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628871, + "name": "CVE-2022-25794", + "full_name": "Live-Hack-CVE\/CVE-2022-25794", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25794", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25794 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:17Z", + "updated_at": "2022-12-23T19:09:17Z", + "pushed_at": "2022-12-23T19:09:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25799.json b/2022/CVE-2022-25799.json new file mode 100644 index 0000000000..3bbc0f5e16 --- /dev/null +++ b/2022/CVE-2022-25799.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628611, + "name": "CVE-2022-25799", + "full_name": "Live-Hack-CVE\/CVE-2022-25799", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25799", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25799 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:02Z", + "updated_at": "2022-12-23T19:08:02Z", + "pushed_at": "2022-12-23T19:08:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25844.json b/2022/CVE-2022-25844.json new file mode 100644 index 0000000000..4124bb0ecb --- /dev/null +++ b/2022/CVE-2022-25844.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628544, + "name": "CVE-2022-25844", + "full_name": "Live-Hack-CVE\/CVE-2022-25844", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25844", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25844 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:49Z", + "updated_at": "2022-12-23T19:07:49Z", + "pushed_at": "2022-12-23T19:07:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25848.json b/2022/CVE-2022-25848.json deleted file mode 100644 index 2539275b50..0000000000 --- a/2022/CVE-2022-25848.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515810, - "name": "CVE-2022-25848", - "full_name": "Live-Hack-CVE\/CVE-2022-25848", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25848", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25848 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:25Z", - "updated_at": "2022-12-23T12:16:25Z", - "pushed_at": "2022-12-23T12:16:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-25917.json b/2022/CVE-2022-25917.json deleted file mode 100644 index 76e5b1c599..0000000000 --- a/2022/CVE-2022-25917.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549088, - "name": "CVE-2022-25917", - "full_name": "Live-Hack-CVE\/CVE-2022-25917", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25917", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25917 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:42Z", - "updated_at": "2022-12-23T14:14:42Z", - "pushed_at": "2022-12-23T14:14:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-25932.json b/2022/CVE-2022-25932.json new file mode 100644 index 0000000000..3d75bf746b --- /dev/null +++ b/2022/CVE-2022-25932.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645119, + "name": "CVE-2022-25932", + "full_name": "Live-Hack-CVE\/CVE-2022-25932", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25932", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25932 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:14Z", + "updated_at": "2022-12-23T20:23:14Z", + "pushed_at": "2022-12-23T20:23:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-25952.json b/2022/CVE-2022-25952.json new file mode 100644 index 0000000000..79125eaf4e --- /dev/null +++ b/2022/CVE-2022-25952.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683203, + "name": "CVE-2022-25952", + "full_name": "Live-Hack-CVE\/CVE-2022-25952", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-25952", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-25952 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:34Z", + "updated_at": "2022-12-23T23:58:34Z", + "pushed_at": "2022-12-23T23:58:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26023.json b/2022/CVE-2022-26023.json new file mode 100644 index 0000000000..cfd82f0caf --- /dev/null +++ b/2022/CVE-2022-26023.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653989, + "name": "CVE-2022-26023", + "full_name": "Live-Hack-CVE\/CVE-2022-26023", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26023", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26023 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:07Z", + "updated_at": "2022-12-23T21:07:07Z", + "pushed_at": "2022-12-23T21:07:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26045.json b/2022/CVE-2022-26045.json new file mode 100644 index 0000000000..cc576f02db --- /dev/null +++ b/2022/CVE-2022-26045.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628177, + "name": "CVE-2022-26045", + "full_name": "Live-Hack-CVE\/CVE-2022-26045", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26045", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26045 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:17Z", + "updated_at": "2022-12-23T19:06:17Z", + "pushed_at": "2022-12-23T19:06:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26047.json b/2022/CVE-2022-26047.json deleted file mode 100644 index be0c89bd8b..0000000000 --- a/2022/CVE-2022-26047.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596957, - "name": "CVE-2022-26047", - "full_name": "Live-Hack-CVE\/CVE-2022-26047", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26047", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26047 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:03:58Z", - "updated_at": "2022-12-23T17:03:58Z", - "pushed_at": "2022-12-23T17:04:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26079.json b/2022/CVE-2022-26079.json new file mode 100644 index 0000000000..fb6c1ab22c --- /dev/null +++ b/2022/CVE-2022-26079.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628235, + "name": "CVE-2022-26079", + "full_name": "Live-Hack-CVE\/CVE-2022-26079", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26079", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26079 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:32Z", + "updated_at": "2022-12-23T19:06:32Z", + "pushed_at": "2022-12-23T19:06:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26088.json b/2022/CVE-2022-26088.json new file mode 100644 index 0000000000..83113a3f1b --- /dev/null +++ b/2022/CVE-2022-26088.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637872, + "name": "CVE-2022-26088", + "full_name": "Live-Hack-CVE\/CVE-2022-26088", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26088", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26088 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:26Z", + "updated_at": "2022-12-23T19:49:26Z", + "pushed_at": "2022-12-23T19:49:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26122.json b/2022/CVE-2022-26122.json new file mode 100644 index 0000000000..2d2ff7503e --- /dev/null +++ b/2022/CVE-2022-26122.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683307, + "name": "CVE-2022-26122", + "full_name": "Live-Hack-CVE\/CVE-2022-26122", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26122", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26122 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:18Z", + "updated_at": "2022-12-23T23:59:18Z", + "pushed_at": "2022-12-23T23:59:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26280.json b/2022/CVE-2022-26280.json deleted file mode 100644 index 826c8449d1..0000000000 --- a/2022/CVE-2022-26280.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549216, - "name": "CVE-2022-26280", - "full_name": "Live-Hack-CVE\/CVE-2022-26280", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26280", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26280 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:06Z", - "updated_at": "2022-12-23T14:15:06Z", - "pushed_at": "2022-12-23T14:15:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26367.json b/2022/CVE-2022-26367.json new file mode 100644 index 0000000000..24ad6e6630 --- /dev/null +++ b/2022/CVE-2022-26367.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628563, + "name": "CVE-2022-26367", + "full_name": "Live-Hack-CVE\/CVE-2022-26367", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26367", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26367 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:52Z", + "updated_at": "2022-12-23T19:07:52Z", + "pushed_at": "2022-12-23T19:07:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26369.json b/2022/CVE-2022-26369.json new file mode 100644 index 0000000000..9e566deec3 --- /dev/null +++ b/2022/CVE-2022-26369.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628304, + "name": "CVE-2022-26369", + "full_name": "Live-Hack-CVE\/CVE-2022-26369", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26369", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26369 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:50Z", + "updated_at": "2022-12-23T19:06:50Z", + "pushed_at": "2022-12-23T19:06:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2637.json b/2022/CVE-2022-2637.json new file mode 100644 index 0000000000..f662e543bd --- /dev/null +++ b/2022/CVE-2022-2637.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669165, + "name": "CVE-2022-2637", + "full_name": "Live-Hack-CVE\/CVE-2022-2637", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2637", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2637 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:30Z", + "updated_at": "2022-12-23T22:29:30Z", + "pushed_at": "2022-12-23T22:29:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26446.json b/2022/CVE-2022-26446.json new file mode 100644 index 0000000000..23c9e9b026 --- /dev/null +++ b/2022/CVE-2022-26446.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662237, + "name": "CVE-2022-26446", + "full_name": "Live-Hack-CVE\/CVE-2022-26446", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26446", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26446 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:03Z", + "updated_at": "2022-12-23T21:50:03Z", + "pushed_at": "2022-12-23T21:50:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26498.json b/2022/CVE-2022-26498.json deleted file mode 100644 index c33ef21f27..0000000000 --- a/2022/CVE-2022-26498.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597387, - "name": "CVE-2022-26498", - "full_name": "Live-Hack-CVE\/CVE-2022-26498", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26498", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26498 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:29Z", - "updated_at": "2022-12-23T17:05:29Z", - "pushed_at": "2022-12-23T17:05:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26499.json b/2022/CVE-2022-26499.json deleted file mode 100644 index 1c1cf00cab..0000000000 --- a/2022/CVE-2022-26499.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597403, - "name": "CVE-2022-26499", - "full_name": "Live-Hack-CVE\/CVE-2022-26499", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26499", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26499 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:32Z", - "updated_at": "2022-12-23T17:05:32Z", - "pushed_at": "2022-12-23T17:05:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2650.json b/2022/CVE-2022-2650.json deleted file mode 100644 index f764a3475c..0000000000 --- a/2022/CVE-2022-2650.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527195, - "name": "CVE-2022-2650", - "full_name": "Live-Hack-CVE\/CVE-2022-2650", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2650", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2650 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:58:14Z", - "updated_at": "2022-12-23T12:58:14Z", - "pushed_at": "2022-12-23T12:58:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26513.json b/2022/CVE-2022-26513.json new file mode 100644 index 0000000000..209108923c --- /dev/null +++ b/2022/CVE-2022-26513.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628318, + "name": "CVE-2022-26513", + "full_name": "Live-Hack-CVE\/CVE-2022-26513", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26513", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26513 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:54Z", + "updated_at": "2022-12-23T19:06:54Z", + "pushed_at": "2022-12-23T19:06:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26520.json b/2022/CVE-2022-26520.json new file mode 100644 index 0000000000..ef13b520af --- /dev/null +++ b/2022/CVE-2022-26520.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661552, + "name": "CVE-2022-26520", + "full_name": "Live-Hack-CVE\/CVE-2022-26520", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26520", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26520 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:39Z", + "updated_at": "2022-12-23T21:46:39Z", + "pushed_at": "2022-12-23T21:46:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2663.json b/2022/CVE-2022-2663.json deleted file mode 100644 index 5392c77971..0000000000 --- a/2022/CVE-2022-2663.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585950, - "name": "CVE-2022-2663", - "full_name": "Live-Hack-CVE\/CVE-2022-2663", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2663", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2663 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:38Z", - "updated_at": "2022-12-23T16:22:38Z", - "pushed_at": "2022-12-23T16:22:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26651.json b/2022/CVE-2022-26651.json deleted file mode 100644 index d76821cad2..0000000000 --- a/2022/CVE-2022-26651.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597424, - "name": "CVE-2022-26651", - "full_name": "Live-Hack-CVE\/CVE-2022-26651", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26651", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26651 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:36Z", - "updated_at": "2022-12-23T17:05:36Z", - "pushed_at": "2022-12-23T17:05:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-26704.json b/2022/CVE-2022-26704.json new file mode 100644 index 0000000000..7c7304ee4c --- /dev/null +++ b/2022/CVE-2022-26704.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653853, + "name": "CVE-2022-26704", + "full_name": "Live-Hack-CVE\/CVE-2022-26704", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26704", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26704 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:28Z", + "updated_at": "2022-12-23T21:06:28Z", + "pushed_at": "2022-12-23T21:06:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26730.json b/2022/CVE-2022-26730.json new file mode 100644 index 0000000000..e0a916e43e --- /dev/null +++ b/2022/CVE-2022-26730.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676056, + "name": "CVE-2022-26730", + "full_name": "Live-Hack-CVE\/CVE-2022-26730", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26730", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26730 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:58Z", + "updated_at": "2022-12-23T23:10:58Z", + "pushed_at": "2022-12-23T23:11:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26744.json b/2022/CVE-2022-26744.json new file mode 100644 index 0000000000..3e9e59cfa1 --- /dev/null +++ b/2022/CVE-2022-26744.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628510, + "name": "CVE-2022-26744", + "full_name": "Live-Hack-CVE\/CVE-2022-26744", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26744", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26744 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:42Z", + "updated_at": "2022-12-23T19:07:42Z", + "pushed_at": "2022-12-23T19:07:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-26885.json b/2022/CVE-2022-26885.json deleted file mode 100644 index 872a1b475f..0000000000 --- a/2022/CVE-2022-26885.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526585, - "name": "CVE-2022-26885", - "full_name": "Live-Hack-CVE\/CVE-2022-26885", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-26885", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-26885 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:54Z", - "updated_at": "2022-12-23T12:55:54Z", - "pushed_at": "2022-12-23T12:55:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2711.json b/2022/CVE-2022-2711.json new file mode 100644 index 0000000000..7644abf16a --- /dev/null +++ b/2022/CVE-2022-2711.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662076, + "name": "CVE-2022-2711", + "full_name": "Live-Hack-CVE\/CVE-2022-2711", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2711", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2711 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:17Z", + "updated_at": "2022-12-23T21:49:17Z", + "pushed_at": "2022-12-23T21:49:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27187.json b/2022/CVE-2022-27187.json new file mode 100644 index 0000000000..94222200a2 --- /dev/null +++ b/2022/CVE-2022-27187.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637508, + "name": "CVE-2022-27187", + "full_name": "Live-Hack-CVE\/CVE-2022-27187", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27187", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27187 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:43Z", + "updated_at": "2022-12-23T19:47:43Z", + "pushed_at": "2022-12-23T19:47:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27201.json b/2022/CVE-2022-27201.json deleted file mode 100644 index b1d434cee3..0000000000 --- a/2022/CVE-2022-27201.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538667, - "name": "CVE-2022-27201", - "full_name": "Live-Hack-CVE\/CVE-2022-27201", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27201", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27201 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:15Z", - "updated_at": "2022-12-23T13:38:15Z", - "pushed_at": "2022-12-23T13:38:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2721.json b/2022/CVE-2022-2721.json deleted file mode 100644 index aad1970fd5..0000000000 --- a/2022/CVE-2022-2721.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537113, - "name": "CVE-2022-2721", - "full_name": "Live-Hack-CVE\/CVE-2022-2721", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2721", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2721 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:33:04Z", - "updated_at": "2022-12-23T13:33:04Z", - "pushed_at": "2022-12-23T13:33:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-27233.json b/2022/CVE-2022-27233.json new file mode 100644 index 0000000000..92849908cc --- /dev/null +++ b/2022/CVE-2022-27233.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637519, + "name": "CVE-2022-27233", + "full_name": "Live-Hack-CVE\/CVE-2022-27233", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27233", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27233 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:46Z", + "updated_at": "2022-12-23T19:47:46Z", + "pushed_at": "2022-12-23T19:47:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27380.json b/2022/CVE-2022-27380.json new file mode 100644 index 0000000000..1be0d00041 --- /dev/null +++ b/2022/CVE-2022-27380.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669394, + "name": "CVE-2022-27380", + "full_name": "Live-Hack-CVE\/CVE-2022-27380", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27380", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27380 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:40Z", + "updated_at": "2022-12-23T22:30:40Z", + "pushed_at": "2022-12-23T22:30:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27510.json b/2022/CVE-2022-27510.json new file mode 100644 index 0000000000..d50c01f2b8 --- /dev/null +++ b/2022/CVE-2022-27510.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661215, + "name": "CVE-2022-27510", + "full_name": "Live-Hack-CVE\/CVE-2022-27510", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27510", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27510 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:49Z", + "updated_at": "2022-12-23T21:44:49Z", + "pushed_at": "2022-12-23T21:44:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27513.json b/2022/CVE-2022-27513.json new file mode 100644 index 0000000000..8538803617 --- /dev/null +++ b/2022/CVE-2022-27513.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661206, + "name": "CVE-2022-27513", + "full_name": "Live-Hack-CVE\/CVE-2022-27513", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27513", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27513 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:45Z", + "updated_at": "2022-12-23T21:44:45Z", + "pushed_at": "2022-12-23T21:44:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27516.json b/2022/CVE-2022-27516.json new file mode 100644 index 0000000000..c53a816592 --- /dev/null +++ b/2022/CVE-2022-27516.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662134, + "name": "CVE-2022-27516", + "full_name": "Live-Hack-CVE\/CVE-2022-27516", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27516", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27516 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:33Z", + "updated_at": "2022-12-23T21:49:33Z", + "pushed_at": "2022-12-23T21:49:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27536.json b/2022/CVE-2022-27536.json new file mode 100644 index 0000000000..d8f8b590d3 --- /dev/null +++ b/2022/CVE-2022-27536.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661615, + "name": "CVE-2022-27536", + "full_name": "Live-Hack-CVE\/CVE-2022-27536", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27536", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27536 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:46:59Z", + "updated_at": "2022-12-23T21:46:59Z", + "pushed_at": "2022-12-23T21:47:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2756.json b/2022/CVE-2022-2756.json new file mode 100644 index 0000000000..c4a3591e2a --- /dev/null +++ b/2022/CVE-2022-2756.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645367, + "name": "CVE-2022-2756", + "full_name": "Live-Hack-CVE\/CVE-2022-2756", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2756", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2756 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:24Z", + "updated_at": "2022-12-23T20:24:24Z", + "pushed_at": "2022-12-23T20:24:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2758.json b/2022/CVE-2022-2758.json new file mode 100644 index 0000000000..b434e5880c --- /dev/null +++ b/2022/CVE-2022-2758.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645257, + "name": "CVE-2022-2758", + "full_name": "Live-Hack-CVE\/CVE-2022-2758", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2758", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2758 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:48Z", + "updated_at": "2022-12-23T20:23:48Z", + "pushed_at": "2022-12-23T20:23:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2761.json b/2022/CVE-2022-2761.json new file mode 100644 index 0000000000..75311f006a --- /dev/null +++ b/2022/CVE-2022-2761.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647079, + "name": "CVE-2022-2761", + "full_name": "Live-Hack-CVE\/CVE-2022-2761", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2761", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2761 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:42Z", + "updated_at": "2022-12-23T20:32:42Z", + "pushed_at": "2022-12-23T20:32:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27639.json b/2022/CVE-2022-27639.json new file mode 100644 index 0000000000..e29582caf0 --- /dev/null +++ b/2022/CVE-2022-27639.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628844, + "name": "CVE-2022-27639", + "full_name": "Live-Hack-CVE\/CVE-2022-27639", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27639", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27639 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:10Z", + "updated_at": "2022-12-23T19:09:10Z", + "pushed_at": "2022-12-23T19:09:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2764.json b/2022/CVE-2022-2764.json new file mode 100644 index 0000000000..b7b37e29a2 --- /dev/null +++ b/2022/CVE-2022-2764.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676132, + "name": "CVE-2022-2764", + "full_name": "Live-Hack-CVE\/CVE-2022-2764", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2764", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2764 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:25Z", + "updated_at": "2022-12-23T23:11:25Z", + "pushed_at": "2022-12-23T23:11:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27650.json b/2022/CVE-2022-27650.json deleted file mode 100644 index 4206f0bd7f..0000000000 --- a/2022/CVE-2022-27650.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550352, - "name": "CVE-2022-27650", - "full_name": "Live-Hack-CVE\/CVE-2022-27650", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27650", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27650 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:36Z", - "updated_at": "2022-12-23T14:18:36Z", - "pushed_at": "2022-12-23T14:18:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2781.json b/2022/CVE-2022-2781.json new file mode 100644 index 0000000000..8e73391d40 --- /dev/null +++ b/2022/CVE-2022-2781.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655281, + "name": "CVE-2022-2781", + "full_name": "Live-Hack-CVE\/CVE-2022-2781", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2781", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2781 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:18Z", + "updated_at": "2022-12-23T21:13:18Z", + "pushed_at": "2022-12-23T21:13:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2783.json b/2022/CVE-2022-2783.json new file mode 100644 index 0000000000..0410017daf --- /dev/null +++ b/2022/CVE-2022-2783.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669354, + "name": "CVE-2022-2783", + "full_name": "Live-Hack-CVE\/CVE-2022-2783", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2783", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2783 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:30Z", + "updated_at": "2022-12-23T22:30:30Z", + "pushed_at": "2022-12-23T22:30:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27855.json b/2022/CVE-2022-27855.json new file mode 100644 index 0000000000..4dedbccd50 --- /dev/null +++ b/2022/CVE-2022-27855.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662989, + "name": "CVE-2022-27855", + "full_name": "Live-Hack-CVE\/CVE-2022-27855", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27855", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27855 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:05Z", + "updated_at": "2022-12-23T21:54:05Z", + "pushed_at": "2022-12-23T21:54:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27858.json b/2022/CVE-2022-27858.json new file mode 100644 index 0000000000..f210ce5158 --- /dev/null +++ b/2022/CVE-2022-27858.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662994, + "name": "CVE-2022-27858", + "full_name": "Live-Hack-CVE\/CVE-2022-27858", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27858", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27858 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:08Z", + "updated_at": "2022-12-23T21:54:08Z", + "pushed_at": "2022-12-23T21:54:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2787.json b/2022/CVE-2022-2787.json new file mode 100644 index 0000000000..678cb313dc --- /dev/null +++ b/2022/CVE-2022-2787.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626754, + "name": "CVE-2022-2787", + "full_name": "Live-Hack-CVE\/CVE-2022-2787", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2787", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2787 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:28Z", + "updated_at": "2022-12-23T19:00:29Z", + "pushed_at": "2022-12-23T19:00:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27874.json b/2022/CVE-2022-27874.json new file mode 100644 index 0000000000..14780bdd81 --- /dev/null +++ b/2022/CVE-2022-27874.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628789, + "name": "CVE-2022-27874", + "full_name": "Live-Hack-CVE\/CVE-2022-27874", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27874", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27874 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:51Z", + "updated_at": "2022-12-23T19:08:51Z", + "pushed_at": "2022-12-23T19:08:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27893.json b/2022/CVE-2022-27893.json new file mode 100644 index 0000000000..29bc392f59 --- /dev/null +++ b/2022/CVE-2022-27893.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646114, + "name": "CVE-2022-27893", + "full_name": "Live-Hack-CVE\/CVE-2022-27893", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27893", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27893 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:45Z", + "updated_at": "2022-12-23T20:27:45Z", + "pushed_at": "2022-12-23T20:27:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27894.json b/2022/CVE-2022-27894.json new file mode 100644 index 0000000000..6ebfebb43b --- /dev/null +++ b/2022/CVE-2022-27894.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681973, + "name": "CVE-2022-27894", + "full_name": "Live-Hack-CVE\/CVE-2022-27894", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27894", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27894 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:53Z", + "updated_at": "2022-12-23T23:50:53Z", + "pushed_at": "2022-12-23T23:50:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2791.json b/2022/CVE-2022-2791.json deleted file mode 100644 index 1cd63cfbda..0000000000 --- a/2022/CVE-2022-2791.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560656, - "name": "CVE-2022-2791", - "full_name": "Live-Hack-CVE\/CVE-2022-2791", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2791", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2791 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:11Z", - "updated_at": "2022-12-23T14:53:11Z", - "pushed_at": "2022-12-23T14:53:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-27914.json b/2022/CVE-2022-27914.json new file mode 100644 index 0000000000..ed36de1735 --- /dev/null +++ b/2022/CVE-2022-27914.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663009, + "name": "CVE-2022-27914", + "full_name": "Live-Hack-CVE\/CVE-2022-27914", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27914", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27914 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:11Z", + "updated_at": "2022-12-23T21:54:11Z", + "pushed_at": "2022-12-23T21:54:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-27949.json b/2022/CVE-2022-27949.json new file mode 100644 index 0000000000..3f62591e66 --- /dev/null +++ b/2022/CVE-2022-27949.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628052, + "name": "CVE-2022-27949", + "full_name": "Live-Hack-CVE\/CVE-2022-27949", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-27949", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-27949 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:48Z", + "updated_at": "2022-12-23T19:05:48Z", + "pushed_at": "2022-12-23T19:05:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2805.json b/2022/CVE-2022-2805.json new file mode 100644 index 0000000000..fc12afebff --- /dev/null +++ b/2022/CVE-2022-2805.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676904, + "name": "CVE-2022-2805", + "full_name": "Live-Hack-CVE\/CVE-2022-2805", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2805", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2805 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:34Z", + "updated_at": "2022-12-23T23:16:34Z", + "pushed_at": "2022-12-23T23:16:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28126.json b/2022/CVE-2022-28126.json new file mode 100644 index 0000000000..d108916a34 --- /dev/null +++ b/2022/CVE-2022-28126.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628753, + "name": "CVE-2022-28126", + "full_name": "Live-Hack-CVE\/CVE-2022-28126", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28126", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28126 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:41Z", + "updated_at": "2022-12-23T19:08:41Z", + "pushed_at": "2022-12-23T19:08:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28346.json b/2022/CVE-2022-28346.json index 212d870f1f..186cd4305e 100644 --- a/2022/CVE-2022-28346.json +++ b/2022/CVE-2022-28346.json @@ -114,5 +114,34 @@ "forks": 0, "watchers": 1, "score": 0 + }, + { + "id": 581676082, + "name": "CVE-2022-28346", + "full_name": "Live-Hack-CVE\/CVE-2022-28346", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28346", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28346 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:08Z", + "updated_at": "2022-12-23T23:11:08Z", + "pushed_at": "2022-12-23T23:11:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-28347.json b/2022/CVE-2022-28347.json new file mode 100644 index 0000000000..f6c5d7b3ac --- /dev/null +++ b/2022/CVE-2022-28347.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675789, + "name": "CVE-2022-28347", + "full_name": "Live-Hack-CVE\/CVE-2022-28347", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28347", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28347 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:24Z", + "updated_at": "2022-12-23T23:09:24Z", + "pushed_at": "2022-12-23T23:09:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28389.json b/2022/CVE-2022-28389.json deleted file mode 100644 index cd775fd436..0000000000 --- a/2022/CVE-2022-28389.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536834, - "name": "CVE-2022-28389", - "full_name": "Live-Hack-CVE\/CVE-2022-28389", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28389", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28389 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:12Z", - "updated_at": "2022-12-23T13:32:12Z", - "pushed_at": "2022-12-23T13:32:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28611.json b/2022/CVE-2022-28611.json new file mode 100644 index 0000000000..d47c6be819 --- /dev/null +++ b/2022/CVE-2022-28611.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628575, + "name": "CVE-2022-28611", + "full_name": "Live-Hack-CVE\/CVE-2022-28611", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28611", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28611 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:56Z", + "updated_at": "2022-12-23T19:07:56Z", + "pushed_at": "2022-12-23T19:07:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2863.json b/2022/CVE-2022-2863.json new file mode 100644 index 0000000000..1d8b736171 --- /dev/null +++ b/2022/CVE-2022-2863.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655307, + "name": "CVE-2022-2863", + "full_name": "Live-Hack-CVE\/CVE-2022-2863", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2863", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2863 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:25Z", + "updated_at": "2022-12-23T21:13:25Z", + "pushed_at": "2022-12-23T21:13:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2867.json b/2022/CVE-2022-2867.json deleted file mode 100644 index 642bc151a7..0000000000 --- a/2022/CVE-2022-2867.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538222, - "name": "CVE-2022-2867", - "full_name": "Live-Hack-CVE\/CVE-2022-2867", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2867", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2867 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:46Z", - "updated_at": "2022-12-23T13:36:46Z", - "pushed_at": "2022-12-23T13:36:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2868.json b/2022/CVE-2022-2868.json deleted file mode 100644 index c7fbfbb94a..0000000000 --- a/2022/CVE-2022-2868.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538236, - "name": "CVE-2022-2868", - "full_name": "Live-Hack-CVE\/CVE-2022-2868", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2868", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2868 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:50Z", - "updated_at": "2022-12-23T13:36:50Z", - "pushed_at": "2022-12-23T13:36:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28689.json b/2022/CVE-2022-28689.json new file mode 100644 index 0000000000..98fd008360 --- /dev/null +++ b/2022/CVE-2022-28689.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653903, + "name": "CVE-2022-28689", + "full_name": "Live-Hack-CVE\/CVE-2022-28689", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28689", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28689 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:41Z", + "updated_at": "2022-12-23T21:06:41Z", + "pushed_at": "2022-12-23T21:06:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2869.json b/2022/CVE-2022-2869.json deleted file mode 100644 index 9d708fd6f4..0000000000 --- a/2022/CVE-2022-2869.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550019, - "name": "CVE-2022-2869", - "full_name": "Live-Hack-CVE\/CVE-2022-2869", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2869", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2869 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:38Z", - "updated_at": "2022-12-23T14:17:38Z", - "pushed_at": "2022-12-23T14:17:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28697.json b/2022/CVE-2022-28697.json new file mode 100644 index 0000000000..26a1756820 --- /dev/null +++ b/2022/CVE-2022-28697.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676313, + "name": "CVE-2022-28697", + "full_name": "Live-Hack-CVE\/CVE-2022-28697", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28697", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28697 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:41Z", + "updated_at": "2022-12-23T23:12:41Z", + "pushed_at": "2022-12-23T23:12:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28738.json b/2022/CVE-2022-28738.json deleted file mode 100644 index 509fac0362..0000000000 --- a/2022/CVE-2022-28738.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537666, - "name": "CVE-2022-28738", - "full_name": "Live-Hack-CVE\/CVE-2022-28738", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28738", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28738 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:55Z", - "updated_at": "2022-12-23T13:34:55Z", - "pushed_at": "2022-12-23T13:34:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28739.json b/2022/CVE-2022-28739.json new file mode 100644 index 0000000000..9d3a84ffcc --- /dev/null +++ b/2022/CVE-2022-28739.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669365, + "name": "CVE-2022-28739", + "full_name": "Live-Hack-CVE\/CVE-2022-28739", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28739", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28739 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:34Z", + "updated_at": "2022-12-23T22:30:34Z", + "pushed_at": "2022-12-23T22:30:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28766.json b/2022/CVE-2022-28766.json deleted file mode 100644 index 3c8e9104a1..0000000000 --- a/2022/CVE-2022-28766.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573905, - "name": "CVE-2022-28766", - "full_name": "Live-Hack-CVE\/CVE-2022-28766", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28766", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28766 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:33Z", - "updated_at": "2022-12-23T15:38:33Z", - "pushed_at": "2022-12-23T15:38:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-28768.json b/2022/CVE-2022-28768.json deleted file mode 100644 index 6ed1518a18..0000000000 --- a/2022/CVE-2022-28768.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573847, - "name": "CVE-2022-28768", - "full_name": "Live-Hack-CVE\/CVE-2022-28768", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28768", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28768 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:20Z", - "updated_at": "2022-12-23T15:38:21Z", - "pushed_at": "2022-12-23T15:38:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2880.json b/2022/CVE-2022-2880.json new file mode 100644 index 0000000000..4fd598a17c --- /dev/null +++ b/2022/CVE-2022-2880.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655408, + "name": "CVE-2022-2880", + "full_name": "Live-Hack-CVE\/CVE-2022-2880", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2880", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2880 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:55Z", + "updated_at": "2022-12-23T21:13:55Z", + "pushed_at": "2022-12-23T21:13:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-28805.json b/2022/CVE-2022-28805.json deleted file mode 100644 index b754b66056..0000000000 --- a/2022/CVE-2022-28805.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526748, - "name": "CVE-2022-28805", - "full_name": "Live-Hack-CVE\/CVE-2022-28805", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-28805", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-28805 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:32Z", - "updated_at": "2022-12-23T12:56:32Z", - "pushed_at": "2022-12-23T12:56:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2881.json b/2022/CVE-2022-2881.json new file mode 100644 index 0000000000..fbea32a199 --- /dev/null +++ b/2022/CVE-2022-2881.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626724, + "name": "CVE-2022-2881", + "full_name": "Live-Hack-CVE\/CVE-2022-2881", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2881", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2881 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:21Z", + "updated_at": "2022-12-23T19:00:21Z", + "pushed_at": "2022-12-23T19:00:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2905.json b/2022/CVE-2022-2905.json deleted file mode 100644 index 703ff35aff..0000000000 --- a/2022/CVE-2022-2905.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584332, - "name": "CVE-2022-2905", - "full_name": "Live-Hack-CVE\/CVE-2022-2905", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2905", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2905 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:57Z", - "updated_at": "2022-12-23T16:16:57Z", - "pushed_at": "2022-12-23T16:16:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29078.json b/2022/CVE-2022-29078.json new file mode 100644 index 0000000000..94caf26236 --- /dev/null +++ b/2022/CVE-2022-29078.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661625, + "name": "CVE-2022-29078", + "full_name": "Live-Hack-CVE\/CVE-2022-29078", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29078", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29078 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:02Z", + "updated_at": "2022-12-23T21:47:02Z", + "pushed_at": "2022-12-23T21:47:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29275.json b/2022/CVE-2022-29275.json deleted file mode 100644 index 1c5881bd30..0000000000 --- a/2022/CVE-2022-29275.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563082, - "name": "CVE-2022-29275", - "full_name": "Live-Hack-CVE\/CVE-2022-29275", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29275", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29275 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:05Z", - "updated_at": "2022-12-23T15:01:05Z", - "pushed_at": "2022-12-23T15:01:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29276.json b/2022/CVE-2022-29276.json deleted file mode 100644 index 2e9f203562..0000000000 --- a/2022/CVE-2022-29276.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538537, - "name": "CVE-2022-29276", - "full_name": "Live-Hack-CVE\/CVE-2022-29276", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29276", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29276 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:51Z", - "updated_at": "2022-12-23T13:37:51Z", - "pushed_at": "2022-12-23T13:37:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29277.json b/2022/CVE-2022-29277.json deleted file mode 100644 index 9fc894d5cf..0000000000 --- a/2022/CVE-2022-29277.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573461, - "name": "CVE-2022-29277", - "full_name": "Live-Hack-CVE\/CVE-2022-29277", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29277", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29277 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:07Z", - "updated_at": "2022-12-23T15:37:08Z", - "pushed_at": "2022-12-23T15:37:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29278.json b/2022/CVE-2022-29278.json deleted file mode 100644 index 7baa8c264c..0000000000 --- a/2022/CVE-2022-29278.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538554, - "name": "CVE-2022-29278", - "full_name": "Live-Hack-CVE\/CVE-2022-29278", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29278", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29278 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:54Z", - "updated_at": "2022-12-23T13:37:55Z", - "pushed_at": "2022-12-23T13:37:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29279.json b/2022/CVE-2022-29279.json deleted file mode 100644 index b105ddd254..0000000000 --- a/2022/CVE-2022-29279.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562874, - "name": "CVE-2022-29279", - "full_name": "Live-Hack-CVE\/CVE-2022-29279", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29279", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29279 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:27Z", - "updated_at": "2022-12-23T15:00:27Z", - "pushed_at": "2022-12-23T15:00:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2928.json b/2022/CVE-2022-2928.json deleted file mode 100644 index dd629e0eca..0000000000 --- a/2022/CVE-2022-2928.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550238, - "name": "CVE-2022-2928", - "full_name": "Live-Hack-CVE\/CVE-2022-2928", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2928", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2928 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:16Z", - "updated_at": "2022-12-23T14:18:16Z", - "pushed_at": "2022-12-23T14:18:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2929.json b/2022/CVE-2022-2929.json deleted file mode 100644 index 3e77773360..0000000000 --- a/2022/CVE-2022-2929.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584846, - "name": "CVE-2022-2929", - "full_name": "Live-Hack-CVE\/CVE-2022-2929", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2929", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2929 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:18:46Z", - "updated_at": "2022-12-23T16:18:46Z", - "pushed_at": "2022-12-23T16:18:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29458.json b/2022/CVE-2022-29458.json new file mode 100644 index 0000000000..2cf8a3e64c --- /dev/null +++ b/2022/CVE-2022-29458.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669309, + "name": "CVE-2022-29458", + "full_name": "Live-Hack-CVE\/CVE-2022-29458", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29458", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29458 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:17Z", + "updated_at": "2022-12-23T22:30:17Z", + "pushed_at": "2022-12-23T22:30:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29481.json b/2022/CVE-2022-29481.json new file mode 100644 index 0000000000..0f5b048c08 --- /dev/null +++ b/2022/CVE-2022-29481.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653912, + "name": "CVE-2022-29481", + "full_name": "Live-Hack-CVE\/CVE-2022-29481", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29481", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29481 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:45Z", + "updated_at": "2022-12-23T21:06:45Z", + "pushed_at": "2022-12-23T21:06:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2953.json b/2022/CVE-2022-2953.json new file mode 100644 index 0000000000..97f0b56731 --- /dev/null +++ b/2022/CVE-2022-2953.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676266, + "name": "CVE-2022-2953", + "full_name": "Live-Hack-CVE\/CVE-2022-2953", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2953", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2953 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:12:24Z", + "updated_at": "2022-12-23T23:12:24Z", + "pushed_at": "2022-12-23T23:12:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29581.json b/2022/CVE-2022-29581.json deleted file mode 100644 index 296a3eca91..0000000000 --- a/2022/CVE-2022-29581.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581520392, - "name": "linux-4.19.72_CVE-2022-29581", - "full_name": "nidhihcl\/linux-4.19.72_CVE-2022-29581", - "owner": { - "login": "nidhihcl", - "id": 121002296, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121002296?v=4", - "html_url": "https:\/\/github.com\/nidhihcl" - }, - "html_url": "https:\/\/github.com\/nidhihcl\/linux-4.19.72_CVE-2022-29581", - "description": null, - "fork": false, - "created_at": "2022-12-23T12:33:21Z", - "updated_at": "2022-12-23T12:39:18Z", - "pushed_at": "2022-12-23T15:49:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29593.json b/2022/CVE-2022-29593.json index 33e96e81dd..27cb388e2a 100644 --- a/2022/CVE-2022-29593.json +++ b/2022/CVE-2022-29593.json @@ -27,5 +27,34 @@ "forks": 3, "watchers": 11, "score": 0 + }, + { + "id": 581677293, + "name": "CVE-2022-29593", + "full_name": "Live-Hack-CVE\/CVE-2022-29593", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29593", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29593 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:48Z", + "updated_at": "2022-12-23T23:18:48Z", + "pushed_at": "2022-12-23T23:18:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29620.json b/2022/CVE-2022-29620.json new file mode 100644 index 0000000000..7c454161dd --- /dev/null +++ b/2022/CVE-2022-29620.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662297, + "name": "CVE-2022-29620", + "full_name": "Live-Hack-CVE\/CVE-2022-29620", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29620", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29620 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:17Z", + "updated_at": "2022-12-23T21:50:17Z", + "pushed_at": "2022-12-23T21:50:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29774.json b/2022/CVE-2022-29774.json new file mode 100644 index 0000000000..0f3464d203 --- /dev/null +++ b/2022/CVE-2022-29774.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677307, + "name": "CVE-2022-29774", + "full_name": "Live-Hack-CVE\/CVE-2022-29774", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29774", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29774 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:54Z", + "updated_at": "2022-12-23T23:18:54Z", + "pushed_at": "2022-12-23T23:18:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29824.json b/2022/CVE-2022-29824.json new file mode 100644 index 0000000000..a5d3c8f977 --- /dev/null +++ b/2022/CVE-2022-29824.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645582, + "name": "CVE-2022-29824", + "full_name": "Live-Hack-CVE\/CVE-2022-29824", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29824", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29824 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:20Z", + "updated_at": "2022-12-23T20:25:20Z", + "pushed_at": "2022-12-23T20:25:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29825.json b/2022/CVE-2022-29825.json deleted file mode 100644 index b6af70f134..0000000000 --- a/2022/CVE-2022-29825.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548707, - "name": "CVE-2022-29825", - "full_name": "Live-Hack-CVE\/CVE-2022-29825", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29825", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29825 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:27Z", - "updated_at": "2022-12-23T14:13:27Z", - "pushed_at": "2022-12-23T14:13:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29826.json b/2022/CVE-2022-29826.json deleted file mode 100644 index 3bc106bca4..0000000000 --- a/2022/CVE-2022-29826.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548727, - "name": "CVE-2022-29826", - "full_name": "Live-Hack-CVE\/CVE-2022-29826", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29826", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29826 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:30Z", - "updated_at": "2022-12-23T14:13:30Z", - "pushed_at": "2022-12-23T14:13:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29827.json b/2022/CVE-2022-29827.json deleted file mode 100644 index 1ae0447d36..0000000000 --- a/2022/CVE-2022-29827.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548990, - "name": "CVE-2022-29827", - "full_name": "Live-Hack-CVE\/CVE-2022-29827", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29827", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29827 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:25Z", - "updated_at": "2022-12-23T14:14:25Z", - "pushed_at": "2022-12-23T14:14:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29828.json b/2022/CVE-2022-29828.json deleted file mode 100644 index 6a7d0689b7..0000000000 --- a/2022/CVE-2022-29828.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548860, - "name": "CVE-2022-29828", - "full_name": "Live-Hack-CVE\/CVE-2022-29828", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29828", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29828 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:57Z", - "updated_at": "2022-12-23T14:13:57Z", - "pushed_at": "2022-12-23T14:13:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29829.json b/2022/CVE-2022-29829.json deleted file mode 100644 index 058eca568b..0000000000 --- a/2022/CVE-2022-29829.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548878, - "name": "CVE-2022-29829", - "full_name": "Live-Hack-CVE\/CVE-2022-29829", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29829", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29829 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:01Z", - "updated_at": "2022-12-23T14:14:01Z", - "pushed_at": "2022-12-23T14:14:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-2983.json b/2022/CVE-2022-2983.json deleted file mode 100644 index 8d6b232413..0000000000 --- a/2022/CVE-2022-2983.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536667, - "name": "CVE-2022-2983", - "full_name": "Live-Hack-CVE\/CVE-2022-2983", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2983", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2983 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:33Z", - "updated_at": "2022-12-23T13:31:33Z", - "pushed_at": "2022-12-23T13:31:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29830.json b/2022/CVE-2022-29830.json deleted file mode 100644 index c4cf5179fd..0000000000 --- a/2022/CVE-2022-29830.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548739, - "name": "CVE-2022-29830", - "full_name": "Live-Hack-CVE\/CVE-2022-29830", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29830", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29830 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:34Z", - "updated_at": "2022-12-23T14:13:34Z", - "pushed_at": "2022-12-23T14:13:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29831.json b/2022/CVE-2022-29831.json deleted file mode 100644 index 80dc620916..0000000000 --- a/2022/CVE-2022-29831.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548896, - "name": "CVE-2022-29831", - "full_name": "Live-Hack-CVE\/CVE-2022-29831", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29831", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29831 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:04Z", - "updated_at": "2022-12-23T14:14:04Z", - "pushed_at": "2022-12-23T14:14:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29832.json b/2022/CVE-2022-29832.json deleted file mode 100644 index deffe9a31f..0000000000 --- a/2022/CVE-2022-29832.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548918, - "name": "CVE-2022-29832", - "full_name": "Live-Hack-CVE\/CVE-2022-29832", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29832", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29832 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:08Z", - "updated_at": "2022-12-23T14:14:08Z", - "pushed_at": "2022-12-23T14:14:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29833.json b/2022/CVE-2022-29833.json deleted file mode 100644 index 806fe0a053..0000000000 --- a/2022/CVE-2022-29833.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548936, - "name": "CVE-2022-29833", - "full_name": "Live-Hack-CVE\/CVE-2022-29833", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29833", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29833 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:12Z", - "updated_at": "2022-12-23T14:14:12Z", - "pushed_at": "2022-12-23T14:14:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29836.json b/2022/CVE-2022-29836.json new file mode 100644 index 0000000000..6034b0fa9b --- /dev/null +++ b/2022/CVE-2022-29836.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645155, + "name": "CVE-2022-29836", + "full_name": "Live-Hack-CVE\/CVE-2022-29836", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29836", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29836 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:25Z", + "updated_at": "2022-12-23T20:23:25Z", + "pushed_at": "2022-12-23T20:23:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-2986.json b/2022/CVE-2022-2986.json new file mode 100644 index 0000000000..d7d4995658 --- /dev/null +++ b/2022/CVE-2022-2986.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655169, + "name": "CVE-2022-2986", + "full_name": "Live-Hack-CVE\/CVE-2022-2986", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-2986", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-2986 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:48Z", + "updated_at": "2022-12-23T21:12:48Z", + "pushed_at": "2022-12-23T21:12:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29885.json b/2022/CVE-2022-29885.json index 31fbde0877..5d8a318d67 100644 --- a/2022/CVE-2022-29885.json +++ b/2022/CVE-2022-29885.json @@ -27,5 +27,34 @@ "forks": 4, "watchers": 3, "score": 0 + }, + { + "id": 581669136, + "name": "CVE-2022-29885", + "full_name": "Live-Hack-CVE\/CVE-2022-29885", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29885", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29885 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:23Z", + "updated_at": "2022-12-23T22:29:23Z", + "pushed_at": "2022-12-23T22:29:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29888.json b/2022/CVE-2022-29888.json new file mode 100644 index 0000000000..0c6349e304 --- /dev/null +++ b/2022/CVE-2022-29888.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654111, + "name": "CVE-2022-29888", + "full_name": "Live-Hack-CVE\/CVE-2022-29888", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29888", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29888 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:49Z", + "updated_at": "2022-12-23T21:07:49Z", + "pushed_at": "2022-12-23T21:07:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29930.json b/2022/CVE-2022-29930.json deleted file mode 100644 index 8ebac0292e..0000000000 --- a/2022/CVE-2022-29930.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548123, - "name": "CVE-2022-29930", - "full_name": "Live-Hack-CVE\/CVE-2022-29930", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29930", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29930 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:11:25Z", - "updated_at": "2022-12-23T14:11:25Z", - "pushed_at": "2022-12-23T14:11:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-29931.json b/2022/CVE-2022-29931.json new file mode 100644 index 0000000000..7c22d7ad2e --- /dev/null +++ b/2022/CVE-2022-29931.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677301, + "name": "CVE-2022-29931", + "full_name": "Live-Hack-CVE\/CVE-2022-29931", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29931", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29931 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:51Z", + "updated_at": "2022-12-23T23:18:51Z", + "pushed_at": "2022-12-23T23:18:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29959.json b/2022/CVE-2022-29959.json new file mode 100644 index 0000000000..3c21808507 --- /dev/null +++ b/2022/CVE-2022-29959.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663138, + "name": "CVE-2022-29959", + "full_name": "Live-Hack-CVE\/CVE-2022-29959", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29959", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29959 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:00Z", + "updated_at": "2022-12-23T21:55:00Z", + "pushed_at": "2022-12-23T21:55:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-29970.json b/2022/CVE-2022-29970.json new file mode 100644 index 0000000000..4e6b514920 --- /dev/null +++ b/2022/CVE-2022-29970.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628528, + "name": "CVE-2022-29970", + "full_name": "Live-Hack-CVE\/CVE-2022-29970", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-29970", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-29970 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:46Z", + "updated_at": "2022-12-23T19:07:46Z", + "pushed_at": "2022-12-23T19:07:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3002.json b/2022/CVE-2022-3002.json new file mode 100644 index 0000000000..b80b64f371 --- /dev/null +++ b/2022/CVE-2022-3002.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655214, + "name": "CVE-2022-3002", + "full_name": "Live-Hack-CVE\/CVE-2022-3002", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3002", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3002 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:02Z", + "updated_at": "2022-12-23T21:13:02Z", + "pushed_at": "2022-12-23T21:13:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3023.json b/2022/CVE-2022-3023.json new file mode 100644 index 0000000000..510b42b0ae --- /dev/null +++ b/2022/CVE-2022-3023.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681884, + "name": "CVE-2022-3023", + "full_name": "Live-Hack-CVE\/CVE-2022-3023", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3023", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3023 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:21Z", + "updated_at": "2022-12-23T23:50:21Z", + "pushed_at": "2022-12-23T23:50:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30256.json b/2022/CVE-2022-30256.json deleted file mode 100644 index 933aa7ec6a..0000000000 --- a/2022/CVE-2022-30256.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550627, - "name": "CVE-2022-30256", - "full_name": "Live-Hack-CVE\/CVE-2022-30256", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30256", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30256 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:31Z", - "updated_at": "2022-12-23T14:19:31Z", - "pushed_at": "2022-12-23T14:19:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30257.json b/2022/CVE-2022-30257.json deleted file mode 100644 index e9e9d59d88..0000000000 --- a/2022/CVE-2022-30257.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550292, - "name": "CVE-2022-30257", - "full_name": "Live-Hack-CVE\/CVE-2022-30257", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30257", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30257 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:26Z", - "updated_at": "2022-12-23T14:18:26Z", - "pushed_at": "2022-12-23T14:18:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30258.json b/2022/CVE-2022-30258.json deleted file mode 100644 index afc2b5ca49..0000000000 --- a/2022/CVE-2022-30258.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550314, - "name": "CVE-2022-30258", - "full_name": "Live-Hack-CVE\/CVE-2022-30258", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30258", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30258 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:29Z", - "updated_at": "2022-12-23T14:18:29Z", - "pushed_at": "2022-12-23T14:18:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3028.json b/2022/CVE-2022-3028.json deleted file mode 100644 index 32651e6044..0000000000 --- a/2022/CVE-2022-3028.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584160, - "name": "CVE-2022-3028", - "full_name": "Live-Hack-CVE\/CVE-2022-3028", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3028", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3028 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:14Z", - "updated_at": "2022-12-23T16:16:14Z", - "pushed_at": "2022-12-23T16:16:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30283.json b/2022/CVE-2022-30283.json deleted file mode 100644 index 1f3269dba4..0000000000 --- a/2022/CVE-2022-30283.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563051, - "name": "CVE-2022-30283", - "full_name": "Live-Hack-CVE\/CVE-2022-30283", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30283", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30283 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:58Z", - "updated_at": "2022-12-23T15:00:58Z", - "pushed_at": "2022-12-23T15:01:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30321.json b/2022/CVE-2022-30321.json deleted file mode 100644 index 5311fb307a..0000000000 --- a/2022/CVE-2022-30321.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585614, - "name": "CVE-2022-30321", - "full_name": "Live-Hack-CVE\/CVE-2022-30321", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30321", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30321 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:33Z", - "updated_at": "2022-12-23T16:21:33Z", - "pushed_at": "2022-12-23T16:21:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30322.json b/2022/CVE-2022-30322.json deleted file mode 100644 index 65a97a27c4..0000000000 --- a/2022/CVE-2022-30322.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585494, - "name": "CVE-2022-30322", - "full_name": "Live-Hack-CVE\/CVE-2022-30322", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30322", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30322 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:10Z", - "updated_at": "2022-12-23T16:21:10Z", - "pushed_at": "2022-12-23T16:21:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30323.json b/2022/CVE-2022-30323.json deleted file mode 100644 index 1774e0a4b0..0000000000 --- a/2022/CVE-2022-30323.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585473, - "name": "CVE-2022-30323", - "full_name": "Live-Hack-CVE\/CVE-2022-30323", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30323", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30323 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:06Z", - "updated_at": "2022-12-23T16:21:06Z", - "pushed_at": "2022-12-23T16:21:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30331.json b/2022/CVE-2022-30331.json new file mode 100644 index 0000000000..56c0b4fe51 --- /dev/null +++ b/2022/CVE-2022-30331.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636567, + "name": "CVE-2022-30331", + "full_name": "Live-Hack-CVE\/CVE-2022-30331", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30331", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30331 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:04Z", + "updated_at": "2022-12-23T19:44:05Z", + "pushed_at": "2022-12-23T19:44:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30515.json b/2022/CVE-2022-30515.json new file mode 100644 index 0000000000..cca7f083e8 --- /dev/null +++ b/2022/CVE-2022-30515.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662545, + "name": "CVE-2022-30515", + "full_name": "Live-Hack-CVE\/CVE-2022-30515", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30515", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30515 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:36Z", + "updated_at": "2022-12-23T21:51:36Z", + "pushed_at": "2022-12-23T21:51:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30529.json b/2022/CVE-2022-30529.json deleted file mode 100644 index 2ba0c05b66..0000000000 --- a/2022/CVE-2022-30529.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526860, - "name": "CVE-2022-30529", - "full_name": "Live-Hack-CVE\/CVE-2022-30529", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30529", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30529 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:03Z", - "updated_at": "2022-12-23T12:57:03Z", - "pushed_at": "2022-12-23T12:57:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30543.json b/2022/CVE-2022-30543.json new file mode 100644 index 0000000000..4ba60cc914 --- /dev/null +++ b/2022/CVE-2022-30543.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661708, + "name": "CVE-2022-30543", + "full_name": "Live-Hack-CVE\/CVE-2022-30543", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30543", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30543 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:28Z", + "updated_at": "2022-12-23T21:47:28Z", + "pushed_at": "2022-12-23T21:47:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30545.json b/2022/CVE-2022-30545.json new file mode 100644 index 0000000000..aecb959ecf --- /dev/null +++ b/2022/CVE-2022-30545.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663018, + "name": "CVE-2022-30545", + "full_name": "Live-Hack-CVE\/CVE-2022-30545", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30545", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30545 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:15Z", + "updated_at": "2022-12-23T21:54:15Z", + "pushed_at": "2022-12-23T21:54:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30608.json b/2022/CVE-2022-30608.json new file mode 100644 index 0000000000..bd9b7d16f3 --- /dev/null +++ b/2022/CVE-2022-30608.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683198, + "name": "CVE-2022-30608", + "full_name": "Live-Hack-CVE\/CVE-2022-30608", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30608", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30608 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:31Z", + "updated_at": "2022-12-23T23:58:31Z", + "pushed_at": "2022-12-23T23:58:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3061.json b/2022/CVE-2022-3061.json deleted file mode 100644 index 97d73e1b1f..0000000000 --- a/2022/CVE-2022-3061.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584134, - "name": "CVE-2022-3061", - "full_name": "Live-Hack-CVE\/CVE-2022-3061", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3061", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3061 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:07Z", - "updated_at": "2022-12-23T16:16:07Z", - "pushed_at": "2022-12-23T16:16:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30615.json b/2022/CVE-2022-30615.json new file mode 100644 index 0000000000..89d108b66e --- /dev/null +++ b/2022/CVE-2022-30615.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683204, + "name": "CVE-2022-30615", + "full_name": "Live-Hack-CVE\/CVE-2022-30615", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30615", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30615 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:37Z", + "updated_at": "2022-12-23T23:58:37Z", + "pushed_at": "2022-12-23T23:58:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30674.json b/2022/CVE-2022-30674.json new file mode 100644 index 0000000000..f16f03af1f --- /dev/null +++ b/2022/CVE-2022-30674.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646266, + "name": "CVE-2022-30674", + "full_name": "Live-Hack-CVE\/CVE-2022-30674", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30674", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30674 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:29Z", + "updated_at": "2022-12-23T20:28:29Z", + "pushed_at": "2022-12-23T20:28:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30771.json b/2022/CVE-2022-30771.json deleted file mode 100644 index 3d6b5f1854..0000000000 --- a/2022/CVE-2022-30771.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562938, - "name": "CVE-2022-30771", - "full_name": "Live-Hack-CVE\/CVE-2022-30771", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30771", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30771 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:37Z", - "updated_at": "2022-12-23T15:00:37Z", - "pushed_at": "2022-12-23T15:00:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30772.json b/2022/CVE-2022-30772.json deleted file mode 100644 index 8d1bc3f46b..0000000000 --- a/2022/CVE-2022-30772.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562896, - "name": "CVE-2022-30772", - "full_name": "Live-Hack-CVE\/CVE-2022-30772", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30772", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30772 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:30Z", - "updated_at": "2022-12-23T15:00:30Z", - "pushed_at": "2022-12-23T15:00:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3090.json b/2022/CVE-2022-3090.json deleted file mode 100644 index 4369f99524..0000000000 --- a/2022/CVE-2022-3090.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573449, - "name": "CVE-2022-3090", - "full_name": "Live-Hack-CVE\/CVE-2022-3090", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3090", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3090 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:04Z", - "updated_at": "2022-12-23T15:37:04Z", - "pushed_at": "2022-12-23T15:37:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-30945.json b/2022/CVE-2022-30945.json new file mode 100644 index 0000000000..52253778f3 --- /dev/null +++ b/2022/CVE-2022-30945.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628089, + "name": "CVE-2022-30945", + "full_name": "Live-Hack-CVE\/CVE-2022-30945", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30945", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30945 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:55Z", + "updated_at": "2022-12-23T19:05:55Z", + "pushed_at": "2022-12-23T19:05:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-30952.json b/2022/CVE-2022-30952.json new file mode 100644 index 0000000000..6f26415e13 --- /dev/null +++ b/2022/CVE-2022-30952.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646598, + "name": "CVE-2022-30952", + "full_name": "Live-Hack-CVE\/CVE-2022-30952", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-30952", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-30952 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:10Z", + "updated_at": "2022-12-23T20:30:10Z", + "pushed_at": "2022-12-23T20:30:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3097.json b/2022/CVE-2022-3097.json deleted file mode 100644 index efbb6b4389..0000000000 --- a/2022/CVE-2022-3097.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538589, - "name": "CVE-2022-3097", - "full_name": "Live-Hack-CVE\/CVE-2022-3097", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3097", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3097 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:01Z", - "updated_at": "2022-12-23T13:38:01Z", - "pushed_at": "2022-12-23T13:38:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31001.json b/2022/CVE-2022-31001.json new file mode 100644 index 0000000000..ab556e6ed2 --- /dev/null +++ b/2022/CVE-2022-31001.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626874, + "name": "CVE-2022-31001", + "full_name": "Live-Hack-CVE\/CVE-2022-31001", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31001", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31001 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:53Z", + "updated_at": "2022-12-23T19:00:53Z", + "pushed_at": "2022-12-23T19:00:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31002.json b/2022/CVE-2022-31002.json new file mode 100644 index 0000000000..1c1ff8fe11 --- /dev/null +++ b/2022/CVE-2022-31002.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626895, + "name": "CVE-2022-31002", + "full_name": "Live-Hack-CVE\/CVE-2022-31002", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31002", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31002 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:57Z", + "updated_at": "2022-12-23T19:00:57Z", + "pushed_at": "2022-12-23T19:00:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31008.json b/2022/CVE-2022-31008.json new file mode 100644 index 0000000000..d4755dd757 --- /dev/null +++ b/2022/CVE-2022-31008.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675963, + "name": "CVE-2022-31008", + "full_name": "Live-Hack-CVE\/CVE-2022-31008", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31008", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31008 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:21Z", + "updated_at": "2022-12-23T23:10:21Z", + "pushed_at": "2022-12-23T23:10:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31030.json b/2022/CVE-2022-31030.json deleted file mode 100644 index 85303ab1b2..0000000000 --- a/2022/CVE-2022-31030.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537958, - "name": "CVE-2022-31030", - "full_name": "Live-Hack-CVE\/CVE-2022-31030", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31030", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31030 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:35:58Z", - "updated_at": "2022-12-23T13:35:58Z", - "pushed_at": "2022-12-23T13:36:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31031.json b/2022/CVE-2022-31031.json new file mode 100644 index 0000000000..73da5e9bbf --- /dev/null +++ b/2022/CVE-2022-31031.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626807, + "name": "CVE-2022-31031", + "full_name": "Live-Hack-CVE\/CVE-2022-31031", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31031", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31031 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:39Z", + "updated_at": "2022-12-23T19:00:39Z", + "pushed_at": "2022-12-23T19:00:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31033.json b/2022/CVE-2022-31033.json deleted file mode 100644 index fdc949d1fb..0000000000 --- a/2022/CVE-2022-31033.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537735, - "name": "CVE-2022-31033", - "full_name": "Live-Hack-CVE\/CVE-2022-31033", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31033", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31033 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:35:09Z", - "updated_at": "2022-12-23T13:35:09Z", - "pushed_at": "2022-12-23T13:35:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31097.json b/2022/CVE-2022-31097.json deleted file mode 100644 index 51a71b35bf..0000000000 --- a/2022/CVE-2022-31097.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572497, - "name": "CVE-2022-31097", - "full_name": "Live-Hack-CVE\/CVE-2022-31097", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31097", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31097 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:55Z", - "updated_at": "2022-12-23T15:33:55Z", - "pushed_at": "2022-12-23T15:33:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31116.json b/2022/CVE-2022-31116.json new file mode 100644 index 0000000000..f242af691e --- /dev/null +++ b/2022/CVE-2022-31116.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677176, + "name": "CVE-2022-31116", + "full_name": "Live-Hack-CVE\/CVE-2022-31116", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31116", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31116 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:11Z", + "updated_at": "2022-12-23T23:18:11Z", + "pushed_at": "2022-12-23T23:18:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31117.json b/2022/CVE-2022-31117.json new file mode 100644 index 0000000000..35f63d4da2 --- /dev/null +++ b/2022/CVE-2022-31117.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677278, + "name": "CVE-2022-31117", + "full_name": "Live-Hack-CVE\/CVE-2022-31117", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31117", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31117 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:41Z", + "updated_at": "2022-12-23T23:18:42Z", + "pushed_at": "2022-12-23T23:18:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31137.json b/2022/CVE-2022-31137.json new file mode 100644 index 0000000000..1712009738 --- /dev/null +++ b/2022/CVE-2022-31137.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677224, + "name": "CVE-2022-31137", + "full_name": "Live-Hack-CVE\/CVE-2022-31137", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31137", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31137 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:24Z", + "updated_at": "2022-12-23T23:18:24Z", + "pushed_at": "2022-12-23T23:18:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31199.json b/2022/CVE-2022-31199.json new file mode 100644 index 0000000000..db83e6509c --- /dev/null +++ b/2022/CVE-2022-31199.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662124, + "name": "CVE-2022-31199", + "full_name": "Live-Hack-CVE\/CVE-2022-31199", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31199", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31199 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:30Z", + "updated_at": "2022-12-23T21:49:30Z", + "pushed_at": "2022-12-23T21:49:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3122.json b/2022/CVE-2022-3122.json new file mode 100644 index 0000000000..b6f8eefaa7 --- /dev/null +++ b/2022/CVE-2022-3122.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638312, + "name": "CVE-2022-3122", + "full_name": "Live-Hack-CVE\/CVE-2022-3122", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3122", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3122 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:25Z", + "updated_at": "2022-12-23T19:51:25Z", + "pushed_at": "2022-12-23T19:51:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31250.json b/2022/CVE-2022-31250.json new file mode 100644 index 0000000000..026b7b8b4e --- /dev/null +++ b/2022/CVE-2022-31250.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670306, + "name": "CVE-2022-31250", + "full_name": "Live-Hack-CVE\/CVE-2022-31250", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31250", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31250 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:43Z", + "updated_at": "2022-12-23T22:35:43Z", + "pushed_at": "2022-12-23T22:35:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31252.json b/2022/CVE-2022-31252.json new file mode 100644 index 0000000000..8d711c4841 --- /dev/null +++ b/2022/CVE-2022-31252.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675978, + "name": "CVE-2022-31252", + "full_name": "Live-Hack-CVE\/CVE-2022-31252", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31252", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31252 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:28Z", + "updated_at": "2022-12-23T23:10:28Z", + "pushed_at": "2022-12-23T23:10:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31253.json b/2022/CVE-2022-31253.json new file mode 100644 index 0000000000..9d5233d503 --- /dev/null +++ b/2022/CVE-2022-31253.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653864, + "name": "CVE-2022-31253", + "full_name": "Live-Hack-CVE\/CVE-2022-31253", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31253", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31253 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:31Z", + "updated_at": "2022-12-23T21:06:31Z", + "pushed_at": "2022-12-23T21:06:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31255.json b/2022/CVE-2022-31255.json new file mode 100644 index 0000000000..d78c5b3059 --- /dev/null +++ b/2022/CVE-2022-31255.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628422, + "name": "CVE-2022-31255", + "full_name": "Live-Hack-CVE\/CVE-2022-31255", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31255", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31255 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:18Z", + "updated_at": "2022-12-23T19:07:18Z", + "pushed_at": "2022-12-23T19:07:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31325.json b/2022/CVE-2022-31325.json deleted file mode 100644 index 9a475cd6b1..0000000000 --- a/2022/CVE-2022-31325.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537998, - "name": "CVE-2022-31325", - "full_name": "Live-Hack-CVE\/CVE-2022-31325", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31325", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31325 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:05Z", - "updated_at": "2022-12-23T13:36:05Z", - "pushed_at": "2022-12-23T13:36:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31500.json b/2022/CVE-2022-31500.json new file mode 100644 index 0000000000..a300e2639d --- /dev/null +++ b/2022/CVE-2022-31500.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682453, + "name": "CVE-2022-31500", + "full_name": "Live-Hack-CVE\/CVE-2022-31500", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31500", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31500 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:45Z", + "updated_at": "2022-12-23T23:53:45Z", + "pushed_at": "2022-12-23T23:53:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31606.json b/2022/CVE-2022-31606.json deleted file mode 100644 index ddbf6eb250..0000000000 --- a/2022/CVE-2022-31606.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549035, - "name": "CVE-2022-31606", - "full_name": "Live-Hack-CVE\/CVE-2022-31606", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31606", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31606 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:32Z", - "updated_at": "2022-12-23T14:14:32Z", - "pushed_at": "2022-12-23T14:14:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31607.json b/2022/CVE-2022-31607.json deleted file mode 100644 index 42b2b4b629..0000000000 --- a/2022/CVE-2022-31607.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538303, - "name": "CVE-2022-31607", - "full_name": "Live-Hack-CVE\/CVE-2022-31607", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31607", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31607 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:03Z", - "updated_at": "2022-12-23T13:38:22Z", - "pushed_at": "2022-12-23T13:37:05Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31608.json b/2022/CVE-2022-31608.json deleted file mode 100644 index 95089c9885..0000000000 --- a/2022/CVE-2022-31608.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549056, - "name": "CVE-2022-31608", - "full_name": "Live-Hack-CVE\/CVE-2022-31608", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31608", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31608 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:35Z", - "updated_at": "2022-12-23T14:14:35Z", - "pushed_at": "2022-12-23T14:14:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31610.json b/2022/CVE-2022-31610.json deleted file mode 100644 index 0ba364f791..0000000000 --- a/2022/CVE-2022-31610.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538285, - "name": "CVE-2022-31610", - "full_name": "Live-Hack-CVE\/CVE-2022-31610", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31610", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31610 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:00Z", - "updated_at": "2022-12-23T13:37:00Z", - "pushed_at": "2022-12-23T13:37:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31612.json b/2022/CVE-2022-31612.json deleted file mode 100644 index 0f2bbf8ca3..0000000000 --- a/2022/CVE-2022-31612.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549015, - "name": "CVE-2022-31612", - "full_name": "Live-Hack-CVE\/CVE-2022-31612", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31612", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31612 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:29Z", - "updated_at": "2022-12-23T14:14:29Z", - "pushed_at": "2022-12-23T14:14:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31613.json b/2022/CVE-2022-31613.json deleted file mode 100644 index 665c7b9729..0000000000 --- a/2022/CVE-2022-31613.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538267, - "name": "CVE-2022-31613", - "full_name": "Live-Hack-CVE\/CVE-2022-31613", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31613", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31613 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:56Z", - "updated_at": "2022-12-23T13:36:56Z", - "pushed_at": "2022-12-23T13:36:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31615.json b/2022/CVE-2022-31615.json deleted file mode 100644 index 2319ff7911..0000000000 --- a/2022/CVE-2022-31615.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538101, - "name": "CVE-2022-31615", - "full_name": "Live-Hack-CVE\/CVE-2022-31615", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31615", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31615 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:22Z", - "updated_at": "2022-12-23T13:36:22Z", - "pushed_at": "2022-12-23T13:36:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31616.json b/2022/CVE-2022-31616.json deleted file mode 100644 index 9960c899db..0000000000 --- a/2022/CVE-2022-31616.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538399, - "name": "CVE-2022-31616", - "full_name": "Live-Hack-CVE\/CVE-2022-31616", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31616", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31616 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:24Z", - "updated_at": "2022-12-23T13:37:24Z", - "pushed_at": "2022-12-23T13:37:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31617.json b/2022/CVE-2022-31617.json deleted file mode 100644 index 106560eca3..0000000000 --- a/2022/CVE-2022-31617.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538383, - "name": "CVE-2022-31617", - "full_name": "Live-Hack-CVE\/CVE-2022-31617", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31617", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31617 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:20Z", - "updated_at": "2022-12-23T13:37:20Z", - "pushed_at": "2022-12-23T13:37:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31621.json b/2022/CVE-2022-31621.json new file mode 100644 index 0000000000..8daf680f6b --- /dev/null +++ b/2022/CVE-2022-31621.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681936, + "name": "CVE-2022-31621", + "full_name": "Live-Hack-CVE\/CVE-2022-31621", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31621", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31621 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:40Z", + "updated_at": "2022-12-23T23:50:40Z", + "pushed_at": "2022-12-23T23:50:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31622.json b/2022/CVE-2022-31622.json new file mode 100644 index 0000000000..fae07b341a --- /dev/null +++ b/2022/CVE-2022-31622.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681919, + "name": "CVE-2022-31622", + "full_name": "Live-Hack-CVE\/CVE-2022-31622", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31622", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31622 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:34Z", + "updated_at": "2022-12-23T23:50:34Z", + "pushed_at": "2022-12-23T23:50:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31623.json b/2022/CVE-2022-31623.json new file mode 100644 index 0000000000..860801c2aa --- /dev/null +++ b/2022/CVE-2022-31623.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681944, + "name": "CVE-2022-31623", + "full_name": "Live-Hack-CVE\/CVE-2022-31623", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31623", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31623 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:44Z", + "updated_at": "2022-12-23T23:50:44Z", + "pushed_at": "2022-12-23T23:50:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31624.json b/2022/CVE-2022-31624.json new file mode 100644 index 0000000000..c621cbd49c --- /dev/null +++ b/2022/CVE-2022-31624.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681928, + "name": "CVE-2022-31624", + "full_name": "Live-Hack-CVE\/CVE-2022-31624", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31624", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31624 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:37Z", + "updated_at": "2022-12-23T23:50:37Z", + "pushed_at": "2022-12-23T23:50:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31630.json b/2022/CVE-2022-31630.json deleted file mode 100644 index 56d4a741b1..0000000000 --- a/2022/CVE-2022-31630.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550502, - "name": "CVE-2022-31630", - "full_name": "Live-Hack-CVE\/CVE-2022-31630", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31630", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31630 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:06Z", - "updated_at": "2022-12-23T14:19:06Z", - "pushed_at": "2022-12-23T14:19:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31649.json b/2022/CVE-2022-31649.json deleted file mode 100644 index 6d4228c0cf..0000000000 --- a/2022/CVE-2022-31649.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537978, - "name": "CVE-2022-31649", - "full_name": "Live-Hack-CVE\/CVE-2022-31649", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31649", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31649 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:01Z", - "updated_at": "2022-12-23T13:36:01Z", - "pushed_at": "2022-12-23T13:36:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31676.json b/2022/CVE-2022-31676.json new file mode 100644 index 0000000000..5f9205a96d --- /dev/null +++ b/2022/CVE-2022-31676.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626789, + "name": "CVE-2022-31676", + "full_name": "Live-Hack-CVE\/CVE-2022-31676", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31676", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31676 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:35Z", + "updated_at": "2022-12-23T19:00:36Z", + "pushed_at": "2022-12-23T19:00:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31685.json b/2022/CVE-2022-31685.json new file mode 100644 index 0000000000..382533feb3 --- /dev/null +++ b/2022/CVE-2022-31685.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653456, + "name": "CVE-2022-31685", + "full_name": "Live-Hack-CVE\/CVE-2022-31685", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31685", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31685 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:33Z", + "updated_at": "2022-12-23T21:04:33Z", + "pushed_at": "2022-12-23T21:04:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31686.json b/2022/CVE-2022-31686.json new file mode 100644 index 0000000000..8979447045 --- /dev/null +++ b/2022/CVE-2022-31686.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653418, + "name": "CVE-2022-31686", + "full_name": "Live-Hack-CVE\/CVE-2022-31686", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31686", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31686 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:23Z", + "updated_at": "2022-12-23T21:04:23Z", + "pushed_at": "2022-12-23T21:04:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31687.json b/2022/CVE-2022-31687.json new file mode 100644 index 0000000000..3e3ac74c8f --- /dev/null +++ b/2022/CVE-2022-31687.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653429, + "name": "CVE-2022-31687", + "full_name": "Live-Hack-CVE\/CVE-2022-31687", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31687", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31687 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:26Z", + "updated_at": "2022-12-23T21:04:26Z", + "pushed_at": "2022-12-23T21:04:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31688.json b/2022/CVE-2022-31688.json new file mode 100644 index 0000000000..8968263e7a --- /dev/null +++ b/2022/CVE-2022-31688.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653392, + "name": "CVE-2022-31688", + "full_name": "Live-Hack-CVE\/CVE-2022-31688", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31688", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31688 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:14Z", + "updated_at": "2022-12-23T21:04:14Z", + "pushed_at": "2022-12-23T21:04:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31689.json b/2022/CVE-2022-31689.json new file mode 100644 index 0000000000..5a9b1f3a71 --- /dev/null +++ b/2022/CVE-2022-31689.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653318, + "name": "CVE-2022-31689", + "full_name": "Live-Hack-CVE\/CVE-2022-31689", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31689", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31689 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:51Z", + "updated_at": "2022-12-23T21:03:51Z", + "pushed_at": "2022-12-23T21:03:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31691.json b/2022/CVE-2022-31691.json new file mode 100644 index 0000000000..dbef4bc377 --- /dev/null +++ b/2022/CVE-2022-31691.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646124, + "name": "CVE-2022-31691", + "full_name": "Live-Hack-CVE\/CVE-2022-31691", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31691", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31691 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:48Z", + "updated_at": "2022-12-23T20:27:48Z", + "pushed_at": "2022-12-23T20:27:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31694.json b/2022/CVE-2022-31694.json deleted file mode 100644 index cae4e412b2..0000000000 --- a/2022/CVE-2022-31694.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573353, - "name": "CVE-2022-31694", - "full_name": "Live-Hack-CVE\/CVE-2022-31694", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31694", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31694 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:44Z", - "updated_at": "2022-12-23T15:36:44Z", - "pushed_at": "2022-12-23T15:36:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3176.json b/2022/CVE-2022-3176.json deleted file mode 100644 index b8eda0f88b..0000000000 --- a/2022/CVE-2022-3176.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584315, - "name": "CVE-2022-3176", - "full_name": "Live-Hack-CVE\/CVE-2022-3176", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3176", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3176 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:53Z", - "updated_at": "2022-12-23T16:16:54Z", - "pushed_at": "2022-12-23T16:16:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31772.json b/2022/CVE-2022-31772.json new file mode 100644 index 0000000000..40ab4e272a --- /dev/null +++ b/2022/CVE-2022-31772.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637806, + "name": "CVE-2022-31772", + "full_name": "Live-Hack-CVE\/CVE-2022-31772", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31772", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31772 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:07Z", + "updated_at": "2022-12-23T19:49:07Z", + "pushed_at": "2022-12-23T19:49:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-31777.json b/2022/CVE-2022-31777.json deleted file mode 100644 index 91d885d95b..0000000000 --- a/2022/CVE-2022-31777.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537555, - "name": "CVE-2022-31777", - "full_name": "Live-Hack-CVE\/CVE-2022-31777", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31777", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31777 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:30Z", - "updated_at": "2022-12-23T13:34:30Z", - "pushed_at": "2022-12-23T13:34:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-31877.json b/2022/CVE-2022-31877.json deleted file mode 100644 index e4fd5f8207..0000000000 --- a/2022/CVE-2022-31877.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536415, - "name": "CVE-2022-31877", - "full_name": "Live-Hack-CVE\/CVE-2022-31877", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-31877", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-31877 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:43Z", - "updated_at": "2022-12-23T13:30:43Z", - "pushed_at": "2022-12-23T13:30:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3195.json b/2022/CVE-2022-3195.json new file mode 100644 index 0000000000..316e6c3bb6 --- /dev/null +++ b/2022/CVE-2022-3195.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661188, + "name": "CVE-2022-3195", + "full_name": "Live-Hack-CVE\/CVE-2022-3195", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3195", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3195 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:42Z", + "updated_at": "2022-12-23T21:44:42Z", + "pushed_at": "2022-12-23T21:44:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3196.json b/2022/CVE-2022-3196.json deleted file mode 100644 index adfc9da0df..0000000000 --- a/2022/CVE-2022-3196.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583990, - "name": "CVE-2022-3196", - "full_name": "Live-Hack-CVE\/CVE-2022-3196", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3196", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3196 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:38Z", - "updated_at": "2022-12-23T16:15:38Z", - "pushed_at": "2022-12-23T16:15:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3197.json b/2022/CVE-2022-3197.json deleted file mode 100644 index 146c6c929f..0000000000 --- a/2022/CVE-2022-3197.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584006, - "name": "CVE-2022-3197", - "full_name": "Live-Hack-CVE\/CVE-2022-3197", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3197", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3197 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:42Z", - "updated_at": "2022-12-23T16:15:42Z", - "pushed_at": "2022-12-23T16:15:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3198.json b/2022/CVE-2022-3198.json deleted file mode 100644 index d6836eedc0..0000000000 --- a/2022/CVE-2022-3198.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584029, - "name": "CVE-2022-3198", - "full_name": "Live-Hack-CVE\/CVE-2022-3198", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3198", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3198 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:46Z", - "updated_at": "2022-12-23T16:15:46Z", - "pushed_at": "2022-12-23T16:15:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3199.json b/2022/CVE-2022-3199.json deleted file mode 100644 index 85107b7081..0000000000 --- a/2022/CVE-2022-3199.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537569, - "name": "CVE-2022-3199", - "full_name": "Live-Hack-CVE\/CVE-2022-3199", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3199", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3199 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:34Z", - "updated_at": "2022-12-23T13:34:34Z", - "pushed_at": "2022-12-23T13:34:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3200.json b/2022/CVE-2022-3200.json deleted file mode 100644 index 488df70d8f..0000000000 --- a/2022/CVE-2022-3200.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583881, - "name": "CVE-2022-3200", - "full_name": "Live-Hack-CVE\/CVE-2022-3200", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3200", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3200 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:18Z", - "updated_at": "2022-12-23T16:15:18Z", - "pushed_at": "2022-12-23T16:15:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32060.json b/2022/CVE-2022-32060.json deleted file mode 100644 index 2ab51ba363..0000000000 --- a/2022/CVE-2022-32060.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548528, - "name": "CVE-2022-32060", - "full_name": "Live-Hack-CVE\/CVE-2022-32060", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32060", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32060 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:12:50Z", - "updated_at": "2022-12-23T14:12:50Z", - "pushed_at": "2022-12-23T14:12:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32156.json b/2022/CVE-2022-32156.json new file mode 100644 index 0000000000..a40ae7b7c9 --- /dev/null +++ b/2022/CVE-2022-32156.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645439, + "name": "CVE-2022-32156", + "full_name": "Live-Hack-CVE\/CVE-2022-32156", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32156", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32156 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:41Z", + "updated_at": "2022-12-23T20:24:41Z", + "pushed_at": "2022-12-23T20:24:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32166.json b/2022/CVE-2022-32166.json new file mode 100644 index 0000000000..fd4960a6d1 --- /dev/null +++ b/2022/CVE-2022-32166.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682263, + "name": "CVE-2022-32166", + "full_name": "Live-Hack-CVE\/CVE-2022-32166", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32166", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32166 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:34Z", + "updated_at": "2022-12-23T23:52:34Z", + "pushed_at": "2022-12-23T23:52:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32171.json b/2022/CVE-2022-32171.json new file mode 100644 index 0000000000..343b2b37fc --- /dev/null +++ b/2022/CVE-2022-32171.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675988, + "name": "CVE-2022-32171", + "full_name": "Live-Hack-CVE\/CVE-2022-32171", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32171", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32171 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:32Z", + "updated_at": "2022-12-23T23:10:32Z", + "pushed_at": "2022-12-23T23:10:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32172.json b/2022/CVE-2022-32172.json new file mode 100644 index 0000000000..ba3473141b --- /dev/null +++ b/2022/CVE-2022-32172.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675971, + "name": "CVE-2022-32172", + "full_name": "Live-Hack-CVE\/CVE-2022-32172", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32172", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32172 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:10:25Z", + "updated_at": "2022-12-23T23:10:25Z", + "pushed_at": "2022-12-23T23:10:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32177.json b/2022/CVE-2022-32177.json new file mode 100644 index 0000000000..a7d199a42f --- /dev/null +++ b/2022/CVE-2022-32177.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645064, + "name": "CVE-2022-32177", + "full_name": "Live-Hack-CVE\/CVE-2022-32177", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32177", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32177 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:57Z", + "updated_at": "2022-12-23T20:22:57Z", + "pushed_at": "2022-12-23T20:22:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32190.json b/2022/CVE-2022-32190.json new file mode 100644 index 0000000000..d450aba293 --- /dev/null +++ b/2022/CVE-2022-32190.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638341, + "name": "CVE-2022-32190", + "full_name": "Live-Hack-CVE\/CVE-2022-32190", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32190", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32190 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:31Z", + "updated_at": "2022-12-23T19:51:31Z", + "pushed_at": "2022-12-23T19:51:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32212.json b/2022/CVE-2022-32212.json deleted file mode 100644 index 302660702d..0000000000 --- a/2022/CVE-2022-32212.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538879, - "name": "CVE-2022-32212", - "full_name": "Live-Hack-CVE\/CVE-2022-32212", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32212", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32212 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:39:00Z", - "updated_at": "2022-12-23T13:39:00Z", - "pushed_at": "2022-12-23T13:39:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32213.json b/2022/CVE-2022-32213.json deleted file mode 100644 index 4f9752235d..0000000000 --- a/2022/CVE-2022-32213.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538897, - "name": "CVE-2022-32213", - "full_name": "Live-Hack-CVE\/CVE-2022-32213", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32213", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32213 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:39:03Z", - "updated_at": "2022-12-23T13:39:03Z", - "pushed_at": "2022-12-23T13:39:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32214.json b/2022/CVE-2022-32214.json deleted file mode 100644 index 4c48822d85..0000000000 --- a/2022/CVE-2022-32214.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572476, - "name": "CVE-2022-32214", - "full_name": "Live-Hack-CVE\/CVE-2022-32214", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32214", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32214 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:48Z", - "updated_at": "2022-12-23T15:33:48Z", - "pushed_at": "2022-12-23T15:33:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32215.json b/2022/CVE-2022-32215.json deleted file mode 100644 index e710fc828d..0000000000 --- a/2022/CVE-2022-32215.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538912, - "name": "CVE-2022-32215", - "full_name": "Live-Hack-CVE\/CVE-2022-32215", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32215", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32215 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:39:07Z", - "updated_at": "2022-12-23T13:39:07Z", - "pushed_at": "2022-12-23T13:39:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32268.json b/2022/CVE-2022-32268.json new file mode 100644 index 0000000000..2130b49501 --- /dev/null +++ b/2022/CVE-2022-32268.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628797, + "name": "CVE-2022-32268", + "full_name": "Live-Hack-CVE\/CVE-2022-32268", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32268", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32268 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:55Z", + "updated_at": "2022-12-23T19:08:55Z", + "pushed_at": "2022-12-23T19:08:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32287.json b/2022/CVE-2022-32287.json new file mode 100644 index 0000000000..bf5a625b15 --- /dev/null +++ b/2022/CVE-2022-32287.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683327, + "name": "CVE-2022-32287", + "full_name": "Live-Hack-CVE\/CVE-2022-32287", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32287", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32287 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:28Z", + "updated_at": "2022-12-23T23:59:28Z", + "pushed_at": "2022-12-23T23:59:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3235.json b/2022/CVE-2022-3235.json deleted file mode 100644 index d7d9a94502..0000000000 --- a/2022/CVE-2022-3235.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561191, - "name": "CVE-2022-3235", - "full_name": "Live-Hack-CVE\/CVE-2022-3235", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3235", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3235 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:58Z", - "updated_at": "2022-12-23T14:54:58Z", - "pushed_at": "2022-12-23T14:55:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32511.json b/2022/CVE-2022-32511.json deleted file mode 100644 index 70330d3da2..0000000000 --- a/2022/CVE-2022-32511.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537757, - "name": "CVE-2022-32511", - "full_name": "Live-Hack-CVE\/CVE-2022-32511", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32511", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32511 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:35:13Z", - "updated_at": "2022-12-23T13:35:13Z", - "pushed_at": "2022-12-23T13:35:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3256.json b/2022/CVE-2022-3256.json deleted file mode 100644 index f7ed1f8e39..0000000000 --- a/2022/CVE-2022-3256.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561175, - "name": "CVE-2022-3256", - "full_name": "Live-Hack-CVE\/CVE-2022-3256", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3256", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3256 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:54Z", - "updated_at": "2022-12-23T14:54:54Z", - "pushed_at": "2022-12-23T14:54:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32569.json b/2022/CVE-2022-32569.json new file mode 100644 index 0000000000..18778dd33b --- /dev/null +++ b/2022/CVE-2022-32569.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627697, + "name": "CVE-2022-32569", + "full_name": "Live-Hack-CVE\/CVE-2022-32569", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32569", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32569 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:28Z", + "updated_at": "2022-12-23T19:04:28Z", + "pushed_at": "2022-12-23T19:04:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3258.json b/2022/CVE-2022-3258.json new file mode 100644 index 0000000000..738540eda9 --- /dev/null +++ b/2022/CVE-2022-3258.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682460, + "name": "CVE-2022-3258", + "full_name": "Live-Hack-CVE\/CVE-2022-3258", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3258", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3258 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:48Z", + "updated_at": "2022-12-23T23:53:48Z", + "pushed_at": "2022-12-23T23:53:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32587.json b/2022/CVE-2022-32587.json new file mode 100644 index 0000000000..83a0b923bc --- /dev/null +++ b/2022/CVE-2022-32587.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662946, + "name": "CVE-2022-32587", + "full_name": "Live-Hack-CVE\/CVE-2022-32587", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32587", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32587 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:48Z", + "updated_at": "2022-12-23T21:53:48Z", + "pushed_at": "2022-12-23T21:53:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32588.json b/2022/CVE-2022-32588.json new file mode 100644 index 0000000000..f1b86e641d --- /dev/null +++ b/2022/CVE-2022-32588.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654789, + "name": "CVE-2022-32588", + "full_name": "Live-Hack-CVE\/CVE-2022-32588", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32588", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32588 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:56Z", + "updated_at": "2022-12-23T21:10:56Z", + "pushed_at": "2022-12-23T21:10:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32601.json b/2022/CVE-2022-32601.json new file mode 100644 index 0000000000..1513600b7d --- /dev/null +++ b/2022/CVE-2022-32601.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662276, + "name": "CVE-2022-32601", + "full_name": "Live-Hack-CVE\/CVE-2022-32601", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32601", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32601 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:10Z", + "updated_at": "2022-12-23T21:50:10Z", + "pushed_at": "2022-12-23T21:50:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32602.json b/2022/CVE-2022-32602.json new file mode 100644 index 0000000000..c4f2083132 --- /dev/null +++ b/2022/CVE-2022-32602.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662255, + "name": "CVE-2022-32602", + "full_name": "Live-Hack-CVE\/CVE-2022-32602", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32602", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32602 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:07Z", + "updated_at": "2022-12-23T21:50:07Z", + "pushed_at": "2022-12-23T21:50:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32603.json b/2022/CVE-2022-32603.json new file mode 100644 index 0000000000..0e4c57652c --- /dev/null +++ b/2022/CVE-2022-32603.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654515, + "name": "CVE-2022-32603", + "full_name": "Live-Hack-CVE\/CVE-2022-32603", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32603", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32603 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:42Z", + "updated_at": "2022-12-23T21:09:42Z", + "pushed_at": "2022-12-23T21:09:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32605.json b/2022/CVE-2022-32605.json new file mode 100644 index 0000000000..0008d0eff8 --- /dev/null +++ b/2022/CVE-2022-32605.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654539, + "name": "CVE-2022-32605", + "full_name": "Live-Hack-CVE\/CVE-2022-32605", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32605", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32605 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:49Z", + "updated_at": "2022-12-23T21:09:49Z", + "pushed_at": "2022-12-23T21:09:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32607.json b/2022/CVE-2022-32607.json new file mode 100644 index 0000000000..75e45fe6a3 --- /dev/null +++ b/2022/CVE-2022-32607.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654556, + "name": "CVE-2022-32607", + "full_name": "Live-Hack-CVE\/CVE-2022-32607", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32607", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32607 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:52Z", + "updated_at": "2022-12-23T21:09:52Z", + "pushed_at": "2022-12-23T21:09:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32608.json b/2022/CVE-2022-32608.json new file mode 100644 index 0000000000..2ebc00db8c --- /dev/null +++ b/2022/CVE-2022-32608.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654572, + "name": "CVE-2022-32608", + "full_name": "Live-Hack-CVE\/CVE-2022-32608", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32608", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32608 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:55Z", + "updated_at": "2022-12-23T21:09:55Z", + "pushed_at": "2022-12-23T21:09:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32609.json b/2022/CVE-2022-32609.json new file mode 100644 index 0000000000..276a9325dd --- /dev/null +++ b/2022/CVE-2022-32609.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654613, + "name": "CVE-2022-32609", + "full_name": "Live-Hack-CVE\/CVE-2022-32609", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32609", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32609 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:06Z", + "updated_at": "2022-12-23T21:10:06Z", + "pushed_at": "2022-12-23T21:10:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32610.json b/2022/CVE-2022-32610.json new file mode 100644 index 0000000000..07dd126fce --- /dev/null +++ b/2022/CVE-2022-32610.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654627, + "name": "CVE-2022-32610", + "full_name": "Live-Hack-CVE\/CVE-2022-32610", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32610", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32610 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:09Z", + "updated_at": "2022-12-23T21:10:09Z", + "pushed_at": "2022-12-23T21:10:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32611.json b/2022/CVE-2022-32611.json new file mode 100644 index 0000000000..a3afc5a173 --- /dev/null +++ b/2022/CVE-2022-32611.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654644, + "name": "CVE-2022-32611", + "full_name": "Live-Hack-CVE\/CVE-2022-32611", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32611", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32611 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:12Z", + "updated_at": "2022-12-23T21:10:12Z", + "pushed_at": "2022-12-23T21:10:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32612.json b/2022/CVE-2022-32612.json new file mode 100644 index 0000000000..84eb4626da --- /dev/null +++ b/2022/CVE-2022-32612.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654657, + "name": "CVE-2022-32612", + "full_name": "Live-Hack-CVE\/CVE-2022-32612", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32612", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32612 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:15Z", + "updated_at": "2022-12-23T21:10:15Z", + "pushed_at": "2022-12-23T21:10:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32613.json b/2022/CVE-2022-32613.json new file mode 100644 index 0000000000..cbff531c3e --- /dev/null +++ b/2022/CVE-2022-32613.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654671, + "name": "CVE-2022-32613", + "full_name": "Live-Hack-CVE\/CVE-2022-32613", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32613", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32613 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:19Z", + "updated_at": "2022-12-23T21:10:19Z", + "pushed_at": "2022-12-23T21:10:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32614.json b/2022/CVE-2022-32614.json new file mode 100644 index 0000000000..e294061ea5 --- /dev/null +++ b/2022/CVE-2022-32614.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654366, + "name": "CVE-2022-32614", + "full_name": "Live-Hack-CVE\/CVE-2022-32614", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32614", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32614 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:02Z", + "updated_at": "2022-12-23T21:09:02Z", + "pushed_at": "2022-12-23T21:09:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32615.json b/2022/CVE-2022-32615.json new file mode 100644 index 0000000000..4f68472db8 --- /dev/null +++ b/2022/CVE-2022-32615.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654229, + "name": "CVE-2022-32615", + "full_name": "Live-Hack-CVE\/CVE-2022-32615", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32615", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32615 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:21Z", + "updated_at": "2022-12-23T21:08:22Z", + "pushed_at": "2022-12-23T21:08:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32616.json b/2022/CVE-2022-32616.json new file mode 100644 index 0000000000..e0e5442831 --- /dev/null +++ b/2022/CVE-2022-32616.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654424, + "name": "CVE-2022-32616", + "full_name": "Live-Hack-CVE\/CVE-2022-32616", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32616", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32616 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:18Z", + "updated_at": "2022-12-23T21:09:18Z", + "pushed_at": "2022-12-23T21:09:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32617.json b/2022/CVE-2022-32617.json new file mode 100644 index 0000000000..4dd3295904 --- /dev/null +++ b/2022/CVE-2022-32617.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662748, + "name": "CVE-2022-32617", + "full_name": "Live-Hack-CVE\/CVE-2022-32617", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32617", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32617 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:44Z", + "updated_at": "2022-12-23T21:52:44Z", + "pushed_at": "2022-12-23T21:52:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32618.json b/2022/CVE-2022-32618.json new file mode 100644 index 0000000000..7e735cea34 --- /dev/null +++ b/2022/CVE-2022-32618.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662465, + "name": "CVE-2022-32618", + "full_name": "Live-Hack-CVE\/CVE-2022-32618", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32618", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32618 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:16Z", + "updated_at": "2022-12-23T21:51:16Z", + "pushed_at": "2022-12-23T21:51:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3265.json b/2022/CVE-2022-3265.json new file mode 100644 index 0000000000..431878686d --- /dev/null +++ b/2022/CVE-2022-3265.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653268, + "name": "CVE-2022-3265", + "full_name": "Live-Hack-CVE\/CVE-2022-3265", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3265", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3265 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:40Z", + "updated_at": "2022-12-23T21:03:40Z", + "pushed_at": "2022-12-23T21:03:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32774.json b/2022/CVE-2022-32774.json deleted file mode 100644 index fdaf58d28c..0000000000 --- a/2022/CVE-2022-32774.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573622, - "name": "CVE-2022-32774", - "full_name": "Live-Hack-CVE\/CVE-2022-32774", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32774", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32774 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:40Z", - "updated_at": "2022-12-23T15:37:40Z", - "pushed_at": "2022-12-23T15:37:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32776.json b/2022/CVE-2022-32776.json new file mode 100644 index 0000000000..9586adaead --- /dev/null +++ b/2022/CVE-2022-32776.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662956, + "name": "CVE-2022-32776", + "full_name": "Live-Hack-CVE\/CVE-2022-32776", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32776", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32776 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:52Z", + "updated_at": "2022-12-23T21:53:52Z", + "pushed_at": "2022-12-23T21:53:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3280.json b/2022/CVE-2022-3280.json new file mode 100644 index 0000000000..6bbe33b1a7 --- /dev/null +++ b/2022/CVE-2022-3280.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647011, + "name": "CVE-2022-3280", + "full_name": "Live-Hack-CVE\/CVE-2022-3280", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3280", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3280 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:17Z", + "updated_at": "2022-12-23T20:32:17Z", + "pushed_at": "2022-12-23T20:32:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3281.json b/2022/CVE-2022-3281.json new file mode 100644 index 0000000000..181c853d63 --- /dev/null +++ b/2022/CVE-2022-3281.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682286, + "name": "CVE-2022-3281", + "full_name": "Live-Hack-CVE\/CVE-2022-3281", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3281", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3281 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:44Z", + "updated_at": "2022-12-23T23:52:44Z", + "pushed_at": "2022-12-23T23:52:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32814.json b/2022/CVE-2022-32814.json new file mode 100644 index 0000000000..cabae2d799 --- /dev/null +++ b/2022/CVE-2022-32814.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654773, + "name": "CVE-2022-32814", + "full_name": "Live-Hack-CVE\/CVE-2022-32814", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32814", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32814 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:47Z", + "updated_at": "2022-12-23T21:10:47Z", + "pushed_at": "2022-12-23T21:10:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32827.json b/2022/CVE-2022-32827.json deleted file mode 100644 index 761de9dc4d..0000000000 --- a/2022/CVE-2022-32827.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597333, - "name": "CVE-2022-32827", - "full_name": "Live-Hack-CVE\/CVE-2022-32827", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32827", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32827 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:18Z", - "updated_at": "2022-12-23T17:05:18Z", - "pushed_at": "2022-12-23T17:05:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32849.json b/2022/CVE-2022-32849.json new file mode 100644 index 0000000000..35978af63b --- /dev/null +++ b/2022/CVE-2022-32849.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655240, + "name": "CVE-2022-32849", + "full_name": "Live-Hack-CVE\/CVE-2022-32849", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32849", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32849 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:09Z", + "updated_at": "2022-12-23T21:13:09Z", + "pushed_at": "2022-12-23T21:13:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3285.json b/2022/CVE-2022-3285.json new file mode 100644 index 0000000000..0ee6b6c934 --- /dev/null +++ b/2022/CVE-2022-3285.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646996, + "name": "CVE-2022-3285", + "full_name": "Live-Hack-CVE\/CVE-2022-3285", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3285", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3285 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:13Z", + "updated_at": "2022-12-23T20:32:13Z", + "pushed_at": "2022-12-23T20:32:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32854.json b/2022/CVE-2022-32854.json new file mode 100644 index 0000000000..cad5e782e4 --- /dev/null +++ b/2022/CVE-2022-32854.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628481, + "name": "CVE-2022-32854", + "full_name": "Live-Hack-CVE\/CVE-2022-32854", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32854", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32854 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:36Z", + "updated_at": "2022-12-23T19:07:36Z", + "pushed_at": "2022-12-23T19:07:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32864.json b/2022/CVE-2022-32864.json new file mode 100644 index 0000000000..312a9e193c --- /dev/null +++ b/2022/CVE-2022-32864.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683350, + "name": "CVE-2022-32864", + "full_name": "Live-Hack-CVE\/CVE-2022-32864", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32864", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32864 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:38Z", + "updated_at": "2022-12-23T23:59:38Z", + "pushed_at": "2022-12-23T23:59:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32888.json b/2022/CVE-2022-32888.json new file mode 100644 index 0000000000..46ffd96e7e --- /dev/null +++ b/2022/CVE-2022-32888.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663254, + "name": "CVE-2022-32888", + "full_name": "Live-Hack-CVE\/CVE-2022-32888", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32888", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32888 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:42Z", + "updated_at": "2022-12-23T22:00:51Z", + "pushed_at": "2022-12-23T21:55:44Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32893.json b/2022/CVE-2022-32893.json new file mode 100644 index 0000000000..61ee875c25 --- /dev/null +++ b/2022/CVE-2022-32893.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677007, + "name": "CVE-2022-32893", + "full_name": "Live-Hack-CVE\/CVE-2022-32893", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32893", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32893 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:18Z", + "updated_at": "2022-12-23T23:17:18Z", + "pushed_at": "2022-12-23T23:17:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32907.json b/2022/CVE-2022-32907.json deleted file mode 100644 index 601b97f096..0000000000 --- a/2022/CVE-2022-32907.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597348, - "name": "CVE-2022-32907", - "full_name": "Live-Hack-CVE\/CVE-2022-32907", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32907", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32907 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:22Z", - "updated_at": "2022-12-23T17:05:22Z", - "pushed_at": "2022-12-23T17:05:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32923.json b/2022/CVE-2022-32923.json new file mode 100644 index 0000000000..11fc1b1abc --- /dev/null +++ b/2022/CVE-2022-32923.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663171, + "name": "CVE-2022-32923", + "full_name": "Live-Hack-CVE\/CVE-2022-32923", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32923", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32923 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:11Z", + "updated_at": "2022-12-23T21:55:11Z", + "pushed_at": "2022-12-23T21:55:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-32966.json b/2022/CVE-2022-32966.json deleted file mode 100644 index 30f4a07dd4..0000000000 --- a/2022/CVE-2022-32966.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536064, - "name": "CVE-2022-32966", - "full_name": "Live-Hack-CVE\/CVE-2022-32966", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32966", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32966 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:34Z", - "updated_at": "2022-12-23T13:29:34Z", - "pushed_at": "2022-12-23T13:29:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-32967.json b/2022/CVE-2022-32967.json deleted file mode 100644 index f47945fe03..0000000000 --- a/2022/CVE-2022-32967.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536196, - "name": "CVE-2022-32967", - "full_name": "Live-Hack-CVE\/CVE-2022-32967", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-32967", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-32967 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:04Z", - "updated_at": "2022-12-23T13:30:04Z", - "pushed_at": "2022-12-23T13:30:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33012.json b/2022/CVE-2022-33012.json deleted file mode 100644 index bd0d03eab4..0000000000 --- a/2022/CVE-2022-33012.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550661, - "name": "CVE-2022-33012", - "full_name": "Live-Hack-CVE\/CVE-2022-33012", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33012", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33012 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:37Z", - "updated_at": "2022-12-23T14:19:37Z", - "pushed_at": "2022-12-23T14:19:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33099.json b/2022/CVE-2022-33099.json new file mode 100644 index 0000000000..fc14570034 --- /dev/null +++ b/2022/CVE-2022-33099.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677216, + "name": "CVE-2022-33099", + "full_name": "Live-Hack-CVE\/CVE-2022-33099", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33099", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33099 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:21Z", + "updated_at": "2022-12-23T23:18:21Z", + "pushed_at": "2022-12-23T23:18:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33176.json b/2022/CVE-2022-33176.json new file mode 100644 index 0000000000..317eac94b9 --- /dev/null +++ b/2022/CVE-2022-33176.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627825, + "name": "CVE-2022-33176", + "full_name": "Live-Hack-CVE\/CVE-2022-33176", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33176", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33176 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:56Z", + "updated_at": "2022-12-23T19:04:56Z", + "pushed_at": "2022-12-23T19:04:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33321.json b/2022/CVE-2022-33321.json deleted file mode 100644 index b4eb70775d..0000000000 --- a/2022/CVE-2022-33321.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574805, - "name": "CVE-2022-33321", - "full_name": "Live-Hack-CVE\/CVE-2022-33321", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33321", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33321 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:40Z", - "updated_at": "2022-12-23T15:41:41Z", - "pushed_at": "2022-12-23T15:41:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33322.json b/2022/CVE-2022-33322.json deleted file mode 100644 index 30f9186469..0000000000 --- a/2022/CVE-2022-33322.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574821, - "name": "CVE-2022-33322", - "full_name": "Live-Hack-CVE\/CVE-2022-33322", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33322", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33322 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:44Z", - "updated_at": "2022-12-23T15:41:44Z", - "pushed_at": "2022-12-23T15:41:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3336.json b/2022/CVE-2022-3336.json deleted file mode 100644 index 1e9d1b7278..0000000000 --- a/2022/CVE-2022-3336.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572137, - "name": "CVE-2022-3336", - "full_name": "Live-Hack-CVE\/CVE-2022-3336", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3336", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3336 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:40Z", - "updated_at": "2022-12-23T15:32:40Z", - "pushed_at": "2022-12-23T15:32:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3340.json b/2022/CVE-2022-3340.json new file mode 100644 index 0000000000..cbd80834ec --- /dev/null +++ b/2022/CVE-2022-3340.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669746, + "name": "CVE-2022-3340", + "full_name": "Live-Hack-CVE\/CVE-2022-3340", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3340", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3340 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:43Z", + "updated_at": "2022-12-23T22:32:43Z", + "pushed_at": "2022-12-23T22:32:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3352.json b/2022/CVE-2022-3352.json deleted file mode 100644 index f7434cf401..0000000000 --- a/2022/CVE-2022-3352.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561158, - "name": "CVE-2022-3352", - "full_name": "Live-Hack-CVE\/CVE-2022-3352", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3352", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3352 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:51Z", - "updated_at": "2022-12-23T14:54:51Z", - "pushed_at": "2022-12-23T14:54:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3361.json b/2022/CVE-2022-3361.json deleted file mode 100644 index 4441196203..0000000000 --- a/2022/CVE-2022-3361.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515965, - "name": "CVE-2022-3361", - "full_name": "Live-Hack-CVE\/CVE-2022-3361", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3361", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3361 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:53Z", - "updated_at": "2022-12-23T12:16:53Z", - "pushed_at": "2022-12-23T12:16:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33639.json b/2022/CVE-2022-33639.json new file mode 100644 index 0000000000..998366e844 --- /dev/null +++ b/2022/CVE-2022-33639.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675689, + "name": "CVE-2022-33639", + "full_name": "Live-Hack-CVE\/CVE-2022-33639", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33639", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33639 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:43Z", + "updated_at": "2022-12-23T23:08:43Z", + "pushed_at": "2022-12-23T23:08:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33684.json b/2022/CVE-2022-33684.json new file mode 100644 index 0000000000..85521537ab --- /dev/null +++ b/2022/CVE-2022-33684.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670494, + "name": "CVE-2022-33684", + "full_name": "Live-Hack-CVE\/CVE-2022-33684", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33684", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33684 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:52Z", + "updated_at": "2022-12-23T22:36:52Z", + "pushed_at": "2022-12-23T22:36:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33743.json b/2022/CVE-2022-33743.json new file mode 100644 index 0000000000..caa16f1fb2 --- /dev/null +++ b/2022/CVE-2022-33743.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677183, + "name": "CVE-2022-33743", + "full_name": "Live-Hack-CVE\/CVE-2022-33743", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33743", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33743 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:14Z", + "updated_at": "2022-12-23T23:18:14Z", + "pushed_at": "2022-12-23T23:18:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3377.json b/2022/CVE-2022-3377.json deleted file mode 100644 index 2f325f464c..0000000000 --- a/2022/CVE-2022-3377.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585632, - "name": "CVE-2022-3377", - "full_name": "Live-Hack-CVE\/CVE-2022-3377", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3377", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3377 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:36Z", - "updated_at": "2022-12-23T16:21:36Z", - "pushed_at": "2022-12-23T16:21:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3383.json b/2022/CVE-2022-3383.json deleted file mode 100644 index 9449e8cf5d..0000000000 --- a/2022/CVE-2022-3383.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524227, - "name": "CVE-2022-3383", - "full_name": "Live-Hack-CVE\/CVE-2022-3383", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3383", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3383 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:39Z", - "updated_at": "2022-12-23T12:47:39Z", - "pushed_at": "2022-12-23T12:47:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3384.json b/2022/CVE-2022-3384.json deleted file mode 100644 index ef1ff2c4f2..0000000000 --- a/2022/CVE-2022-3384.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515915, - "name": "CVE-2022-3384", - "full_name": "Live-Hack-CVE\/CVE-2022-3384", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3384", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3384 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:46Z", - "updated_at": "2022-12-23T12:16:46Z", - "pushed_at": "2022-12-23T12:16:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-33870.json b/2022/CVE-2022-33870.json new file mode 100644 index 0000000000..5b81802845 --- /dev/null +++ b/2022/CVE-2022-33870.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683279, + "name": "CVE-2022-33870", + "full_name": "Live-Hack-CVE\/CVE-2022-33870", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33870", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33870 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:06Z", + "updated_at": "2022-12-23T23:59:06Z", + "pushed_at": "2022-12-23T23:59:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33878.json b/2022/CVE-2022-33878.json new file mode 100644 index 0000000000..be9b4ebe16 --- /dev/null +++ b/2022/CVE-2022-33878.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683190, + "name": "CVE-2022-33878", + "full_name": "Live-Hack-CVE\/CVE-2022-33878", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33878", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33878 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:24Z", + "updated_at": "2022-12-23T23:58:24Z", + "pushed_at": "2022-12-23T23:58:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33973.json b/2022/CVE-2022-33973.json new file mode 100644 index 0000000000..c4143275b8 --- /dev/null +++ b/2022/CVE-2022-33973.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628149, + "name": "CVE-2022-33973", + "full_name": "Live-Hack-CVE\/CVE-2022-33973", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33973", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33973 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:09Z", + "updated_at": "2022-12-23T19:06:09Z", + "pushed_at": "2022-12-23T19:06:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-33981.json b/2022/CVE-2022-33981.json new file mode 100644 index 0000000000..51b291e9b5 --- /dev/null +++ b/2022/CVE-2022-33981.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677323, + "name": "CVE-2022-33981", + "full_name": "Live-Hack-CVE\/CVE-2022-33981", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-33981", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-33981 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:19:01Z", + "updated_at": "2022-12-23T23:19:01Z", + "pushed_at": "2022-12-23T23:19:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34000.json b/2022/CVE-2022-34000.json new file mode 100644 index 0000000000..17d9ed3a43 --- /dev/null +++ b/2022/CVE-2022-34000.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626824, + "name": "CVE-2022-34000", + "full_name": "Live-Hack-CVE\/CVE-2022-34000", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34000", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34000 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:43Z", + "updated_at": "2022-12-23T19:00:43Z", + "pushed_at": "2022-12-23T19:00:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34020.json b/2022/CVE-2022-34020.json new file mode 100644 index 0000000000..fb8b43f315 --- /dev/null +++ b/2022/CVE-2022-34020.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682197, + "name": "CVE-2022-34020", + "full_name": "Live-Hack-CVE\/CVE-2022-34020", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34020", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34020 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:11Z", + "updated_at": "2022-12-23T23:52:11Z", + "pushed_at": "2022-12-23T23:52:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3413.json b/2022/CVE-2022-3413.json new file mode 100644 index 0000000000..73821e77a3 --- /dev/null +++ b/2022/CVE-2022-3413.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646937, + "name": "CVE-2022-3413", + "full_name": "Live-Hack-CVE\/CVE-2022-3413", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3413", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3413 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:52Z", + "updated_at": "2022-12-23T20:31:52Z", + "pushed_at": "2022-12-23T20:31:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3415.json b/2022/CVE-2022-3415.json new file mode 100644 index 0000000000..8622642416 --- /dev/null +++ b/2022/CVE-2022-3415.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627739, + "name": "CVE-2022-3415", + "full_name": "Live-Hack-CVE\/CVE-2022-3415", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3415", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3415 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:38Z", + "updated_at": "2022-12-23T19:04:39Z", + "pushed_at": "2022-12-23T19:04:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34152.json b/2022/CVE-2022-34152.json new file mode 100644 index 0000000000..f9c1841d8f --- /dev/null +++ b/2022/CVE-2022-34152.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627841, + "name": "CVE-2022-34152", + "full_name": "Live-Hack-CVE\/CVE-2022-34152", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34152", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34152 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:03Z", + "updated_at": "2022-12-23T19:05:03Z", + "pushed_at": "2022-12-23T19:05:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34169.json b/2022/CVE-2022-34169.json deleted file mode 100644 index e8ad4a6a13..0000000000 --- a/2022/CVE-2022-34169.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547949, - "name": "CVE-2022-34169", - "full_name": "Live-Hack-CVE\/CVE-2022-34169", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34169", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34169 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:10:49Z", - "updated_at": "2022-12-23T14:10:49Z", - "pushed_at": "2022-12-23T14:10:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34170.json b/2022/CVE-2022-34170.json new file mode 100644 index 0000000000..e386c5d65d --- /dev/null +++ b/2022/CVE-2022-34170.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681747, + "name": "CVE-2022-34170", + "full_name": "Live-Hack-CVE\/CVE-2022-34170", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34170", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34170 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:22Z", + "updated_at": "2022-12-23T23:49:22Z", + "pushed_at": "2022-12-23T23:49:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34171.json b/2022/CVE-2022-34171.json new file mode 100644 index 0000000000..6adfe03d84 --- /dev/null +++ b/2022/CVE-2022-34171.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681740, + "name": "CVE-2022-34171", + "full_name": "Live-Hack-CVE\/CVE-2022-34171", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34171", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34171 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:19Z", + "updated_at": "2022-12-23T23:49:19Z", + "pushed_at": "2022-12-23T23:49:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34172.json b/2022/CVE-2022-34172.json new file mode 100644 index 0000000000..492f22aa80 --- /dev/null +++ b/2022/CVE-2022-34172.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681722, + "name": "CVE-2022-34172", + "full_name": "Live-Hack-CVE\/CVE-2022-34172", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34172", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34172 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:12Z", + "updated_at": "2022-12-23T23:49:12Z", + "pushed_at": "2022-12-23T23:49:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34173.json b/2022/CVE-2022-34173.json new file mode 100644 index 0000000000..45ba0ea361 --- /dev/null +++ b/2022/CVE-2022-34173.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681730, + "name": "CVE-2022-34173", + "full_name": "Live-Hack-CVE\/CVE-2022-34173", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34173", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34173 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:49:15Z", + "updated_at": "2022-12-23T23:49:15Z", + "pushed_at": "2022-12-23T23:49:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3418.json b/2022/CVE-2022-3418.json new file mode 100644 index 0000000000..20c80cb783 --- /dev/null +++ b/2022/CVE-2022-3418.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662055, + "name": "CVE-2022-3418", + "full_name": "Live-Hack-CVE\/CVE-2022-3418", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3418", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3418 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:09Z", + "updated_at": "2022-12-23T21:49:09Z", + "pushed_at": "2022-12-23T21:49:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34312.json b/2022/CVE-2022-34312.json new file mode 100644 index 0000000000..4a84f42f78 --- /dev/null +++ b/2022/CVE-2022-34312.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626597, + "name": "CVE-2022-34312", + "full_name": "Live-Hack-CVE\/CVE-2022-34312", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34312", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34312 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:47Z", + "updated_at": "2022-12-23T18:59:47Z", + "pushed_at": "2022-12-23T18:59:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34313.json b/2022/CVE-2022-34313.json new file mode 100644 index 0000000000..1c2cb7dd82 --- /dev/null +++ b/2022/CVE-2022-34313.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626523, + "name": "CVE-2022-34313", + "full_name": "Live-Hack-CVE\/CVE-2022-34313", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34313", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34313 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:35Z", + "updated_at": "2022-12-23T18:59:35Z", + "pushed_at": "2022-12-23T18:59:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34314.json b/2022/CVE-2022-34314.json new file mode 100644 index 0000000000..df81a9ac29 --- /dev/null +++ b/2022/CVE-2022-34314.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626704, + "name": "CVE-2022-34314", + "full_name": "Live-Hack-CVE\/CVE-2022-34314", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34314", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34314 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:17Z", + "updated_at": "2022-12-23T19:00:18Z", + "pushed_at": "2022-12-23T19:00:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34315.json b/2022/CVE-2022-34315.json new file mode 100644 index 0000000000..577c7e77a0 --- /dev/null +++ b/2022/CVE-2022-34315.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626691, + "name": "CVE-2022-34315", + "full_name": "Live-Hack-CVE\/CVE-2022-34315", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34315", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34315 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:14Z", + "updated_at": "2022-12-23T19:00:14Z", + "pushed_at": "2022-12-23T19:00:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34316.json b/2022/CVE-2022-34316.json new file mode 100644 index 0000000000..6240a9ff03 --- /dev/null +++ b/2022/CVE-2022-34316.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627610, + "name": "CVE-2022-34316", + "full_name": "Live-Hack-CVE\/CVE-2022-34316", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34316", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34316 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:05Z", + "updated_at": "2022-12-23T19:04:05Z", + "pushed_at": "2022-12-23T19:04:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34317.json b/2022/CVE-2022-34317.json new file mode 100644 index 0000000000..dca077e3c2 --- /dev/null +++ b/2022/CVE-2022-34317.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627526, + "name": "CVE-2022-34317", + "full_name": "Live-Hack-CVE\/CVE-2022-34317", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34317", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34317 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:40Z", + "updated_at": "2022-12-23T19:03:40Z", + "pushed_at": "2022-12-23T19:03:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34319.json b/2022/CVE-2022-34319.json new file mode 100644 index 0000000000..9b5a3511e1 --- /dev/null +++ b/2022/CVE-2022-34319.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626565, + "name": "CVE-2022-34319", + "full_name": "Live-Hack-CVE\/CVE-2022-34319", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34319", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34319 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:42Z", + "updated_at": "2022-12-23T18:59:42Z", + "pushed_at": "2022-12-23T18:59:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34320.json b/2022/CVE-2022-34320.json new file mode 100644 index 0000000000..c785d3b5ba --- /dev/null +++ b/2022/CVE-2022-34320.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627425, + "name": "CVE-2022-34320", + "full_name": "Live-Hack-CVE\/CVE-2022-34320", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34320", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34320 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:12Z", + "updated_at": "2022-12-23T19:03:12Z", + "pushed_at": "2022-12-23T19:03:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34329.json b/2022/CVE-2022-34329.json new file mode 100644 index 0000000000..69d4ab2bcd --- /dev/null +++ b/2022/CVE-2022-34329.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626549, + "name": "CVE-2022-34329", + "full_name": "Live-Hack-CVE\/CVE-2022-34329", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34329", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34329 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:39Z", + "updated_at": "2022-12-23T18:59:39Z", + "pushed_at": "2022-12-23T18:59:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34339.json b/2022/CVE-2022-34339.json new file mode 100644 index 0000000000..f26ff14894 --- /dev/null +++ b/2022/CVE-2022-34339.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683211, + "name": "CVE-2022-34339", + "full_name": "Live-Hack-CVE\/CVE-2022-34339", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34339", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34339 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:41Z", + "updated_at": "2022-12-23T23:58:41Z", + "pushed_at": "2022-12-23T23:58:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3445.json b/2022/CVE-2022-3445.json new file mode 100644 index 0000000000..9f2fc8c6b8 --- /dev/null +++ b/2022/CVE-2022-3445.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653963, + "name": "CVE-2022-3445", + "full_name": "Live-Hack-CVE\/CVE-2022-3445", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3445", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3445 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:59Z", + "updated_at": "2022-12-23T21:06:59Z", + "pushed_at": "2022-12-23T21:07:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3446.json b/2022/CVE-2022-3446.json new file mode 100644 index 0000000000..a9fce1d809 --- /dev/null +++ b/2022/CVE-2022-3446.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653972, + "name": "CVE-2022-3446", + "full_name": "Live-Hack-CVE\/CVE-2022-3446", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3446", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3446 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:03Z", + "updated_at": "2022-12-23T21:07:03Z", + "pushed_at": "2022-12-23T21:07:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3447.json b/2022/CVE-2022-3447.json new file mode 100644 index 0000000000..4d2df82479 --- /dev/null +++ b/2022/CVE-2022-3447.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646803, + "name": "CVE-2022-3447", + "full_name": "Live-Hack-CVE\/CVE-2022-3447", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3447", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3447 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:10Z", + "updated_at": "2022-12-23T20:31:10Z", + "pushed_at": "2022-12-23T20:31:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3448.json b/2022/CVE-2022-3448.json new file mode 100644 index 0000000000..563eff00fa --- /dev/null +++ b/2022/CVE-2022-3448.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646813, + "name": "CVE-2022-3448", + "full_name": "Live-Hack-CVE\/CVE-2022-3448", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3448", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3448 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:14Z", + "updated_at": "2022-12-23T20:31:14Z", + "pushed_at": "2022-12-23T20:31:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3449.json b/2022/CVE-2022-3449.json new file mode 100644 index 0000000000..b9d6588c99 --- /dev/null +++ b/2022/CVE-2022-3449.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653922, + "name": "CVE-2022-3449", + "full_name": "Live-Hack-CVE\/CVE-2022-3449", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3449", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3449 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:48Z", + "updated_at": "2022-12-23T21:06:48Z", + "pushed_at": "2022-12-23T21:06:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3450.json b/2022/CVE-2022-3450.json new file mode 100644 index 0000000000..918d8e8d7d --- /dev/null +++ b/2022/CVE-2022-3450.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653683, + "name": "CVE-2022-3450", + "full_name": "Live-Hack-CVE\/CVE-2022-3450", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3450", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3450 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:40Z", + "updated_at": "2022-12-23T21:05:40Z", + "pushed_at": "2022-12-23T21:05:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3451.json b/2022/CVE-2022-3451.json new file mode 100644 index 0000000000..501c173e4c --- /dev/null +++ b/2022/CVE-2022-3451.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662068, + "name": "CVE-2022-3451", + "full_name": "Live-Hack-CVE\/CVE-2022-3451", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3451", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3451 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:13Z", + "updated_at": "2022-12-23T21:49:13Z", + "pushed_at": "2022-12-23T21:49:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34526.json b/2022/CVE-2022-34526.json deleted file mode 100644 index 08905ed36f..0000000000 --- a/2022/CVE-2022-34526.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562582, - "name": "CVE-2022-34526", - "full_name": "Live-Hack-CVE\/CVE-2022-34526", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34526", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34526 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:26Z", - "updated_at": "2022-12-23T14:59:26Z", - "pushed_at": "2022-12-23T14:59:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3462.json b/2022/CVE-2022-3462.json new file mode 100644 index 0000000000..3a100fe90a --- /dev/null +++ b/2022/CVE-2022-3462.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662032, + "name": "CVE-2022-3462", + "full_name": "Live-Hack-CVE\/CVE-2022-3462", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3462", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3462 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:05Z", + "updated_at": "2022-12-23T21:49:05Z", + "pushed_at": "2022-12-23T21:49:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3463.json b/2022/CVE-2022-3463.json new file mode 100644 index 0000000000..d3c81d7982 --- /dev/null +++ b/2022/CVE-2022-3463.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662021, + "name": "CVE-2022-3463", + "full_name": "Live-Hack-CVE\/CVE-2022-3463", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3463", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3463 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:02Z", + "updated_at": "2022-12-23T21:49:02Z", + "pushed_at": "2022-12-23T21:49:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34665.json b/2022/CVE-2022-34665.json deleted file mode 100644 index e3e98fb689..0000000000 --- a/2022/CVE-2022-34665.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538366, - "name": "CVE-2022-34665", - "full_name": "Live-Hack-CVE\/CVE-2022-34665", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34665", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34665 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:17Z", - "updated_at": "2022-12-23T13:37:17Z", - "pushed_at": "2022-12-23T13:37:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34666.json b/2022/CVE-2022-34666.json deleted file mode 100644 index 69065ae430..0000000000 --- a/2022/CVE-2022-34666.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594684, - "name": "CVE-2022-34666", - "full_name": "Live-Hack-CVE\/CVE-2022-34666", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34666", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34666 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:32Z", - "updated_at": "2022-12-23T16:55:32Z", - "pushed_at": "2022-12-23T16:55:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-34667.json b/2022/CVE-2022-34667.json deleted file mode 100644 index 315f06d147..0000000000 --- a/2022/CVE-2022-34667.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538349, - "name": "CVE-2022-34667", - "full_name": "Live-Hack-CVE\/CVE-2022-34667", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34667", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34667 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:13Z", - "updated_at": "2022-12-23T13:37:13Z", - "pushed_at": "2022-12-23T13:37:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3469.json b/2022/CVE-2022-3469.json new file mode 100644 index 0000000000..ce834bace6 --- /dev/null +++ b/2022/CVE-2022-3469.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627712, + "name": "CVE-2022-3469", + "full_name": "Live-Hack-CVE\/CVE-2022-3469", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3469", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3469 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:32Z", + "updated_at": "2022-12-23T19:04:32Z", + "pushed_at": "2022-12-23T19:04:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34730.json b/2022/CVE-2022-34730.json new file mode 100644 index 0000000000..58d58a9fa6 --- /dev/null +++ b/2022/CVE-2022-34730.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645996, + "name": "CVE-2022-34730", + "full_name": "Live-Hack-CVE\/CVE-2022-34730", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34730", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34730 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:16Z", + "updated_at": "2022-12-23T20:27:16Z", + "pushed_at": "2022-12-23T20:27:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34732.json b/2022/CVE-2022-34732.json new file mode 100644 index 0000000000..03ffd38e82 --- /dev/null +++ b/2022/CVE-2022-34732.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646081, + "name": "CVE-2022-34732", + "full_name": "Live-Hack-CVE\/CVE-2022-34732", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34732", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34732 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:38Z", + "updated_at": "2022-12-23T20:27:38Z", + "pushed_at": "2022-12-23T20:27:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34734.json b/2022/CVE-2022-34734.json new file mode 100644 index 0000000000..9b101eb4ee --- /dev/null +++ b/2022/CVE-2022-34734.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646103, + "name": "CVE-2022-34734", + "full_name": "Live-Hack-CVE\/CVE-2022-34734", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34734", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34734 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:41Z", + "updated_at": "2022-12-23T20:27:41Z", + "pushed_at": "2022-12-23T20:27:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3477.json b/2022/CVE-2022-3477.json new file mode 100644 index 0000000000..1c133f0e87 --- /dev/null +++ b/2022/CVE-2022-3477.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627685, + "name": "CVE-2022-3477", + "full_name": "Live-Hack-CVE\/CVE-2022-3477", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3477", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3477 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:25Z", + "updated_at": "2022-12-23T19:04:25Z", + "pushed_at": "2022-12-23T19:04:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34822.json b/2022/CVE-2022-34822.json new file mode 100644 index 0000000000..8c4b3ef74d --- /dev/null +++ b/2022/CVE-2022-34822.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662582, + "name": "CVE-2022-34822", + "full_name": "Live-Hack-CVE\/CVE-2022-34822", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34822", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34822 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:49Z", + "updated_at": "2022-12-23T21:51:49Z", + "pushed_at": "2022-12-23T21:51:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34823.json b/2022/CVE-2022-34823.json new file mode 100644 index 0000000000..7793373aae --- /dev/null +++ b/2022/CVE-2022-34823.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662594, + "name": "CVE-2022-34823", + "full_name": "Live-Hack-CVE\/CVE-2022-34823", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34823", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34823 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:52Z", + "updated_at": "2022-12-23T21:51:52Z", + "pushed_at": "2022-12-23T21:51:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34824.json b/2022/CVE-2022-34824.json new file mode 100644 index 0000000000..5b0854c088 --- /dev/null +++ b/2022/CVE-2022-34824.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662603, + "name": "CVE-2022-34824", + "full_name": "Live-Hack-CVE\/CVE-2022-34824", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34824", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34824 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:56Z", + "updated_at": "2022-12-23T21:51:56Z", + "pushed_at": "2022-12-23T21:51:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34825.json b/2022/CVE-2022-34825.json new file mode 100644 index 0000000000..d1dbb851d7 --- /dev/null +++ b/2022/CVE-2022-34825.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662563, + "name": "CVE-2022-34825", + "full_name": "Live-Hack-CVE\/CVE-2022-34825", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34825", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34825 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:42Z", + "updated_at": "2022-12-23T21:51:42Z", + "pushed_at": "2022-12-23T21:51:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34827.json b/2022/CVE-2022-34827.json deleted file mode 100644 index cb3080dcbd..0000000000 --- a/2022/CVE-2022-34827.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561234, - "name": "CVE-2022-34827", - "full_name": "Live-Hack-CVE\/CVE-2022-34827", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34827", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34827 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:55:09Z", - "updated_at": "2022-12-23T14:55:09Z", - "pushed_at": "2022-12-23T14:55:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3483.json b/2022/CVE-2022-3483.json new file mode 100644 index 0000000000..732c05c2cc --- /dev/null +++ b/2022/CVE-2022-3483.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646978, + "name": "CVE-2022-3483", + "full_name": "Live-Hack-CVE\/CVE-2022-3483", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3483", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3483 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:06Z", + "updated_at": "2022-12-23T20:32:06Z", + "pushed_at": "2022-12-23T20:32:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-34830.json b/2022/CVE-2022-34830.json deleted file mode 100644 index bdd4f29647..0000000000 --- a/2022/CVE-2022-34830.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560018, - "name": "CVE-2022-34830", - "full_name": "Live-Hack-CVE\/CVE-2022-34830", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-34830", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-34830 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:12Z", - "updated_at": "2022-12-23T14:51:12Z", - "pushed_at": "2022-12-23T14:51:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3484.json b/2022/CVE-2022-3484.json new file mode 100644 index 0000000000..a176ef3eb3 --- /dev/null +++ b/2022/CVE-2022-3484.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627670, + "name": "CVE-2022-3484", + "full_name": "Live-Hack-CVE\/CVE-2022-3484", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3484", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3484 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:21Z", + "updated_at": "2022-12-23T19:04:21Z", + "pushed_at": "2022-12-23T19:04:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3486.json b/2022/CVE-2022-3486.json new file mode 100644 index 0000000000..efa030dacf --- /dev/null +++ b/2022/CVE-2022-3486.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646932, + "name": "CVE-2022-3486", + "full_name": "Live-Hack-CVE\/CVE-2022-3486", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3486", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3486 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:48Z", + "updated_at": "2022-12-23T20:31:48Z", + "pushed_at": "2022-12-23T20:31:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3489.json b/2022/CVE-2022-3489.json new file mode 100644 index 0000000000..414d8c38f5 --- /dev/null +++ b/2022/CVE-2022-3489.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654849, + "name": "CVE-2022-3489", + "full_name": "Live-Hack-CVE\/CVE-2022-3489", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3489", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3489 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:16Z", + "updated_at": "2022-12-23T21:11:16Z", + "pushed_at": "2022-12-23T21:11:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3490.json b/2022/CVE-2022-3490.json deleted file mode 100644 index e02e701e24..0000000000 --- a/2022/CVE-2022-3490.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535765, - "name": "CVE-2022-3490", - "full_name": "Live-Hack-CVE\/CVE-2022-3490", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3490", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3490 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:29Z", - "updated_at": "2022-12-23T13:28:29Z", - "pushed_at": "2022-12-23T13:28:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3494.json b/2022/CVE-2022-3494.json new file mode 100644 index 0000000000..b504a13972 --- /dev/null +++ b/2022/CVE-2022-3494.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654840, + "name": "CVE-2022-3494", + "full_name": "Live-Hack-CVE\/CVE-2022-3494", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3494", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3494 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:13Z", + "updated_at": "2022-12-23T21:11:13Z", + "pushed_at": "2022-12-23T21:11:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3511.json b/2022/CVE-2022-3511.json deleted file mode 100644 index 31924050ff..0000000000 --- a/2022/CVE-2022-3511.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536632, - "name": "CVE-2022-3511", - "full_name": "Live-Hack-CVE\/CVE-2022-3511", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3511", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3511 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:26Z", - "updated_at": "2022-12-23T13:31:26Z", - "pushed_at": "2022-12-23T13:31:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3516.json b/2022/CVE-2022-3516.json deleted file mode 100644 index beb1c1161f..0000000000 --- a/2022/CVE-2022-3516.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586256, - "name": "CVE-2022-3516", - "full_name": "Live-Hack-CVE\/CVE-2022-3516", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3516", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3516 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:46Z", - "updated_at": "2022-12-23T16:23:46Z", - "pushed_at": "2022-12-23T16:23:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3518.json b/2022/CVE-2022-3518.json new file mode 100644 index 0000000000..884dfc8521 --- /dev/null +++ b/2022/CVE-2022-3518.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682216, + "name": "CVE-2022-3518", + "full_name": "Live-Hack-CVE\/CVE-2022-3518", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3518", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3518 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:17Z", + "updated_at": "2022-12-23T23:52:17Z", + "pushed_at": "2022-12-23T23:52:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3525.json b/2022/CVE-2022-3525.json deleted file mode 100644 index f92ed85e52..0000000000 --- a/2022/CVE-2022-3525.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586246, - "name": "CVE-2022-3525", - "full_name": "Live-Hack-CVE\/CVE-2022-3525", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3525", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3525 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:43Z", - "updated_at": "2022-12-23T16:23:43Z", - "pushed_at": "2022-12-23T16:23:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35276.json b/2022/CVE-2022-35276.json new file mode 100644 index 0000000000..0ab00a7328 --- /dev/null +++ b/2022/CVE-2022-35276.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627857, + "name": "CVE-2022-35276", + "full_name": "Live-Hack-CVE\/CVE-2022-35276", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35276", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35276 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:06Z", + "updated_at": "2022-12-23T19:05:06Z", + "pushed_at": "2022-12-23T19:05:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35279.json b/2022/CVE-2022-35279.json new file mode 100644 index 0000000000..e3b9abc3b1 --- /dev/null +++ b/2022/CVE-2022-35279.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654489, + "name": "CVE-2022-35279", + "full_name": "Live-Hack-CVE\/CVE-2022-35279", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35279", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35279 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:35Z", + "updated_at": "2022-12-23T21:09:35Z", + "pushed_at": "2022-12-23T21:09:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3536.json b/2022/CVE-2022-3536.json new file mode 100644 index 0000000000..77d8799b57 --- /dev/null +++ b/2022/CVE-2022-3536.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654785, + "name": "CVE-2022-3536", + "full_name": "Live-Hack-CVE\/CVE-2022-3536", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3536", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3536 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:52Z", + "updated_at": "2022-12-23T21:10:52Z", + "pushed_at": "2022-12-23T21:10:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3537.json b/2022/CVE-2022-3537.json new file mode 100644 index 0000000000..6a51cb3051 --- /dev/null +++ b/2022/CVE-2022-3537.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663132, + "name": "CVE-2022-3537", + "full_name": "Live-Hack-CVE\/CVE-2022-3537", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3537", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3537 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:57Z", + "updated_at": "2022-12-23T21:54:57Z", + "pushed_at": "2022-12-23T21:54:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3538.json b/2022/CVE-2022-3538.json new file mode 100644 index 0000000000..2453f1e7cb --- /dev/null +++ b/2022/CVE-2022-3538.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627626, + "name": "CVE-2022-3538", + "full_name": "Live-Hack-CVE\/CVE-2022-3538", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3538", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3538 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:09Z", + "updated_at": "2022-12-23T19:04:09Z", + "pushed_at": "2022-12-23T19:04:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3539.json b/2022/CVE-2022-3539.json new file mode 100644 index 0000000000..8c56627c8f --- /dev/null +++ b/2022/CVE-2022-3539.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627595, + "name": "CVE-2022-3539", + "full_name": "Live-Hack-CVE\/CVE-2022-3539", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3539", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3539 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:02Z", + "updated_at": "2022-12-23T19:04:02Z", + "pushed_at": "2022-12-23T19:04:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35405.json b/2022/CVE-2022-35405.json new file mode 100644 index 0000000000..cc24b04460 --- /dev/null +++ b/2022/CVE-2022-35405.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677285, + "name": "CVE-2022-35405", + "full_name": "Live-Hack-CVE\/CVE-2022-35405", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35405", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35405 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:45Z", + "updated_at": "2022-12-23T23:18:45Z", + "pushed_at": "2022-12-23T23:18:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35407.json b/2022/CVE-2022-35407.json deleted file mode 100644 index 4e5a725765..0000000000 --- a/2022/CVE-2022-35407.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526782, - "name": "CVE-2022-35407", - "full_name": "Live-Hack-CVE\/CVE-2022-35407", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35407", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35407 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:43Z", - "updated_at": "2022-12-23T12:56:43Z", - "pushed_at": "2022-12-23T12:56:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35411.json b/2022/CVE-2022-35411.json new file mode 100644 index 0000000000..9e948b45a9 --- /dev/null +++ b/2022/CVE-2022-35411.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677267, + "name": "CVE-2022-35411", + "full_name": "Live-Hack-CVE\/CVE-2022-35411", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35411", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35411 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:38Z", + "updated_at": "2022-12-23T23:18:38Z", + "pushed_at": "2022-12-23T23:18:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3550.json b/2022/CVE-2022-3550.json deleted file mode 100644 index c58451e692..0000000000 --- a/2022/CVE-2022-3550.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561219, - "name": "CVE-2022-3550", - "full_name": "Live-Hack-CVE\/CVE-2022-3550", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3550", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3550 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:55:06Z", - "updated_at": "2022-12-23T14:55:06Z", - "pushed_at": "2022-12-23T14:55:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35500.json b/2022/CVE-2022-35500.json deleted file mode 100644 index 1d028d99dc..0000000000 --- a/2022/CVE-2022-35500.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550600, - "name": "CVE-2022-35500", - "full_name": "Live-Hack-CVE\/CVE-2022-35500", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35500", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35500 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:27Z", - "updated_at": "2022-12-23T14:19:27Z", - "pushed_at": "2022-12-23T14:19:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35501.json b/2022/CVE-2022-35501.json deleted file mode 100644 index 199722e3a6..0000000000 --- a/2022/CVE-2022-35501.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550181, - "name": "CVE-2022-35501", - "full_name": "Live-Hack-CVE\/CVE-2022-35501", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35501", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35501 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:06Z", - "updated_at": "2022-12-23T14:18:06Z", - "pushed_at": "2022-12-23T14:18:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3553.json b/2022/CVE-2022-3553.json deleted file mode 100644 index 24ef29d72c..0000000000 --- a/2022/CVE-2022-3553.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597317, - "name": "CVE-2022-3553", - "full_name": "Live-Hack-CVE\/CVE-2022-3553", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3553", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3553 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:05:15Z", - "updated_at": "2022-12-23T17:05:15Z", - "pushed_at": "2022-12-23T17:05:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3558.json b/2022/CVE-2022-3558.json new file mode 100644 index 0000000000..6935b4c8e2 --- /dev/null +++ b/2022/CVE-2022-3558.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654830, + "name": "CVE-2022-3558", + "full_name": "Live-Hack-CVE\/CVE-2022-3558", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3558", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3558 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:09Z", + "updated_at": "2022-12-23T21:11:09Z", + "pushed_at": "2022-12-23T21:11:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3559.json b/2022/CVE-2022-3559.json new file mode 100644 index 0000000000..c56d4bb155 --- /dev/null +++ b/2022/CVE-2022-3559.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628261, + "name": "CVE-2022-3559", + "full_name": "Live-Hack-CVE\/CVE-2022-3559", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3559", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3559 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:40Z", + "updated_at": "2022-12-23T19:06:40Z", + "pushed_at": "2022-12-23T19:06:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3561.json b/2022/CVE-2022-3561.json deleted file mode 100644 index 4a69b819ec..0000000000 --- a/2022/CVE-2022-3561.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586229, - "name": "CVE-2022-3561", - "full_name": "Live-Hack-CVE\/CVE-2022-3561", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3561", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3561 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:39Z", - "updated_at": "2022-12-23T16:23:39Z", - "pushed_at": "2022-12-23T16:23:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3562.json b/2022/CVE-2022-3562.json deleted file mode 100644 index 745872f3e6..0000000000 --- a/2022/CVE-2022-3562.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586217, - "name": "CVE-2022-3562", - "full_name": "Live-Hack-CVE\/CVE-2022-3562", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3562", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3562 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:36Z", - "updated_at": "2022-12-23T16:23:36Z", - "pushed_at": "2022-12-23T16:23:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35642.json b/2022/CVE-2022-35642.json new file mode 100644 index 0000000000..370c13bc0f --- /dev/null +++ b/2022/CVE-2022-35642.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683222, + "name": "CVE-2022-35642", + "full_name": "Live-Hack-CVE\/CVE-2022-35642", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35642", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35642 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:44Z", + "updated_at": "2022-12-23T23:58:44Z", + "pushed_at": "2022-12-23T23:58:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3570.json b/2022/CVE-2022-3570.json deleted file mode 100644 index 584d0643c1..0000000000 --- a/2022/CVE-2022-3570.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585306, - "name": "CVE-2022-3570", - "full_name": "Live-Hack-CVE\/CVE-2022-3570", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3570", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3570 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:32Z", - "updated_at": "2022-12-23T16:20:32Z", - "pushed_at": "2022-12-23T16:20:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35717.json b/2022/CVE-2022-35717.json new file mode 100644 index 0000000000..92a20d7260 --- /dev/null +++ b/2022/CVE-2022-35717.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683007, + "name": "CVE-2022-35717", + "full_name": "Live-Hack-CVE\/CVE-2022-35717", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35717", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35717 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:12Z", + "updated_at": "2022-12-23T23:57:12Z", + "pushed_at": "2022-12-23T23:57:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35719.json b/2022/CVE-2022-35719.json new file mode 100644 index 0000000000..0db1cadb01 --- /dev/null +++ b/2022/CVE-2022-35719.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626455, + "name": "CVE-2022-35719", + "full_name": "Live-Hack-CVE\/CVE-2022-35719", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35719", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35719 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:17Z", + "updated_at": "2022-12-23T18:59:17Z", + "pushed_at": "2022-12-23T18:59:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35737.json b/2022/CVE-2022-35737.json new file mode 100644 index 0000000000..c74296e188 --- /dev/null +++ b/2022/CVE-2022-35737.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626856, + "name": "CVE-2022-35737", + "full_name": "Live-Hack-CVE\/CVE-2022-35737", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35737", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35737 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:49Z", + "updated_at": "2022-12-23T19:00:49Z", + "pushed_at": "2022-12-23T19:00:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3574.json b/2022/CVE-2022-3574.json new file mode 100644 index 0000000000..a41e389f9b --- /dev/null +++ b/2022/CVE-2022-3574.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627576, + "name": "CVE-2022-3574", + "full_name": "Live-Hack-CVE\/CVE-2022-3574", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3574", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3574 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:57Z", + "updated_at": "2022-12-23T19:03:57Z", + "pushed_at": "2022-12-23T19:04:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35740.json b/2022/CVE-2022-35740.json new file mode 100644 index 0000000000..91f23a6b44 --- /dev/null +++ b/2022/CVE-2022-35740.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637910, + "name": "CVE-2022-35740", + "full_name": "Live-Hack-CVE\/CVE-2022-35740", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35740", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35740 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:39Z", + "updated_at": "2022-12-23T19:49:39Z", + "pushed_at": "2022-12-23T19:49:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3575.json b/2022/CVE-2022-3575.json new file mode 100644 index 0000000000..9890a31a57 --- /dev/null +++ b/2022/CVE-2022-3575.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682073, + "name": "CVE-2022-3575", + "full_name": "Live-Hack-CVE\/CVE-2022-3575", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3575", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3575 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:26Z", + "updated_at": "2022-12-23T23:51:26Z", + "pushed_at": "2022-12-23T23:51:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3578.json b/2022/CVE-2022-3578.json new file mode 100644 index 0000000000..dcaa0b74c4 --- /dev/null +++ b/2022/CVE-2022-3578.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627559, + "name": "CVE-2022-3578", + "full_name": "Live-Hack-CVE\/CVE-2022-3578", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3578", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3578 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:51Z", + "updated_at": "2022-12-23T19:03:51Z", + "pushed_at": "2022-12-23T19:03:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35812.json b/2022/CVE-2022-35812.json new file mode 100644 index 0000000000..a661b34b8e --- /dev/null +++ b/2022/CVE-2022-35812.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675779, + "name": "CVE-2022-35812", + "full_name": "Live-Hack-CVE\/CVE-2022-35812", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35812", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35812 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:21Z", + "updated_at": "2022-12-23T23:09:21Z", + "pushed_at": "2022-12-23T23:09:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35837.json b/2022/CVE-2022-35837.json new file mode 100644 index 0000000000..fd6912fd74 --- /dev/null +++ b/2022/CVE-2022-35837.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646514, + "name": "CVE-2022-35837", + "full_name": "Live-Hack-CVE\/CVE-2022-35837", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35837", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35837 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:53Z", + "updated_at": "2022-12-23T20:29:53Z", + "pushed_at": "2022-12-23T20:29:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-35842.json b/2022/CVE-2022-35842.json new file mode 100644 index 0000000000..ab2e71b26d --- /dev/null +++ b/2022/CVE-2022-35842.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683146, + "name": "CVE-2022-35842", + "full_name": "Live-Hack-CVE\/CVE-2022-35842", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35842", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35842 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:06Z", + "updated_at": "2022-12-23T23:58:06Z", + "pushed_at": "2022-12-23T23:58:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3586.json b/2022/CVE-2022-3586.json new file mode 100644 index 0000000000..5a925eb245 --- /dev/null +++ b/2022/CVE-2022-3586.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682277, + "name": "CVE-2022-3586", + "full_name": "Live-Hack-CVE\/CVE-2022-3586", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3586", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3586 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:40Z", + "updated_at": "2022-12-23T23:52:40Z", + "pushed_at": "2022-12-23T23:52:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3589.json b/2022/CVE-2022-3589.json deleted file mode 100644 index dd8cbba49c..0000000000 --- a/2022/CVE-2022-3589.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535744, - "name": "CVE-2022-3589", - "full_name": "Live-Hack-CVE\/CVE-2022-3589", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3589", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3589 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:25Z", - "updated_at": "2022-12-23T13:28:25Z", - "pushed_at": "2022-12-23T13:28:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35897.json b/2022/CVE-2022-35897.json deleted file mode 100644 index 77479712e0..0000000000 --- a/2022/CVE-2022-35897.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526761, - "name": "CVE-2022-35897", - "full_name": "Live-Hack-CVE\/CVE-2022-35897", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35897", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35897 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:35Z", - "updated_at": "2022-12-23T12:56:36Z", - "pushed_at": "2022-12-23T12:56:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-35951.json b/2022/CVE-2022-35951.json new file mode 100644 index 0000000000..221aa636a4 --- /dev/null +++ b/2022/CVE-2022-35951.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661748, + "name": "CVE-2022-35951", + "full_name": "Live-Hack-CVE\/CVE-2022-35951", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-35951", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-35951 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:41Z", + "updated_at": "2022-12-23T21:47:41Z", + "pushed_at": "2022-12-23T21:47:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3600.json b/2022/CVE-2022-3600.json deleted file mode 100644 index 6656c4a6aa..0000000000 --- a/2022/CVE-2022-3600.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572153, - "name": "CVE-2022-3600", - "full_name": "Live-Hack-CVE\/CVE-2022-3600", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3600", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3600 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:43Z", - "updated_at": "2022-12-23T15:32:43Z", - "pushed_at": "2022-12-23T15:32:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3601.json b/2022/CVE-2022-3601.json deleted file mode 100644 index 5e60512b64..0000000000 --- a/2022/CVE-2022-3601.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536620, - "name": "CVE-2022-3601", - "full_name": "Live-Hack-CVE\/CVE-2022-3601", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3601", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3601 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:23Z", - "updated_at": "2022-12-23T13:31:23Z", - "pushed_at": "2022-12-23T13:31:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json new file mode 100644 index 0000000000..3a948c50f3 --- /dev/null +++ b/2022/CVE-2022-3602.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682114, + "name": "CVE-2022-3602", + "full_name": "Live-Hack-CVE\/CVE-2022-3602", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3602", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3602 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:38Z", + "updated_at": "2022-12-23T23:51:38Z", + "pushed_at": "2022-12-23T23:51:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36022.json b/2022/CVE-2022-36022.json new file mode 100644 index 0000000000..b21cb5418e --- /dev/null +++ b/2022/CVE-2022-36022.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637926, + "name": "CVE-2022-36022", + "full_name": "Live-Hack-CVE\/CVE-2022-36022", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36022", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36022 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:42Z", + "updated_at": "2022-12-23T19:49:42Z", + "pushed_at": "2022-12-23T19:49:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3603.json b/2022/CVE-2022-3603.json deleted file mode 100644 index 60d39da340..0000000000 --- a/2022/CVE-2022-3603.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535793, - "name": "CVE-2022-3603", - "full_name": "Live-Hack-CVE\/CVE-2022-3603", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3603", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3603 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:35Z", - "updated_at": "2022-12-23T13:28:35Z", - "pushed_at": "2022-12-23T13:28:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36067.json b/2022/CVE-2022-36067.json new file mode 100644 index 0000000000..33330713e2 --- /dev/null +++ b/2022/CVE-2022-36067.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675541, + "name": "CVE-2022-36067", + "full_name": "Live-Hack-CVE\/CVE-2022-36067", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36067", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36067 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:07:54Z", + "updated_at": "2022-12-23T23:07:54Z", + "pushed_at": "2022-12-23T23:07:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36077.json b/2022/CVE-2022-36077.json new file mode 100644 index 0000000000..7241c81a3f --- /dev/null +++ b/2022/CVE-2022-36077.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662182, + "name": "CVE-2022-36077", + "full_name": "Live-Hack-CVE\/CVE-2022-36077", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36077", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36077 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:46Z", + "updated_at": "2022-12-23T21:49:46Z", + "pushed_at": "2022-12-23T21:49:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36087.json b/2022/CVE-2022-36087.json new file mode 100644 index 0000000000..03af53f238 --- /dev/null +++ b/2022/CVE-2022-36087.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655351, + "name": "CVE-2022-36087", + "full_name": "Live-Hack-CVE\/CVE-2022-36087", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36087", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36087 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:38Z", + "updated_at": "2022-12-23T21:13:38Z", + "pushed_at": "2022-12-23T21:13:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3610.json b/2022/CVE-2022-3610.json deleted file mode 100644 index 87bef820e3..0000000000 --- a/2022/CVE-2022-3610.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536603, - "name": "CVE-2022-3610", - "full_name": "Live-Hack-CVE\/CVE-2022-3610", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3610", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3610 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:20Z", - "updated_at": "2022-12-23T13:31:20Z", - "pushed_at": "2022-12-23T13:31:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36111.json b/2022/CVE-2022-36111.json deleted file mode 100644 index a644cdd1bd..0000000000 --- a/2022/CVE-2022-36111.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581559999, - "name": "CVE-2022-36111", - "full_name": "Live-Hack-CVE\/CVE-2022-36111", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36111", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36111 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:09Z", - "updated_at": "2022-12-23T14:51:09Z", - "pushed_at": "2022-12-23T14:51:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36133.json b/2022/CVE-2022-36133.json deleted file mode 100644 index 7f02f8173b..0000000000 --- a/2022/CVE-2022-36133.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526463, - "name": "CVE-2022-36133", - "full_name": "Live-Hack-CVE\/CVE-2022-36133", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36133", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36133 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:31Z", - "updated_at": "2022-12-23T12:55:31Z", - "pushed_at": "2022-12-23T12:55:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36136.json b/2022/CVE-2022-36136.json deleted file mode 100644 index db6cd7d251..0000000000 --- a/2022/CVE-2022-36136.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536316, - "name": "CVE-2022-36136", - "full_name": "Live-Hack-CVE\/CVE-2022-36136", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36136", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36136 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:24Z", - "updated_at": "2022-12-23T13:30:24Z", - "pushed_at": "2022-12-23T13:30:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36137.json b/2022/CVE-2022-36137.json deleted file mode 100644 index e21aa96e08..0000000000 --- a/2022/CVE-2022-36137.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536301, - "name": "CVE-2022-36137", - "full_name": "Live-Hack-CVE\/CVE-2022-36137", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36137", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36137 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:21Z", - "updated_at": "2022-12-23T13:30:21Z", - "pushed_at": "2022-12-23T13:30:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36179.json b/2022/CVE-2022-36179.json deleted file mode 100644 index 37b6343703..0000000000 --- a/2022/CVE-2022-36179.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550816, - "name": "CVE-2022-36179", - "full_name": "Live-Hack-CVE\/CVE-2022-36179", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36179", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36179 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:04Z", - "updated_at": "2022-12-23T14:20:04Z", - "pushed_at": "2022-12-23T14:20:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3618.json b/2022/CVE-2022-3618.json deleted file mode 100644 index 623ab0bf22..0000000000 --- a/2022/CVE-2022-3618.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562686, - "name": "CVE-2022-3618", - "full_name": "Live-Hack-CVE\/CVE-2022-3618", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3618", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3618 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:49Z", - "updated_at": "2022-12-23T14:59:49Z", - "pushed_at": "2022-12-23T14:59:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36180.json b/2022/CVE-2022-36180.json deleted file mode 100644 index bfaba97918..0000000000 --- a/2022/CVE-2022-36180.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550787, - "name": "CVE-2022-36180", - "full_name": "Live-Hack-CVE\/CVE-2022-36180", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36180", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36180 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:00Z", - "updated_at": "2022-12-23T14:20:00Z", - "pushed_at": "2022-12-23T14:20:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36193.json b/2022/CVE-2022-36193.json deleted file mode 100644 index 1159634764..0000000000 --- a/2022/CVE-2022-36193.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549965, - "name": "CVE-2022-36193", - "full_name": "Live-Hack-CVE\/CVE-2022-36193", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36193", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36193 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:28Z", - "updated_at": "2022-12-23T14:17:28Z", - "pushed_at": "2022-12-23T14:17:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3620.json b/2022/CVE-2022-3620.json new file mode 100644 index 0000000000..e1056233bb --- /dev/null +++ b/2022/CVE-2022-3620.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646175, + "name": "CVE-2022-3620", + "full_name": "Live-Hack-CVE\/CVE-2022-3620", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3620", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3620 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:02Z", + "updated_at": "2022-12-23T20:28:02Z", + "pushed_at": "2022-12-23T20:28:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3621.json b/2022/CVE-2022-3621.json new file mode 100644 index 0000000000..ea3cb44d35 --- /dev/null +++ b/2022/CVE-2022-3621.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682389, + "name": "CVE-2022-3621", + "full_name": "Live-Hack-CVE\/CVE-2022-3621", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3621", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3621 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:25Z", + "updated_at": "2022-12-23T23:53:25Z", + "pushed_at": "2022-12-23T23:53:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3625.json b/2022/CVE-2022-3625.json new file mode 100644 index 0000000000..020c0de3fb --- /dev/null +++ b/2022/CVE-2022-3625.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682296, + "name": "CVE-2022-3625", + "full_name": "Live-Hack-CVE\/CVE-2022-3625", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3625", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3625 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:47Z", + "updated_at": "2022-12-23T23:52:47Z", + "pushed_at": "2022-12-23T23:52:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3629.json b/2022/CVE-2022-3629.json new file mode 100644 index 0000000000..41a1682723 --- /dev/null +++ b/2022/CVE-2022-3629.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682300, + "name": "CVE-2022-3629", + "full_name": "Live-Hack-CVE\/CVE-2022-3629", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3629", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3629 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:50Z", + "updated_at": "2022-12-23T23:52:50Z", + "pushed_at": "2022-12-23T23:52:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3631.json b/2022/CVE-2022-3631.json new file mode 100644 index 0000000000..b9e4b19dcb --- /dev/null +++ b/2022/CVE-2022-3631.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627542, + "name": "CVE-2022-3631", + "full_name": "Live-Hack-CVE\/CVE-2022-3631", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3631", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3631 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:03:44Z", + "updated_at": "2022-12-23T19:03:44Z", + "pushed_at": "2022-12-23T19:03:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3632.json b/2022/CVE-2022-3632.json new file mode 100644 index 0000000000..510c0bae13 --- /dev/null +++ b/2022/CVE-2022-3632.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626511, + "name": "CVE-2022-3632", + "full_name": "Live-Hack-CVE\/CVE-2022-3632", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3632", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3632 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:31Z", + "updated_at": "2022-12-23T18:59:31Z", + "pushed_at": "2022-12-23T18:59:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36337.json b/2022/CVE-2022-36337.json deleted file mode 100644 index 48ada4d780..0000000000 --- a/2022/CVE-2022-36337.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535728, - "name": "CVE-2022-36337", - "full_name": "Live-Hack-CVE\/CVE-2022-36337", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36337", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36337 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:22Z", - "updated_at": "2022-12-23T13:28:22Z", - "pushed_at": "2022-12-23T13:28:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3634.json b/2022/CVE-2022-3634.json deleted file mode 100644 index 60fae97a73..0000000000 --- a/2022/CVE-2022-3634.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572169, - "name": "CVE-2022-3634", - "full_name": "Live-Hack-CVE\/CVE-2022-3634", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3634", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3634 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:46Z", - "updated_at": "2022-12-23T15:32:46Z", - "pushed_at": "2022-12-23T15:32:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36349.json b/2022/CVE-2022-36349.json new file mode 100644 index 0000000000..284bd89a8c --- /dev/null +++ b/2022/CVE-2022-36349.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628763, + "name": "CVE-2022-36349", + "full_name": "Live-Hack-CVE\/CVE-2022-36349", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36349", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36349 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:45Z", + "updated_at": "2022-12-23T19:08:45Z", + "pushed_at": "2022-12-23T19:08:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36357.json b/2022/CVE-2022-36357.json deleted file mode 100644 index 703719db73..0000000000 --- a/2022/CVE-2022-36357.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574358, - "name": "CVE-2022-36357", - "full_name": "Live-Hack-CVE\/CVE-2022-36357", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36357", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36357 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:05Z", - "updated_at": "2022-12-23T15:40:05Z", - "pushed_at": "2022-12-23T15:40:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36370.json b/2022/CVE-2022-36370.json new file mode 100644 index 0000000000..1d523ccfde --- /dev/null +++ b/2022/CVE-2022-36370.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628719, + "name": "CVE-2022-36370", + "full_name": "Live-Hack-CVE\/CVE-2022-36370", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36370", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36370 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:34Z", + "updated_at": "2022-12-23T19:08:34Z", + "pushed_at": "2022-12-23T19:08:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36377.json b/2022/CVE-2022-36377.json new file mode 100644 index 0000000000..1160ded88f --- /dev/null +++ b/2022/CVE-2022-36377.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629052, + "name": "CVE-2022-36377", + "full_name": "Live-Hack-CVE\/CVE-2022-36377", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36377", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36377 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:02Z", + "updated_at": "2022-12-23T19:10:02Z", + "pushed_at": "2022-12-23T19:10:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36380.json b/2022/CVE-2022-36380.json new file mode 100644 index 0000000000..122423f91a --- /dev/null +++ b/2022/CVE-2022-36380.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635756, + "name": "CVE-2022-36380", + "full_name": "Live-Hack-CVE\/CVE-2022-36380", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36380", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36380 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:40:49Z", + "updated_at": "2022-12-23T19:40:49Z", + "pushed_at": "2022-12-23T19:40:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36400.json b/2022/CVE-2022-36400.json new file mode 100644 index 0000000000..8a9c63a69c --- /dev/null +++ b/2022/CVE-2022-36400.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629189, + "name": "CVE-2022-36400", + "full_name": "Live-Hack-CVE\/CVE-2022-36400", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36400", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36400 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:38Z", + "updated_at": "2022-12-23T19:10:38Z", + "pushed_at": "2022-12-23T19:10:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36404.json b/2022/CVE-2022-36404.json new file mode 100644 index 0000000000..4a0d1ccd1f --- /dev/null +++ b/2022/CVE-2022-36404.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683156, + "name": "CVE-2022-36404", + "full_name": "Live-Hack-CVE\/CVE-2022-36404", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36404", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36404 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:09Z", + "updated_at": "2022-12-23T23:58:09Z", + "pushed_at": "2022-12-23T23:58:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36428.json b/2022/CVE-2022-36428.json new file mode 100644 index 0000000000..14134a2245 --- /dev/null +++ b/2022/CVE-2022-36428.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683122, + "name": "CVE-2022-36428", + "full_name": "Live-Hack-CVE\/CVE-2022-36428", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36428", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36428 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:56Z", + "updated_at": "2022-12-23T23:57:56Z", + "pushed_at": "2022-12-23T23:57:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36432.json b/2022/CVE-2022-36432.json deleted file mode 100644 index c616bb7aa1..0000000000 --- a/2022/CVE-2022-36432.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584412, - "name": "CVE-2022-36432", - "full_name": "Live-Hack-CVE\/CVE-2022-36432", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36432", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36432 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:11Z", - "updated_at": "2022-12-23T16:17:11Z", - "pushed_at": "2022-12-23T16:17:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36433.json b/2022/CVE-2022-36433.json deleted file mode 100644 index 5fdf43b547..0000000000 --- a/2022/CVE-2022-36433.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515625, - "name": "CVE-2022-36433", - "full_name": "Live-Hack-CVE\/CVE-2022-36433", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36433", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36433 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:38Z", - "updated_at": "2022-12-23T12:15:38Z", - "pushed_at": "2022-12-23T12:15:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3647.json b/2022/CVE-2022-3647.json deleted file mode 100644 index 3192d1c81c..0000000000 --- a/2022/CVE-2022-3647.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538062, - "name": "CVE-2022-3647", - "full_name": "Live-Hack-CVE\/CVE-2022-3647", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3647", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3647 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:36:15Z", - "updated_at": "2022-12-23T13:36:15Z", - "pushed_at": "2022-12-23T13:36:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3675.json b/2022/CVE-2022-3675.json new file mode 100644 index 0000000000..fd42161615 --- /dev/null +++ b/2022/CVE-2022-3675.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683313, + "name": "CVE-2022-3675", + "full_name": "Live-Hack-CVE\/CVE-2022-3675", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3675", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3675 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:21Z", + "updated_at": "2022-12-23T23:59:21Z", + "pushed_at": "2022-12-23T23:59:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36776.json b/2022/CVE-2022-36776.json new file mode 100644 index 0000000000..174ab23b19 --- /dev/null +++ b/2022/CVE-2022-36776.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637828, + "name": "CVE-2022-36776", + "full_name": "Live-Hack-CVE\/CVE-2022-36776", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36776", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36776 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:13Z", + "updated_at": "2022-12-23T19:49:13Z", + "pushed_at": "2022-12-23T19:49:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36781.json b/2022/CVE-2022-36781.json new file mode 100644 index 0000000000..55d0f372d3 --- /dev/null +++ b/2022/CVE-2022-36781.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655326, + "name": "CVE-2022-36781", + "full_name": "Live-Hack-CVE\/CVE-2022-36781", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36781", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36781 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:32Z", + "updated_at": "2022-12-23T21:13:32Z", + "pushed_at": "2022-12-23T21:13:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36784.json b/2022/CVE-2022-36784.json deleted file mode 100644 index 7476e607ca..0000000000 --- a/2022/CVE-2022-36784.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573692, - "name": "CVE-2022-36784", - "full_name": "Live-Hack-CVE\/CVE-2022-36784", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36784", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36784 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:53Z", - "updated_at": "2022-12-23T15:37:53Z", - "pushed_at": "2022-12-23T15:37:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36785.json b/2022/CVE-2022-36785.json deleted file mode 100644 index f0458eb241..0000000000 --- a/2022/CVE-2022-36785.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573864, - "name": "CVE-2022-36785", - "full_name": "Live-Hack-CVE\/CVE-2022-36785", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36785", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36785 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:24Z", - "updated_at": "2022-12-23T15:38:24Z", - "pushed_at": "2022-12-23T15:38:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36786.json b/2022/CVE-2022-36786.json deleted file mode 100644 index 93ef25f715..0000000000 --- a/2022/CVE-2022-36786.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573885, - "name": "CVE-2022-36786", - "full_name": "Live-Hack-CVE\/CVE-2022-36786", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36786", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36786 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:27Z", - "updated_at": "2022-12-23T15:38:27Z", - "pushed_at": "2022-12-23T15:38:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36787.json b/2022/CVE-2022-36787.json deleted file mode 100644 index 9df0ca4597..0000000000 --- a/2022/CVE-2022-36787.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575078, - "name": "CVE-2022-36787", - "full_name": "Live-Hack-CVE\/CVE-2022-36787", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36787", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36787 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:40Z", - "updated_at": "2022-12-23T15:42:40Z", - "pushed_at": "2022-12-23T15:42:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36789.json b/2022/CVE-2022-36789.json new file mode 100644 index 0000000000..3c14b305d6 --- /dev/null +++ b/2022/CVE-2022-36789.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628738, + "name": "CVE-2022-36789", + "full_name": "Live-Hack-CVE\/CVE-2022-36789", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36789", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36789 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:38Z", + "updated_at": "2022-12-23T19:08:38Z", + "pushed_at": "2022-12-23T19:08:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36879.json b/2022/CVE-2022-36879.json new file mode 100644 index 0000000000..199a12e3db --- /dev/null +++ b/2022/CVE-2022-36879.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682443, + "name": "CVE-2022-36879", + "full_name": "Live-Hack-CVE\/CVE-2022-36879", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36879", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36879 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:53:41Z", + "updated_at": "2022-12-23T23:53:41Z", + "pushed_at": "2022-12-23T23:53:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3688.json b/2022/CVE-2022-3688.json deleted file mode 100644 index 042cd1fd9f..0000000000 --- a/2022/CVE-2022-3688.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572184, - "name": "CVE-2022-3688", - "full_name": "Live-Hack-CVE\/CVE-2022-3688", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3688", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3688 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:49Z", - "updated_at": "2022-12-23T15:32:49Z", - "pushed_at": "2022-12-23T15:32:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3689.json b/2022/CVE-2022-3689.json deleted file mode 100644 index 15852c27aa..0000000000 --- a/2022/CVE-2022-3689.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536590, - "name": "CVE-2022-3689", - "full_name": "Live-Hack-CVE\/CVE-2022-3689", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3689", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3689 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:16Z", - "updated_at": "2022-12-23T13:31:16Z", - "pushed_at": "2022-12-23T13:31:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36924.json b/2022/CVE-2022-36924.json deleted file mode 100644 index f205a60868..0000000000 --- a/2022/CVE-2022-36924.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575109, - "name": "CVE-2022-36924", - "full_name": "Live-Hack-CVE\/CVE-2022-36924", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36924", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36924 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:47Z", - "updated_at": "2022-12-23T15:42:47Z", - "pushed_at": "2022-12-23T15:42:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36938.json b/2022/CVE-2022-36938.json new file mode 100644 index 0000000000..f310203ce2 --- /dev/null +++ b/2022/CVE-2022-36938.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637537, + "name": "CVE-2022-36938", + "full_name": "Live-Hack-CVE\/CVE-2022-36938", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36938", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36938 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:53Z", + "updated_at": "2022-12-23T19:47:53Z", + "pushed_at": "2022-12-23T19:47:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-36960.json b/2022/CVE-2022-36960.json deleted file mode 100644 index 87bc48647b..0000000000 --- a/2022/CVE-2022-36960.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515760, - "name": "CVE-2022-36960", - "full_name": "Live-Hack-CVE\/CVE-2022-36960", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36960", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36960 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:11Z", - "updated_at": "2022-12-23T12:16:11Z", - "pushed_at": "2022-12-23T12:16:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36962.json b/2022/CVE-2022-36962.json deleted file mode 100644 index f186296147..0000000000 --- a/2022/CVE-2022-36962.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515637, - "name": "CVE-2022-36962", - "full_name": "Live-Hack-CVE\/CVE-2022-36962", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36962", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36962 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:42Z", - "updated_at": "2022-12-23T12:15:42Z", - "pushed_at": "2022-12-23T12:15:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-36964.json b/2022/CVE-2022-36964.json deleted file mode 100644 index d8ca17ef8c..0000000000 --- a/2022/CVE-2022-36964.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515654, - "name": "CVE-2022-36964", - "full_name": "Live-Hack-CVE\/CVE-2022-36964", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-36964", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-36964 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:45Z", - "updated_at": "2022-12-23T12:15:45Z", - "pushed_at": "2022-12-23T12:15:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37015.json b/2022/CVE-2022-37015.json new file mode 100644 index 0000000000..ec37266ebd --- /dev/null +++ b/2022/CVE-2022-37015.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662726, + "name": "CVE-2022-37015", + "full_name": "Live-Hack-CVE\/CVE-2022-37015", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37015", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37015 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:37Z", + "updated_at": "2022-12-23T21:52:37Z", + "pushed_at": "2022-12-23T21:52:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3703.json b/2022/CVE-2022-3703.json new file mode 100644 index 0000000000..8a2d8bc4b4 --- /dev/null +++ b/2022/CVE-2022-3703.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636210, + "name": "CVE-2022-3703", + "full_name": "Live-Hack-CVE\/CVE-2022-3703", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3703", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3703 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:45Z", + "updated_at": "2022-12-23T19:42:45Z", + "pushed_at": "2022-12-23T19:42:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37032.json b/2022/CVE-2022-37032.json deleted file mode 100644 index b77049756c..0000000000 --- a/2022/CVE-2022-37032.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549108, - "name": "CVE-2022-37032", - "full_name": "Live-Hack-CVE\/CVE-2022-37032", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37032", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37032 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:45Z", - "updated_at": "2022-12-23T14:14:45Z", - "pushed_at": "2022-12-23T14:14:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3706.json b/2022/CVE-2022-3706.json new file mode 100644 index 0000000000..9acd257f4e --- /dev/null +++ b/2022/CVE-2022-3706.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646945, + "name": "CVE-2022-3706", + "full_name": "Live-Hack-CVE\/CVE-2022-3706", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3706", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3706 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:55Z", + "updated_at": "2022-12-23T20:31:55Z", + "pushed_at": "2022-12-23T20:31:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37197.json b/2022/CVE-2022-37197.json deleted file mode 100644 index 672a25108b..0000000000 --- a/2022/CVE-2022-37197.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538499, - "name": "CVE-2022-37197", - "full_name": "Live-Hack-CVE\/CVE-2022-37197", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37197", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37197 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:44Z", - "updated_at": "2022-12-23T13:37:44Z", - "pushed_at": "2022-12-23T13:37:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3720.json b/2022/CVE-2022-3720.json deleted file mode 100644 index 10c56a7aec..0000000000 --- a/2022/CVE-2022-3720.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563346, - "name": "CVE-2022-3720", - "full_name": "Live-Hack-CVE\/CVE-2022-3720", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3720", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3720 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:55Z", - "updated_at": "2022-12-23T15:01:55Z", - "pushed_at": "2022-12-23T15:01:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3721.json b/2022/CVE-2022-3721.json new file mode 100644 index 0000000000..9a2210624d --- /dev/null +++ b/2022/CVE-2022-3721.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681837, + "name": "CVE-2022-3721", + "full_name": "Live-Hack-CVE\/CVE-2022-3721", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3721", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3721 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:04Z", + "updated_at": "2022-12-23T23:50:04Z", + "pushed_at": "2022-12-23T23:50:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3726.json b/2022/CVE-2022-3726.json new file mode 100644 index 0000000000..d4974628a6 --- /dev/null +++ b/2022/CVE-2022-3726.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646954, + "name": "CVE-2022-3726", + "full_name": "Live-Hack-CVE\/CVE-2022-3726", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3726", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3726 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:58Z", + "updated_at": "2022-12-23T20:31:59Z", + "pushed_at": "2022-12-23T20:32:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37290.json b/2022/CVE-2022-37290.json deleted file mode 100644 index fdd7dffdb4..0000000000 --- a/2022/CVE-2022-37290.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586595, - "name": "CVE-2022-37290", - "full_name": "Live-Hack-CVE\/CVE-2022-37290", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37290", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37290 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:25:00Z", - "updated_at": "2022-12-23T16:25:00Z", - "pushed_at": "2022-12-23T16:25:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37301.json b/2022/CVE-2022-37301.json deleted file mode 100644 index d9d2a67333..0000000000 --- a/2022/CVE-2022-37301.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526600, - "name": "CVE-2022-37301", - "full_name": "Live-Hack-CVE\/CVE-2022-37301", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37301", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37301 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:58Z", - "updated_at": "2022-12-23T12:55:58Z", - "pushed_at": "2022-12-23T12:56:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37332.json b/2022/CVE-2022-37332.json deleted file mode 100644 index 40afa9fc42..0000000000 --- a/2022/CVE-2022-37332.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573638, - "name": "CVE-2022-37332", - "full_name": "Live-Hack-CVE\/CVE-2022-37332", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37332", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37332 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:43Z", - "updated_at": "2022-12-23T15:37:43Z", - "pushed_at": "2022-12-23T15:37:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37334.json b/2022/CVE-2022-37334.json new file mode 100644 index 0000000000..d9c9b74f45 --- /dev/null +++ b/2022/CVE-2022-37334.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628712, + "name": "CVE-2022-37334", + "full_name": "Live-Hack-CVE\/CVE-2022-37334", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37334", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37334 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:31Z", + "updated_at": "2022-12-23T19:08:31Z", + "pushed_at": "2022-12-23T19:08:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3734.json b/2022/CVE-2022-3734.json deleted file mode 100644 index 8798c7668c..0000000000 --- a/2022/CVE-2022-3734.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538845, - "name": "CVE-2022-3734", - "full_name": "Live-Hack-CVE\/CVE-2022-3734", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3734", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3734 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:53Z", - "updated_at": "2022-12-23T13:38:53Z", - "pushed_at": "2022-12-23T13:38:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37345.json b/2022/CVE-2022-37345.json new file mode 100644 index 0000000000..4cfca2d6cb --- /dev/null +++ b/2022/CVE-2022-37345.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628674, + "name": "CVE-2022-37345", + "full_name": "Live-Hack-CVE\/CVE-2022-37345", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37345", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37345 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:20Z", + "updated_at": "2022-12-23T19:08:20Z", + "pushed_at": "2022-12-23T19:08:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37421.json b/2022/CVE-2022-37421.json deleted file mode 100644 index 1131770d1e..0000000000 --- a/2022/CVE-2022-37421.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535888, - "name": "CVE-2022-37421", - "full_name": "Live-Hack-CVE\/CVE-2022-37421", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37421", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37421 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:55Z", - "updated_at": "2022-12-23T13:28:55Z", - "pushed_at": "2022-12-23T13:28:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37430.json b/2022/CVE-2022-37430.json deleted file mode 100644 index 74cbbb3771..0000000000 --- a/2022/CVE-2022-37430.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535938, - "name": "CVE-2022-37430", - "full_name": "Live-Hack-CVE\/CVE-2022-37430", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37430", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37430 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:06Z", - "updated_at": "2022-12-23T13:29:06Z", - "pushed_at": "2022-12-23T13:29:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37434.json b/2022/CVE-2022-37434.json new file mode 100644 index 0000000000..20aaec200d --- /dev/null +++ b/2022/CVE-2022-37434.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628456, + "name": "CVE-2022-37434", + "full_name": "Live-Hack-CVE\/CVE-2022-37434", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37434", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37434 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:29Z", + "updated_at": "2022-12-23T19:07:29Z", + "pushed_at": "2022-12-23T19:07:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3747.json b/2022/CVE-2022-3747.json deleted file mode 100644 index 88cb6cc4e4..0000000000 --- a/2022/CVE-2022-3747.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515828, - "name": "CVE-2022-3747", - "full_name": "Live-Hack-CVE\/CVE-2022-3747", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3747", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3747 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:28Z", - "updated_at": "2022-12-23T12:16:28Z", - "pushed_at": "2022-12-23T12:16:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3750.json b/2022/CVE-2022-3750.json deleted file mode 100644 index 5de88f4e20..0000000000 --- a/2022/CVE-2022-3750.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572303, - "name": "CVE-2022-3750", - "full_name": "Live-Hack-CVE\/CVE-2022-3750", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3750", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3750 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:13Z", - "updated_at": "2022-12-23T15:33:13Z", - "pushed_at": "2022-12-23T15:33:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3751.json b/2022/CVE-2022-3751.json deleted file mode 100644 index 5b5ade50a0..0000000000 --- a/2022/CVE-2022-3751.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515850, - "name": "CVE-2022-3751", - "full_name": "Live-Hack-CVE\/CVE-2022-3751", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3751", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3751 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:32Z", - "updated_at": "2022-12-23T12:16:32Z", - "pushed_at": "2022-12-23T12:16:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3753.json b/2022/CVE-2022-3753.json deleted file mode 100644 index 47aa5c0d4b..0000000000 --- a/2022/CVE-2022-3753.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572274, - "name": "CVE-2022-3753", - "full_name": "Live-Hack-CVE\/CVE-2022-3753", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3753", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3753 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:07Z", - "updated_at": "2022-12-23T15:33:07Z", - "pushed_at": "2022-12-23T15:33:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37599.json b/2022/CVE-2022-37599.json deleted file mode 100644 index bfe6b1214b..0000000000 --- a/2022/CVE-2022-37599.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549980, - "name": "CVE-2022-37599", - "full_name": "Live-Hack-CVE\/CVE-2022-37599", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37599", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37599 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:32Z", - "updated_at": "2022-12-23T14:17:32Z", - "pushed_at": "2022-12-23T14:17:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37616.json b/2022/CVE-2022-37616.json new file mode 100644 index 0000000000..2fac2f0158 --- /dev/null +++ b/2022/CVE-2022-37616.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668969, + "name": "CVE-2022-37616", + "full_name": "Live-Hack-CVE\/CVE-2022-37616", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37616", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37616 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:21Z", + "updated_at": "2022-12-23T22:28:21Z", + "pushed_at": "2022-12-23T22:28:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3762.json b/2022/CVE-2022-3762.json deleted file mode 100644 index 354866b39e..0000000000 --- a/2022/CVE-2022-3762.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572285, - "name": "CVE-2022-3762", - "full_name": "Live-Hack-CVE\/CVE-2022-3762", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3762", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3762 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:10Z", - "updated_at": "2022-12-23T15:33:10Z", - "pushed_at": "2022-12-23T15:33:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37623.json b/2022/CVE-2022-37623.json new file mode 100644 index 0000000000..ba24a76ed1 --- /dev/null +++ b/2022/CVE-2022-37623.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638232, + "name": "CVE-2022-37623", + "full_name": "Live-Hack-CVE\/CVE-2022-37623", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37623", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37623 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:07Z", + "updated_at": "2022-12-23T19:51:07Z", + "pushed_at": "2022-12-23T19:51:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3763.json b/2022/CVE-2022-3763.json deleted file mode 100644 index 2435e58feb..0000000000 --- a/2022/CVE-2022-3763.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562959, - "name": "CVE-2022-3763", - "full_name": "Live-Hack-CVE\/CVE-2022-3763", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3763", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3763 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:40Z", - "updated_at": "2022-12-23T15:00:40Z", - "pushed_at": "2022-12-23T15:00:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37661.json b/2022/CVE-2022-37661.json new file mode 100644 index 0000000000..1316d4bfd5 --- /dev/null +++ b/2022/CVE-2022-37661.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646277, + "name": "CVE-2022-37661", + "full_name": "Live-Hack-CVE\/CVE-2022-37661", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37661", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37661 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:35Z", + "updated_at": "2022-12-23T20:28:35Z", + "pushed_at": "2022-12-23T20:28:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37680.json b/2022/CVE-2022-37680.json new file mode 100644 index 0000000000..e514526d4c --- /dev/null +++ b/2022/CVE-2022-37680.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645270, + "name": "CVE-2022-37680", + "full_name": "Live-Hack-CVE\/CVE-2022-37680", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37680", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37680 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:51Z", + "updated_at": "2022-12-23T20:23:51Z", + "pushed_at": "2022-12-23T20:23:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37681.json b/2022/CVE-2022-37681.json new file mode 100644 index 0000000000..1a68124cce --- /dev/null +++ b/2022/CVE-2022-37681.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645280, + "name": "CVE-2022-37681", + "full_name": "Live-Hack-CVE\/CVE-2022-37681", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37681", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37681 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:55Z", + "updated_at": "2022-12-23T20:23:55Z", + "pushed_at": "2022-12-23T20:23:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37710.json b/2022/CVE-2022-37710.json new file mode 100644 index 0000000000..d1117f4559 --- /dev/null +++ b/2022/CVE-2022-37710.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669508, + "name": "CVE-2022-37710", + "full_name": "Live-Hack-CVE\/CVE-2022-37710", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37710", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37710 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:21Z", + "updated_at": "2022-12-23T22:31:21Z", + "pushed_at": "2022-12-23T22:31:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37720.json b/2022/CVE-2022-37720.json deleted file mode 100644 index 791633831a..0000000000 --- a/2022/CVE-2022-37720.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536859, - "name": "CVE-2022-37720", - "full_name": "Live-Hack-CVE\/CVE-2022-37720", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37720", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37720 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:16Z", - "updated_at": "2022-12-23T13:32:16Z", - "pushed_at": "2022-12-23T13:32:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37721.json b/2022/CVE-2022-37721.json deleted file mode 100644 index 34c071bc4c..0000000000 --- a/2022/CVE-2022-37721.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536991, - "name": "CVE-2022-37721", - "full_name": "Live-Hack-CVE\/CVE-2022-37721", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37721", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37721 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:42Z", - "updated_at": "2022-12-23T13:32:42Z", - "pushed_at": "2022-12-23T13:32:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37772.json b/2022/CVE-2022-37772.json deleted file mode 100644 index c6a9ad56c5..0000000000 --- a/2022/CVE-2022-37772.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560036, - "name": "CVE-2022-37772", - "full_name": "Live-Hack-CVE\/CVE-2022-37772", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37772", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37772 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:15Z", - "updated_at": "2022-12-23T14:51:15Z", - "pushed_at": "2022-12-23T14:51:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37773.json b/2022/CVE-2022-37773.json deleted file mode 100644 index 41e72ba539..0000000000 --- a/2022/CVE-2022-37773.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560602, - "name": "CVE-2022-37773", - "full_name": "Live-Hack-CVE\/CVE-2022-37773", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37773", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37773 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:00Z", - "updated_at": "2022-12-23T14:53:00Z", - "pushed_at": "2022-12-23T14:53:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37774.json b/2022/CVE-2022-37774.json deleted file mode 100644 index c81a00d24a..0000000000 --- a/2022/CVE-2022-37774.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560620, - "name": "CVE-2022-37774", - "full_name": "Live-Hack-CVE\/CVE-2022-37774", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37774", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37774 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:04Z", - "updated_at": "2022-12-23T14:53:04Z", - "pushed_at": "2022-12-23T14:53:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37860.json b/2022/CVE-2022-37860.json new file mode 100644 index 0000000000..6484b2fb7f --- /dev/null +++ b/2022/CVE-2022-37860.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628037, + "name": "CVE-2022-37860", + "full_name": "Live-Hack-CVE\/CVE-2022-37860", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37860", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37860 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:44Z", + "updated_at": "2022-12-23T19:05:45Z", + "pushed_at": "2022-12-23T19:05:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37865.json b/2022/CVE-2022-37865.json new file mode 100644 index 0000000000..4a8b82955a --- /dev/null +++ b/2022/CVE-2022-37865.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669649, + "name": "CVE-2022-37865", + "full_name": "Live-Hack-CVE\/CVE-2022-37865", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37865", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37865 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:09Z", + "updated_at": "2022-12-23T22:32:09Z", + "pushed_at": "2022-12-23T22:32:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37866.json b/2022/CVE-2022-37866.json new file mode 100644 index 0000000000..7208f76424 --- /dev/null +++ b/2022/CVE-2022-37866.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661692, + "name": "CVE-2022-37866", + "full_name": "Live-Hack-CVE\/CVE-2022-37866", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37866", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37866 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:25Z", + "updated_at": "2022-12-23T21:47:25Z", + "pushed_at": "2022-12-23T21:47:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37887.json b/2022/CVE-2022-37887.json new file mode 100644 index 0000000000..00c1699955 --- /dev/null +++ b/2022/CVE-2022-37887.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663316, + "name": "CVE-2022-37887", + "full_name": "Live-Hack-CVE\/CVE-2022-37887", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37887", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37887 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:56:02Z", + "updated_at": "2022-12-23T21:56:02Z", + "pushed_at": "2022-12-23T21:56:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37889.json b/2022/CVE-2022-37889.json new file mode 100644 index 0000000000..7c582e1ae0 --- /dev/null +++ b/2022/CVE-2022-37889.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663325, + "name": "CVE-2022-37889", + "full_name": "Live-Hack-CVE\/CVE-2022-37889", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37889", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37889 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:56:05Z", + "updated_at": "2022-12-23T21:56:05Z", + "pushed_at": "2022-12-23T21:56:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37890.json b/2022/CVE-2022-37890.json new file mode 100644 index 0000000000..2e8092c1e6 --- /dev/null +++ b/2022/CVE-2022-37890.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663342, + "name": "CVE-2022-37890", + "full_name": "Live-Hack-CVE\/CVE-2022-37890", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37890", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37890 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:56:11Z", + "updated_at": "2022-12-23T21:56:11Z", + "pushed_at": "2022-12-23T21:56:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37891.json b/2022/CVE-2022-37891.json new file mode 100644 index 0000000000..c814ed0bc1 --- /dev/null +++ b/2022/CVE-2022-37891.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663335, + "name": "CVE-2022-37891", + "full_name": "Live-Hack-CVE\/CVE-2022-37891", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37891", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37891 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:56:08Z", + "updated_at": "2022-12-23T21:56:08Z", + "pushed_at": "2022-12-23T21:56:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37893.json b/2022/CVE-2022-37893.json new file mode 100644 index 0000000000..bf0a7109f9 --- /dev/null +++ b/2022/CVE-2022-37893.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663274, + "name": "CVE-2022-37893", + "full_name": "Live-Hack-CVE\/CVE-2022-37893", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37893", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37893 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:49Z", + "updated_at": "2022-12-23T21:55:49Z", + "pushed_at": "2022-12-23T21:55:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37894.json b/2022/CVE-2022-37894.json new file mode 100644 index 0000000000..d3aa3a4de9 --- /dev/null +++ b/2022/CVE-2022-37894.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663308, + "name": "CVE-2022-37894", + "full_name": "Live-Hack-CVE\/CVE-2022-37894", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37894", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37894 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:58Z", + "updated_at": "2022-12-23T21:55:58Z", + "pushed_at": "2022-12-23T21:56:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37895.json b/2022/CVE-2022-37895.json new file mode 100644 index 0000000000..f46f41c9a0 --- /dev/null +++ b/2022/CVE-2022-37895.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663298, + "name": "CVE-2022-37895", + "full_name": "Live-Hack-CVE\/CVE-2022-37895", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37895", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37895 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:55Z", + "updated_at": "2022-12-23T21:55:55Z", + "pushed_at": "2022-12-23T21:55:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37896.json b/2022/CVE-2022-37896.json new file mode 100644 index 0000000000..8f68afea8d --- /dev/null +++ b/2022/CVE-2022-37896.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663282, + "name": "CVE-2022-37896", + "full_name": "Live-Hack-CVE\/CVE-2022-37896", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37896", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37896 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:52Z", + "updated_at": "2022-12-23T21:55:52Z", + "pushed_at": "2022-12-23T21:55:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3793.json b/2022/CVE-2022-3793.json new file mode 100644 index 0000000000..9229305ca8 --- /dev/null +++ b/2022/CVE-2022-3793.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653298, + "name": "CVE-2022-3793", + "full_name": "Live-Hack-CVE\/CVE-2022-3793", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3793", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3793 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:03:47Z", + "updated_at": "2022-12-23T21:03:47Z", + "pushed_at": "2022-12-23T21:03:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37931.json b/2022/CVE-2022-37931.json deleted file mode 100644 index 49cc1c2491..0000000000 --- a/2022/CVE-2022-37931.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538807, - "name": "CVE-2022-37931", - "full_name": "Live-Hack-CVE\/CVE-2022-37931", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37931", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37931 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:47Z", - "updated_at": "2022-12-23T13:38:47Z", - "pushed_at": "2022-12-23T13:38:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-37973.json b/2022/CVE-2022-37973.json new file mode 100644 index 0000000000..76c3040cb0 --- /dev/null +++ b/2022/CVE-2022-37973.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646354, + "name": "CVE-2022-37973", + "full_name": "Live-Hack-CVE\/CVE-2022-37973", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37973", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37973 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:59Z", + "updated_at": "2022-12-23T20:28:59Z", + "pushed_at": "2022-12-23T20:29:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37975.json b/2022/CVE-2022-37975.json new file mode 100644 index 0000000000..3b6fdd4e80 --- /dev/null +++ b/2022/CVE-2022-37975.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646492, + "name": "CVE-2022-37975", + "full_name": "Live-Hack-CVE\/CVE-2022-37975", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37975", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37975 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:46Z", + "updated_at": "2022-12-23T20:29:46Z", + "pushed_at": "2022-12-23T20:29:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37991.json b/2022/CVE-2022-37991.json new file mode 100644 index 0000000000..160b3c0920 --- /dev/null +++ b/2022/CVE-2022-37991.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653527, + "name": "CVE-2022-37991", + "full_name": "Live-Hack-CVE\/CVE-2022-37991", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37991", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37991 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:53Z", + "updated_at": "2022-12-23T21:04:53Z", + "pushed_at": "2022-12-23T21:04:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-37992.json b/2022/CVE-2022-37992.json new file mode 100644 index 0000000000..0c90dfa140 --- /dev/null +++ b/2022/CVE-2022-37992.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654388, + "name": "CVE-2022-37992", + "full_name": "Live-Hack-CVE\/CVE-2022-37992", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-37992", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-37992 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:08Z", + "updated_at": "2022-12-23T21:09:08Z", + "pushed_at": "2022-12-23T21:09:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38014.json b/2022/CVE-2022-38014.json new file mode 100644 index 0000000000..bcf8485c81 --- /dev/null +++ b/2022/CVE-2022-38014.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654277, + "name": "CVE-2022-38014", + "full_name": "Live-Hack-CVE\/CVE-2022-38014", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38014", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38014 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:35Z", + "updated_at": "2022-12-23T21:08:35Z", + "pushed_at": "2022-12-23T21:08:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38015.json b/2022/CVE-2022-38015.json new file mode 100644 index 0000000000..05feed3684 --- /dev/null +++ b/2022/CVE-2022-38015.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654379, + "name": "CVE-2022-38015", + "full_name": "Live-Hack-CVE\/CVE-2022-38015", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38015", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38015 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:05Z", + "updated_at": "2022-12-23T21:09:05Z", + "pushed_at": "2022-12-23T21:09:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38022.json b/2022/CVE-2022-38022.json new file mode 100644 index 0000000000..ea5829b9de --- /dev/null +++ b/2022/CVE-2022-38022.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646392, + "name": "CVE-2022-38022", + "full_name": "Live-Hack-CVE\/CVE-2022-38022", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38022", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38022 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:13Z", + "updated_at": "2022-12-23T20:29:13Z", + "pushed_at": "2022-12-23T20:29:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38034.json b/2022/CVE-2022-38034.json new file mode 100644 index 0000000000..67b2e5ce67 --- /dev/null +++ b/2022/CVE-2022-38034.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646385, + "name": "CVE-2022-38034", + "full_name": "Live-Hack-CVE\/CVE-2022-38034", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38034", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38034 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:10Z", + "updated_at": "2022-12-23T20:29:10Z", + "pushed_at": "2022-12-23T20:29:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38037.json b/2022/CVE-2022-38037.json new file mode 100644 index 0000000000..1aca382534 --- /dev/null +++ b/2022/CVE-2022-38037.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663266, + "name": "CVE-2022-38037", + "full_name": "Live-Hack-CVE\/CVE-2022-38037", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38037", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38037 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:55:46Z", + "updated_at": "2022-12-23T21:55:46Z", + "pushed_at": "2022-12-23T21:55:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38038.json b/2022/CVE-2022-38038.json new file mode 100644 index 0000000000..0fdf576570 --- /dev/null +++ b/2022/CVE-2022-38038.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653513, + "name": "CVE-2022-38038", + "full_name": "Live-Hack-CVE\/CVE-2022-38038", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38038", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38038 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:50Z", + "updated_at": "2022-12-23T21:04:50Z", + "pushed_at": "2022-12-23T21:04:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38043.json b/2022/CVE-2022-38043.json new file mode 100644 index 0000000000..28ec1cd3d5 --- /dev/null +++ b/2022/CVE-2022-38043.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645980, + "name": "CVE-2022-38043", + "full_name": "Live-Hack-CVE\/CVE-2022-38043", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38043", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38043 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:13Z", + "updated_at": "2022-12-23T20:27:13Z", + "pushed_at": "2022-12-23T20:27:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38046.json b/2022/CVE-2022-38046.json new file mode 100644 index 0000000000..4dc73f1955 --- /dev/null +++ b/2022/CVE-2022-38046.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646990, + "name": "CVE-2022-38046", + "full_name": "Live-Hack-CVE\/CVE-2022-38046", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38046", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38046 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:10Z", + "updated_at": "2022-12-23T20:32:10Z", + "pushed_at": "2022-12-23T20:32:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38075.json b/2022/CVE-2022-38075.json deleted file mode 100644 index e50a1af7e6..0000000000 --- a/2022/CVE-2022-38075.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586304, - "name": "CVE-2022-38075", - "full_name": "Live-Hack-CVE\/CVE-2022-38075", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38075", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38075 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:57Z", - "updated_at": "2022-12-23T16:23:57Z", - "pushed_at": "2022-12-23T16:23:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38097.json b/2022/CVE-2022-38097.json deleted file mode 100644 index 6bbd26bead..0000000000 --- a/2022/CVE-2022-38097.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573653, - "name": "CVE-2022-38097", - "full_name": "Live-Hack-CVE\/CVE-2022-38097", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38097", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38097 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:46Z", - "updated_at": "2022-12-23T15:37:46Z", - "pushed_at": "2022-12-23T15:37:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38099.json b/2022/CVE-2022-38099.json new file mode 100644 index 0000000000..e317c3f086 --- /dev/null +++ b/2022/CVE-2022-38099.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628685, + "name": "CVE-2022-38099", + "full_name": "Live-Hack-CVE\/CVE-2022-38099", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38099", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38099 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:24Z", + "updated_at": "2022-12-23T19:08:24Z", + "pushed_at": "2022-12-23T19:08:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38113.json b/2022/CVE-2022-38113.json deleted file mode 100644 index c1a4e89aea..0000000000 --- a/2022/CVE-2022-38113.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550152, - "name": "CVE-2022-38113", - "full_name": "Live-Hack-CVE\/CVE-2022-38113", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38113", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38113 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:59Z", - "updated_at": "2022-12-23T14:17:59Z", - "pushed_at": "2022-12-23T14:18:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38114.json b/2022/CVE-2022-38114.json deleted file mode 100644 index a610b57146..0000000000 --- a/2022/CVE-2022-38114.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550126, - "name": "CVE-2022-38114", - "full_name": "Live-Hack-CVE\/CVE-2022-38114", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38114", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38114 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:55Z", - "updated_at": "2022-12-23T14:17:55Z", - "pushed_at": "2022-12-23T14:17:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38115.json b/2022/CVE-2022-38115.json deleted file mode 100644 index 49a2996977..0000000000 --- a/2022/CVE-2022-38115.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550105, - "name": "CVE-2022-38115", - "full_name": "Live-Hack-CVE\/CVE-2022-38115", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38115", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38115 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:52Z", - "updated_at": "2022-12-23T14:17:52Z", - "pushed_at": "2022-12-23T14:17:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38119.json b/2022/CVE-2022-38119.json new file mode 100644 index 0000000000..0c8bcccf46 --- /dev/null +++ b/2022/CVE-2022-38119.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638108, + "name": "CVE-2022-38119", + "full_name": "Live-Hack-CVE\/CVE-2022-38119", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38119", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38119 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:32Z", + "updated_at": "2022-12-23T19:50:32Z", + "pushed_at": "2022-12-23T19:50:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38120.json b/2022/CVE-2022-38120.json new file mode 100644 index 0000000000..bbcf21c832 --- /dev/null +++ b/2022/CVE-2022-38120.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638099, + "name": "CVE-2022-38120", + "full_name": "Live-Hack-CVE\/CVE-2022-38120", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38120", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38120 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:29Z", + "updated_at": "2022-12-23T19:50:29Z", + "pushed_at": "2022-12-23T19:50:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38121.json b/2022/CVE-2022-38121.json new file mode 100644 index 0000000000..d96c3a3178 --- /dev/null +++ b/2022/CVE-2022-38121.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638000, + "name": "CVE-2022-38121", + "full_name": "Live-Hack-CVE\/CVE-2022-38121", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38121", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38121 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:02Z", + "updated_at": "2022-12-23T19:50:02Z", + "pushed_at": "2022-12-23T19:50:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38122.json b/2022/CVE-2022-38122.json new file mode 100644 index 0000000000..b8257be7c8 --- /dev/null +++ b/2022/CVE-2022-38122.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638063, + "name": "CVE-2022-38122", + "full_name": "Live-Hack-CVE\/CVE-2022-38122", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38122", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38122 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:19Z", + "updated_at": "2022-12-23T19:50:19Z", + "pushed_at": "2022-12-23T19:50:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38137.json b/2022/CVE-2022-38137.json new file mode 100644 index 0000000000..1ee4417ece --- /dev/null +++ b/2022/CVE-2022-38137.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662870, + "name": "CVE-2022-38137", + "full_name": "Live-Hack-CVE\/CVE-2022-38137", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38137", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38137 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:23Z", + "updated_at": "2022-12-23T21:53:23Z", + "pushed_at": "2022-12-23T21:53:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38145.json b/2022/CVE-2022-38145.json deleted file mode 100644 index 80b2abf09a..0000000000 --- a/2022/CVE-2022-38145.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535926, - "name": "CVE-2022-38145", - "full_name": "Live-Hack-CVE\/CVE-2022-38145", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38145", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38145 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:02Z", - "updated_at": "2022-12-23T13:29:02Z", - "pushed_at": "2022-12-23T13:29:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38146.json b/2022/CVE-2022-38146.json deleted file mode 100644 index 284efe5edc..0000000000 --- a/2022/CVE-2022-38146.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574946, - "name": "CVE-2022-38146", - "full_name": "Live-Hack-CVE\/CVE-2022-38146", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38146", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38146 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:07Z", - "updated_at": "2022-12-23T15:42:07Z", - "pushed_at": "2022-12-23T15:42:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38147.json b/2022/CVE-2022-38147.json deleted file mode 100644 index 401c562dc1..0000000000 --- a/2022/CVE-2022-38147.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535874, - "name": "CVE-2022-38147", - "full_name": "Live-Hack-CVE\/CVE-2022-38147", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38147", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38147 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:52Z", - "updated_at": "2022-12-23T13:28:52Z", - "pushed_at": "2022-12-23T13:28:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38148.json b/2022/CVE-2022-38148.json deleted file mode 100644 index 16797d9732..0000000000 --- a/2022/CVE-2022-38148.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574960, - "name": "CVE-2022-38148", - "full_name": "Live-Hack-CVE\/CVE-2022-38148", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38148", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38148 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:11Z", - "updated_at": "2022-12-23T15:42:11Z", - "pushed_at": "2022-12-23T15:42:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38150.json b/2022/CVE-2022-38150.json deleted file mode 100644 index 06e7249ac7..0000000000 --- a/2022/CVE-2022-38150.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537599, - "name": "CVE-2022-38150", - "full_name": "Live-Hack-CVE\/CVE-2022-38150", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38150", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38150 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:41Z", - "updated_at": "2022-12-23T13:34:41Z", - "pushed_at": "2022-12-23T13:34:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38163.json b/2022/CVE-2022-38163.json deleted file mode 100644 index c6451f8b86..0000000000 --- a/2022/CVE-2022-38163.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537519, - "name": "CVE-2022-38163", - "full_name": "Live-Hack-CVE\/CVE-2022-38163", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38163", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38163 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:24Z", - "updated_at": "2022-12-23T13:34:24Z", - "pushed_at": "2022-12-23T13:34:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38164.json b/2022/CVE-2022-38164.json new file mode 100644 index 0000000000..5474960dd8 --- /dev/null +++ b/2022/CVE-2022-38164.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670074, + "name": "CVE-2022-38164", + "full_name": "Live-Hack-CVE\/CVE-2022-38164", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38164", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38164 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:24Z", + "updated_at": "2022-12-23T22:34:24Z", + "pushed_at": "2022-12-23T22:34:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38165.json b/2022/CVE-2022-38165.json deleted file mode 100644 index 919650a9f3..0000000000 --- a/2022/CVE-2022-38165.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575120, - "name": "CVE-2022-38165", - "full_name": "Live-Hack-CVE\/CVE-2022-38165", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38165", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38165 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:50Z", - "updated_at": "2022-12-23T15:42:50Z", - "pushed_at": "2022-12-23T15:42:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38166.json b/2022/CVE-2022-38166.json deleted file mode 100644 index 129dd9f5da..0000000000 --- a/2022/CVE-2022-38166.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526319, - "name": "CVE-2022-38166", - "full_name": "Live-Hack-CVE\/CVE-2022-38166", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38166", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38166 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:54:58Z", - "updated_at": "2022-12-23T12:54:58Z", - "pushed_at": "2022-12-23T12:55:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38168.json b/2022/CVE-2022-38168.json new file mode 100644 index 0000000000..e38dcd5a6c --- /dev/null +++ b/2022/CVE-2022-38168.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669759, + "name": "CVE-2022-38168", + "full_name": "Live-Hack-CVE\/CVE-2022-38168", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38168", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38168 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:46Z", + "updated_at": "2022-12-23T22:32:47Z", + "pushed_at": "2022-12-23T22:32:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3818.json b/2022/CVE-2022-3818.json new file mode 100644 index 0000000000..fb0b3b4f7b --- /dev/null +++ b/2022/CVE-2022-3818.json @@ -0,0 +1,31 @@ +[ + { + "id": 581647095, + "name": "CVE-2022-3818", + "full_name": "Live-Hack-CVE\/CVE-2022-3818", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3818", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3818 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:48Z", + "updated_at": "2022-12-23T20:32:48Z", + "pushed_at": "2022-12-23T20:32:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38183.json b/2022/CVE-2022-38183.json new file mode 100644 index 0000000000..1e4f3615dd --- /dev/null +++ b/2022/CVE-2022-38183.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626842, + "name": "CVE-2022-38183", + "full_name": "Live-Hack-CVE\/CVE-2022-38183", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38183", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38183 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:46Z", + "updated_at": "2022-12-23T19:00:46Z", + "pushed_at": "2022-12-23T19:00:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3819.json b/2022/CVE-2022-3819.json new file mode 100644 index 0000000000..ed84e8c751 --- /dev/null +++ b/2022/CVE-2022-3819.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646965, + "name": "CVE-2022-3819", + "full_name": "Live-Hack-CVE\/CVE-2022-3819", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3819", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3819 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:32:02Z", + "updated_at": "2022-12-23T20:32:02Z", + "pushed_at": "2022-12-23T20:32:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38201.json b/2022/CVE-2022-38201.json deleted file mode 100644 index f19970cbe8..0000000000 --- a/2022/CVE-2022-38201.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585452, - "name": "CVE-2022-38201", - "full_name": "Live-Hack-CVE\/CVE-2022-38201", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38201", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38201 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:02Z", - "updated_at": "2022-12-23T16:21:02Z", - "pushed_at": "2022-12-23T16:21:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3822.json b/2022/CVE-2022-3822.json deleted file mode 100644 index 7171dbb458..0000000000 --- a/2022/CVE-2022-3822.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536577, - "name": "CVE-2022-3822", - "full_name": "Live-Hack-CVE\/CVE-2022-3822", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3822", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3822 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:13Z", - "updated_at": "2022-12-23T13:31:13Z", - "pushed_at": "2022-12-23T13:31:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3823.json b/2022/CVE-2022-3823.json deleted file mode 100644 index 8fe16f0db8..0000000000 --- a/2022/CVE-2022-3823.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536560, - "name": "CVE-2022-3823", - "full_name": "Live-Hack-CVE\/CVE-2022-3823", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3823", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3823 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:10Z", - "updated_at": "2022-12-23T13:31:10Z", - "pushed_at": "2022-12-23T13:31:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3824.json b/2022/CVE-2022-3824.json deleted file mode 100644 index cba50cb8ac..0000000000 --- a/2022/CVE-2022-3824.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536526, - "name": "CVE-2022-3824", - "full_name": "Live-Hack-CVE\/CVE-2022-3824", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3824", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3824 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:03Z", - "updated_at": "2022-12-23T13:31:03Z", - "pushed_at": "2022-12-23T13:31:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3825.json b/2022/CVE-2022-3825.json new file mode 100644 index 0000000000..7b6b876654 --- /dev/null +++ b/2022/CVE-2022-3825.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683357, + "name": "CVE-2022-3825", + "full_name": "Live-Hack-CVE\/CVE-2022-3825", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3825", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3825 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:41Z", + "updated_at": "2022-12-23T23:59:41Z", + "pushed_at": "2022-12-23T23:59:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3826.json b/2022/CVE-2022-3826.json new file mode 100644 index 0000000000..3d6f710fd4 --- /dev/null +++ b/2022/CVE-2022-3826.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683345, + "name": "CVE-2022-3826", + "full_name": "Live-Hack-CVE\/CVE-2022-3826", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3826", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3826 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:34Z", + "updated_at": "2022-12-23T23:59:34Z", + "pushed_at": "2022-12-23T23:59:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3827.json b/2022/CVE-2022-3827.json new file mode 100644 index 0000000000..3159965bbe --- /dev/null +++ b/2022/CVE-2022-3827.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683370, + "name": "CVE-2022-3827", + "full_name": "Live-Hack-CVE\/CVE-2022-3827", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3827", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3827 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:47Z", + "updated_at": "2022-12-23T23:59:47Z", + "pushed_at": "2022-12-23T23:59:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3828.json b/2022/CVE-2022-3828.json deleted file mode 100644 index 4922675711..0000000000 --- a/2022/CVE-2022-3828.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536546, - "name": "CVE-2022-3828", - "full_name": "Live-Hack-CVE\/CVE-2022-3828", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3828", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3828 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:06Z", - "updated_at": "2022-12-23T13:31:06Z", - "pushed_at": "2022-12-23T13:31:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3831.json b/2022/CVE-2022-3831.json deleted file mode 100644 index 882a3c0c0a..0000000000 --- a/2022/CVE-2022-3831.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536509, - "name": "CVE-2022-3831", - "full_name": "Live-Hack-CVE\/CVE-2022-3831", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3831", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3831 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:31:00Z", - "updated_at": "2022-12-23T13:31:00Z", - "pushed_at": "2022-12-23T13:31:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3833.json b/2022/CVE-2022-3833.json deleted file mode 100644 index ae16987348..0000000000 --- a/2022/CVE-2022-3833.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536484, - "name": "CVE-2022-3833", - "full_name": "Live-Hack-CVE\/CVE-2022-3833", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3833", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3833 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:56Z", - "updated_at": "2022-12-23T13:30:56Z", - "pushed_at": "2022-12-23T13:30:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38334.json b/2022/CVE-2022-38334.json deleted file mode 100644 index 3231f4b9b5..0000000000 --- a/2022/CVE-2022-38334.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585321, - "name": "CVE-2022-38334", - "full_name": "Live-Hack-CVE\/CVE-2022-38334", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38334", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38334 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:35Z", - "updated_at": "2022-12-23T16:20:35Z", - "pushed_at": "2022-12-23T16:20:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3834.json b/2022/CVE-2022-3834.json deleted file mode 100644 index ba13c674e0..0000000000 --- a/2022/CVE-2022-3834.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536445, - "name": "CVE-2022-3834", - "full_name": "Live-Hack-CVE\/CVE-2022-3834", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3834", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3834 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:50Z", - "updated_at": "2022-12-23T13:30:50Z", - "pushed_at": "2022-12-23T13:30:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38372.json b/2022/CVE-2022-38372.json new file mode 100644 index 0000000000..c34de2f822 --- /dev/null +++ b/2022/CVE-2022-38372.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683377, + "name": "CVE-2022-38372", + "full_name": "Live-Hack-CVE\/CVE-2022-38372", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38372", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38372 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:51Z", + "updated_at": "2022-12-23T23:59:51Z", + "pushed_at": "2022-12-23T23:59:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38377.json b/2022/CVE-2022-38377.json deleted file mode 100644 index 5fae837277..0000000000 --- a/2022/CVE-2022-38377.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525642, - "name": "CVE-2022-38377", - "full_name": "Live-Hack-CVE\/CVE-2022-38377", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38377", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38377 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:21Z", - "updated_at": "2022-12-23T12:52:21Z", - "pushed_at": "2022-12-23T12:52:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38380.json b/2022/CVE-2022-38380.json new file mode 100644 index 0000000000..fafc5a1ab1 --- /dev/null +++ b/2022/CVE-2022-38380.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683129, + "name": "CVE-2022-38380", + "full_name": "Live-Hack-CVE\/CVE-2022-38380", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38380", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38380 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:59Z", + "updated_at": "2022-12-23T23:57:59Z", + "pushed_at": "2022-12-23T23:58:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38381.json b/2022/CVE-2022-38381.json new file mode 100644 index 0000000000..d829bdd831 --- /dev/null +++ b/2022/CVE-2022-38381.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683067, + "name": "CVE-2022-38381", + "full_name": "Live-Hack-CVE\/CVE-2022-38381", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38381", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38381 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:36Z", + "updated_at": "2022-12-23T23:57:37Z", + "pushed_at": "2022-12-23T23:57:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38385.json b/2022/CVE-2022-38385.json deleted file mode 100644 index af88174cb7..0000000000 --- a/2022/CVE-2022-38385.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596748, - "name": "CVE-2022-38385", - "full_name": "Live-Hack-CVE\/CVE-2022-38385", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38385", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38385 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:03:09Z", - "updated_at": "2022-12-23T17:03:09Z", - "pushed_at": "2022-12-23T17:03:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38387.json b/2022/CVE-2022-38387.json new file mode 100644 index 0000000000..97c6e97d14 --- /dev/null +++ b/2022/CVE-2022-38387.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637836, + "name": "CVE-2022-38387", + "full_name": "Live-Hack-CVE\/CVE-2022-38387", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38387", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38387 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:16Z", + "updated_at": "2022-12-23T19:49:17Z", + "pushed_at": "2022-12-23T19:49:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3839.json b/2022/CVE-2022-3839.json deleted file mode 100644 index b2f34a5731..0000000000 --- a/2022/CVE-2022-3839.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536461, - "name": "CVE-2022-3839", - "full_name": "Live-Hack-CVE\/CVE-2022-3839", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3839", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3839 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:53Z", - "updated_at": "2022-12-23T13:30:53Z", - "pushed_at": "2022-12-23T13:30:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38390.json b/2022/CVE-2022-38390.json deleted file mode 100644 index adb88a0e14..0000000000 --- a/2022/CVE-2022-38390.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595816, - "name": "CVE-2022-38390", - "full_name": "Live-Hack-CVE\/CVE-2022-38390", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38390", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38390 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:43Z", - "updated_at": "2022-12-23T16:59:43Z", - "pushed_at": "2022-12-23T16:59:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38461.json b/2022/CVE-2022-38461.json deleted file mode 100644 index d5202b830f..0000000000 --- a/2022/CVE-2022-38461.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584085, - "name": "CVE-2022-38461", - "full_name": "Live-Hack-CVE\/CVE-2022-38461", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38461", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38461 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:57Z", - "updated_at": "2022-12-23T16:15:57Z", - "pushed_at": "2022-12-23T16:15:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38462.json b/2022/CVE-2022-38462.json deleted file mode 100644 index 9adf8415c6..0000000000 --- a/2022/CVE-2022-38462.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562643, - "name": "CVE-2022-38462", - "full_name": "Live-Hack-CVE\/CVE-2022-38462", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38462", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38462 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:39Z", - "updated_at": "2022-12-23T14:59:39Z", - "pushed_at": "2022-12-23T14:59:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38465.json b/2022/CVE-2022-38465.json new file mode 100644 index 0000000000..62adb34dee --- /dev/null +++ b/2022/CVE-2022-38465.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670323, + "name": "CVE-2022-38465", + "full_name": "Live-Hack-CVE\/CVE-2022-38465", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38465", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38465 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:50Z", + "updated_at": "2022-12-23T22:35:50Z", + "pushed_at": "2022-12-23T22:35:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3850.json b/2022/CVE-2022-3850.json deleted file mode 100644 index 8354d56110..0000000000 --- a/2022/CVE-2022-3850.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536429, - "name": "CVE-2022-3850", - "full_name": "Live-Hack-CVE\/CVE-2022-3850", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3850", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3850 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:46Z", - "updated_at": "2022-12-23T13:30:46Z", - "pushed_at": "2022-12-23T13:30:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3852.json b/2022/CVE-2022-3852.json new file mode 100644 index 0000000000..f79c0e0259 --- /dev/null +++ b/2022/CVE-2022-3852.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682884, + "name": "CVE-2022-3852", + "full_name": "Live-Hack-CVE\/CVE-2022-3852", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3852", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3852 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:23Z", + "updated_at": "2022-12-23T23:56:23Z", + "pushed_at": "2022-12-23T23:56:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38537.json b/2022/CVE-2022-38537.json new file mode 100644 index 0000000000..8ed188e15b --- /dev/null +++ b/2022/CVE-2022-38537.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675661, + "name": "CVE-2022-38537", + "full_name": "Live-Hack-CVE\/CVE-2022-38537", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38537", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38537 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:08:34Z", + "updated_at": "2022-12-23T23:08:34Z", + "pushed_at": "2022-12-23T23:08:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38538.json b/2022/CVE-2022-38538.json deleted file mode 100644 index a4a65271bf..0000000000 --- a/2022/CVE-2022-38538.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585906, - "name": "CVE-2022-38538", - "full_name": "Live-Hack-CVE\/CVE-2022-38538", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38538", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38538 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:30Z", - "updated_at": "2022-12-23T16:22:30Z", - "pushed_at": "2022-12-23T16:22:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38541.json b/2022/CVE-2022-38541.json new file mode 100644 index 0000000000..a556e065d5 --- /dev/null +++ b/2022/CVE-2022-38541.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676840, + "name": "CVE-2022-38541", + "full_name": "Live-Hack-CVE\/CVE-2022-38541", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38541", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38541 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:09Z", + "updated_at": "2022-12-23T23:16:09Z", + "pushed_at": "2022-12-23T23:16:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38577.json b/2022/CVE-2022-38577.json new file mode 100644 index 0000000000..358733d60d --- /dev/null +++ b/2022/CVE-2022-38577.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638245, + "name": "CVE-2022-38577", + "full_name": "Live-Hack-CVE\/CVE-2022-38577", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38577", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38577 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:10Z", + "updated_at": "2022-12-23T19:51:10Z", + "pushed_at": "2022-12-23T19:51:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38582.json b/2022/CVE-2022-38582.json new file mode 100644 index 0000000000..23a71f72a9 --- /dev/null +++ b/2022/CVE-2022-38582.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669781, + "name": "CVE-2022-38582", + "full_name": "Live-Hack-CVE\/CVE-2022-38582", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38582", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38582 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:53Z", + "updated_at": "2022-12-23T22:32:53Z", + "pushed_at": "2022-12-23T22:32:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3861.json b/2022/CVE-2022-3861.json deleted file mode 100644 index 4a411965c8..0000000000 --- a/2022/CVE-2022-3861.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527215, - "name": "CVE-2022-3861", - "full_name": "Live-Hack-CVE\/CVE-2022-3861", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3861", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3861 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:58:17Z", - "updated_at": "2022-12-23T12:58:17Z", - "pushed_at": "2022-12-23T12:58:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38649.json b/2022/CVE-2022-38649.json deleted file mode 100644 index bafd604593..0000000000 --- a/2022/CVE-2022-38649.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538642, - "name": "CVE-2022-38649", - "full_name": "Live-Hack-CVE\/CVE-2022-38649", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38649", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38649 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:12Z", - "updated_at": "2022-12-23T13:38:12Z", - "pushed_at": "2022-12-23T13:38:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38654.json b/2022/CVE-2022-38654.json new file mode 100644 index 0000000000..ff25254e48 --- /dev/null +++ b/2022/CVE-2022-38654.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676758, + "name": "CVE-2022-38654", + "full_name": "Live-Hack-CVE\/CVE-2022-38654", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38654", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38654 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:35Z", + "updated_at": "2022-12-23T23:15:35Z", + "pushed_at": "2022-12-23T23:15:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3866.json b/2022/CVE-2022-3866.json new file mode 100644 index 0000000000..174a24e035 --- /dev/null +++ b/2022/CVE-2022-3866.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638441, + "name": "CVE-2022-3866", + "full_name": "Live-Hack-CVE\/CVE-2022-3866", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3866", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3866 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:54Z", + "updated_at": "2022-12-23T19:51:54Z", + "pushed_at": "2022-12-23T19:51:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38660.json b/2022/CVE-2022-38660.json new file mode 100644 index 0000000000..80f8272ff5 --- /dev/null +++ b/2022/CVE-2022-38660.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676752, + "name": "CVE-2022-38660", + "full_name": "Live-Hack-CVE\/CVE-2022-38660", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38660", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38660 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:31Z", + "updated_at": "2022-12-23T23:15:31Z", + "pushed_at": "2022-12-23T23:15:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38666.json b/2022/CVE-2022-38666.json deleted file mode 100644 index 2b16c2e150..0000000000 --- a/2022/CVE-2022-38666.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594822, - "name": "CVE-2022-38666", - "full_name": "Live-Hack-CVE\/CVE-2022-38666", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38666", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38666 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:56:02Z", - "updated_at": "2022-12-23T16:56:02Z", - "pushed_at": "2022-12-23T16:56:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3867.json b/2022/CVE-2022-3867.json new file mode 100644 index 0000000000..f6ff8bfa0a --- /dev/null +++ b/2022/CVE-2022-3867.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638427, + "name": "CVE-2022-3867", + "full_name": "Live-Hack-CVE\/CVE-2022-3867", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3867", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3867 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:51Z", + "updated_at": "2022-12-23T19:51:51Z", + "pushed_at": "2022-12-23T19:51:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3868.json b/2022/CVE-2022-3868.json new file mode 100644 index 0000000000..37d22f9328 --- /dev/null +++ b/2022/CVE-2022-3868.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670359, + "name": "CVE-2022-3868", + "full_name": "Live-Hack-CVE\/CVE-2022-3868", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3868", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3868 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:00Z", + "updated_at": "2022-12-23T22:36:00Z", + "pushed_at": "2022-12-23T22:36:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3869.json b/2022/CVE-2022-3869.json new file mode 100644 index 0000000000..726ec83051 --- /dev/null +++ b/2022/CVE-2022-3869.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670351, + "name": "CVE-2022-3869", + "full_name": "Live-Hack-CVE\/CVE-2022-3869", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3869", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3869 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:57Z", + "updated_at": "2022-12-23T22:35:57Z", + "pushed_at": "2022-12-23T22:35:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38705.json b/2022/CVE-2022-38705.json new file mode 100644 index 0000000000..00c2483a3e --- /dev/null +++ b/2022/CVE-2022-38705.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626736, + "name": "CVE-2022-38705", + "full_name": "Live-Hack-CVE\/CVE-2022-38705", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38705", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38705 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:00:25Z", + "updated_at": "2022-12-23T19:00:25Z", + "pushed_at": "2022-12-23T19:00:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38710.json b/2022/CVE-2022-38710.json new file mode 100644 index 0000000000..8d9387a668 --- /dev/null +++ b/2022/CVE-2022-38710.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683001, + "name": "CVE-2022-38710", + "full_name": "Live-Hack-CVE\/CVE-2022-38710", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38710", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38710 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:09Z", + "updated_at": "2022-12-23T23:57:09Z", + "pushed_at": "2022-12-23T23:57:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38712.json b/2022/CVE-2022-38712.json new file mode 100644 index 0000000000..5f535c2ec3 --- /dev/null +++ b/2022/CVE-2022-38712.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682992, + "name": "CVE-2022-38712", + "full_name": "Live-Hack-CVE\/CVE-2022-38712", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38712", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38712 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:06Z", + "updated_at": "2022-12-23T23:57:06Z", + "pushed_at": "2022-12-23T23:57:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38724.json b/2022/CVE-2022-38724.json deleted file mode 100644 index 8c9668567b..0000000000 --- a/2022/CVE-2022-38724.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550728, - "name": "CVE-2022-38724", - "full_name": "Live-Hack-CVE\/CVE-2022-38724", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38724", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38724 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:51Z", - "updated_at": "2022-12-23T14:19:51Z", - "pushed_at": "2022-12-23T14:19:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3873.json b/2022/CVE-2022-3873.json new file mode 100644 index 0000000000..5ea614a170 --- /dev/null +++ b/2022/CVE-2022-3873.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670545, + "name": "CVE-2022-3873", + "full_name": "Live-Hack-CVE\/CVE-2022-3873", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3873", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3873 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:09Z", + "updated_at": "2022-12-23T22:37:09Z", + "pushed_at": "2022-12-23T22:37:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38755.json b/2022/CVE-2022-38755.json deleted file mode 100644 index b1ebb5b283..0000000000 --- a/2022/CVE-2022-38755.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562660, - "name": "CVE-2022-38755", - "full_name": "Live-Hack-CVE\/CVE-2022-38755", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38755", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38755 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:43Z", - "updated_at": "2022-12-23T14:59:43Z", - "pushed_at": "2022-12-23T14:59:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38767.json b/2022/CVE-2022-38767.json deleted file mode 100644 index 5bf2791f0d..0000000000 --- a/2022/CVE-2022-38767.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525572, - "name": "CVE-2022-38767", - "full_name": "Live-Hack-CVE\/CVE-2022-38767", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38767", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38767 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:04Z", - "updated_at": "2022-12-23T12:52:04Z", - "pushed_at": "2022-12-23T12:52:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3878.json b/2022/CVE-2022-3878.json new file mode 100644 index 0000000000..5ab4651b0b --- /dev/null +++ b/2022/CVE-2022-3878.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661780, + "name": "CVE-2022-3878", + "full_name": "Live-Hack-CVE\/CVE-2022-3878", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3878", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3878 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:51Z", + "updated_at": "2022-12-23T21:47:51Z", + "pushed_at": "2022-12-23T21:47:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-38813.json b/2022/CVE-2022-38813.json deleted file mode 100644 index 386471899b..0000000000 --- a/2022/CVE-2022-38813.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536948, - "name": "CVE-2022-38813", - "full_name": "Live-Hack-CVE\/CVE-2022-38813", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38813", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38813 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:35Z", - "updated_at": "2022-12-23T13:32:35Z", - "pushed_at": "2022-12-23T13:32:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38871.json b/2022/CVE-2022-38871.json deleted file mode 100644 index df6479147a..0000000000 --- a/2022/CVE-2022-38871.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561255, - "name": "CVE-2022-38871", - "full_name": "Live-Hack-CVE\/CVE-2022-38871", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38871", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38871 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:55:12Z", - "updated_at": "2022-12-23T14:55:12Z", - "pushed_at": "2022-12-23T14:55:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38890.json b/2022/CVE-2022-38890.json deleted file mode 100644 index 5d19e991f9..0000000000 --- a/2022/CVE-2022-38890.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584953, - "name": "CVE-2022-38890", - "full_name": "Live-Hack-CVE\/CVE-2022-38890", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38890", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38890 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:11Z", - "updated_at": "2022-12-23T16:19:11Z", - "pushed_at": "2022-12-23T16:19:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38900.json b/2022/CVE-2022-38900.json deleted file mode 100644 index 561fb54134..0000000000 --- a/2022/CVE-2022-38900.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524036, - "name": "CVE-2022-38900", - "full_name": "Live-Hack-CVE\/CVE-2022-38900", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38900", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38900 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:46:58Z", - "updated_at": "2022-12-23T12:46:58Z", - "pushed_at": "2022-12-23T12:47:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3893.json b/2022/CVE-2022-3893.json new file mode 100644 index 0000000000..9a2e6a2838 --- /dev/null +++ b/2022/CVE-2022-3893.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627009, + "name": "CVE-2022-3893", + "full_name": "Live-Hack-CVE\/CVE-2022-3893", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3893", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3893 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:22Z", + "updated_at": "2022-12-23T19:01:22Z", + "pushed_at": "2022-12-23T19:01:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3895.json b/2022/CVE-2022-3895.json new file mode 100644 index 0000000000..d85aa6629d --- /dev/null +++ b/2022/CVE-2022-3895.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627024, + "name": "CVE-2022-3895", + "full_name": "Live-Hack-CVE\/CVE-2022-3895", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3895", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3895 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:26Z", + "updated_at": "2022-12-23T19:01:26Z", + "pushed_at": "2022-12-23T19:01:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3896.json b/2022/CVE-2022-3896.json deleted file mode 100644 index ee189de876..0000000000 --- a/2022/CVE-2022-3896.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524511, - "name": "CVE-2022-3896", - "full_name": "Live-Hack-CVE\/CVE-2022-3896", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3896", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3896 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:26Z", - "updated_at": "2022-12-23T12:48:26Z", - "pushed_at": "2022-12-23T12:48:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3897.json b/2022/CVE-2022-3897.json deleted file mode 100644 index 26218b6044..0000000000 --- a/2022/CVE-2022-3897.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524565, - "name": "CVE-2022-3897", - "full_name": "Live-Hack-CVE\/CVE-2022-3897", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3897", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3897 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:36Z", - "updated_at": "2022-12-23T12:48:36Z", - "pushed_at": "2022-12-23T12:48:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-38974.json b/2022/CVE-2022-38974.json deleted file mode 100644 index 1f596f3b43..0000000000 --- a/2022/CVE-2022-38974.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586203, - "name": "CVE-2022-38974", - "full_name": "Live-Hack-CVE\/CVE-2022-38974", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-38974", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-38974 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:32Z", - "updated_at": "2022-12-23T16:23:32Z", - "pushed_at": "2022-12-23T16:23:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3898.json b/2022/CVE-2022-3898.json deleted file mode 100644 index ceb3cf128b..0000000000 --- a/2022/CVE-2022-3898.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524550, - "name": "CVE-2022-3898", - "full_name": "Live-Hack-CVE\/CVE-2022-3898", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3898", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3898 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:33Z", - "updated_at": "2022-12-23T12:48:33Z", - "pushed_at": "2022-12-23T12:48:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39028.json b/2022/CVE-2022-39028.json deleted file mode 100644 index a6b1c0498c..0000000000 --- a/2022/CVE-2022-39028.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537585, - "name": "CVE-2022-39028", - "full_name": "Live-Hack-CVE\/CVE-2022-39028", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39028", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39028 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:38Z", - "updated_at": "2022-12-23T13:34:38Z", - "pushed_at": "2022-12-23T13:34:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39037.json b/2022/CVE-2022-39037.json new file mode 100644 index 0000000000..da6d3eafba --- /dev/null +++ b/2022/CVE-2022-39037.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638402, + "name": "CVE-2022-39037", + "full_name": "Live-Hack-CVE\/CVE-2022-39037", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39037", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39037 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:44Z", + "updated_at": "2022-12-23T19:51:44Z", + "pushed_at": "2022-12-23T19:51:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39038.json b/2022/CVE-2022-39038.json new file mode 100644 index 0000000000..1805e55cf7 --- /dev/null +++ b/2022/CVE-2022-39038.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638395, + "name": "CVE-2022-39038", + "full_name": "Live-Hack-CVE\/CVE-2022-39038", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39038", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39038 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:41Z", + "updated_at": "2022-12-23T19:51:41Z", + "pushed_at": "2022-12-23T19:51:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39066.json b/2022/CVE-2022-39066.json deleted file mode 100644 index aea739bfe1..0000000000 --- a/2022/CVE-2022-39066.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535990, - "name": "CVE-2022-39066", - "full_name": "Live-Hack-CVE\/CVE-2022-39066", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39066", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39066 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:16Z", - "updated_at": "2022-12-23T13:29:16Z", - "pushed_at": "2022-12-23T13:29:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39067.json b/2022/CVE-2022-39067.json deleted file mode 100644 index 2cd5da8206..0000000000 --- a/2022/CVE-2022-39067.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535977, - "name": "CVE-2022-39067", - "full_name": "Live-Hack-CVE\/CVE-2022-39067", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39067", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39067 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:13Z", - "updated_at": "2022-12-23T13:29:13Z", - "pushed_at": "2022-12-23T13:29:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39069.json b/2022/CVE-2022-39069.json new file mode 100644 index 0000000000..c17b8904a5 --- /dev/null +++ b/2022/CVE-2022-39069.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662477, + "name": "CVE-2022-39069", + "full_name": "Live-Hack-CVE\/CVE-2022-39069", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39069", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39069 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:19Z", + "updated_at": "2022-12-23T21:51:19Z", + "pushed_at": "2022-12-23T21:51:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39070.json b/2022/CVE-2022-39070.json deleted file mode 100644 index 0beeacf0fa..0000000000 --- a/2022/CVE-2022-39070.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549763, - "name": "CVE-2022-39070", - "full_name": "Live-Hack-CVE\/CVE-2022-39070", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39070", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39070 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:48Z", - "updated_at": "2022-12-23T14:16:48Z", - "pushed_at": "2022-12-23T14:16:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3910.json b/2022/CVE-2022-3910.json deleted file mode 100644 index 8ef3ecef69..0000000000 --- a/2022/CVE-2022-3910.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561902, - "name": "CVE-2022-3910", - "full_name": "Live-Hack-CVE\/CVE-2022-3910", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3910", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3910 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:19Z", - "updated_at": "2022-12-23T14:57:19Z", - "pushed_at": "2022-12-23T14:57:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39135.json b/2022/CVE-2022-39135.json deleted file mode 100644 index a5cf4e7526..0000000000 --- a/2022/CVE-2022-39135.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575357, - "name": "CVE-2022-39135", - "full_name": "Live-Hack-CVE\/CVE-2022-39135", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39135", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39135 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:38Z", - "updated_at": "2022-12-23T15:43:38Z", - "pushed_at": "2022-12-23T15:43:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39157.json b/2022/CVE-2022-39157.json new file mode 100644 index 0000000000..7c43364eb9 --- /dev/null +++ b/2022/CVE-2022-39157.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669638, + "name": "CVE-2022-39157", + "full_name": "Live-Hack-CVE\/CVE-2022-39157", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39157", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39157 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:06Z", + "updated_at": "2022-12-23T22:32:06Z", + "pushed_at": "2022-12-23T22:32:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39158.json b/2022/CVE-2022-39158.json new file mode 100644 index 0000000000..970b432127 --- /dev/null +++ b/2022/CVE-2022-39158.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670335, + "name": "CVE-2022-39158", + "full_name": "Live-Hack-CVE\/CVE-2022-39158", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39158", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39158 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:53Z", + "updated_at": "2022-12-23T22:35:53Z", + "pushed_at": "2022-12-23T22:35:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39176.json b/2022/CVE-2022-39176.json new file mode 100644 index 0000000000..49a2320728 --- /dev/null +++ b/2022/CVE-2022-39176.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676969, + "name": "CVE-2022-39176", + "full_name": "Live-Hack-CVE\/CVE-2022-39176", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39176", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39176 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:58Z", + "updated_at": "2022-12-23T23:16:58Z", + "pushed_at": "2022-12-23T23:17:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39177.json b/2022/CVE-2022-39177.json new file mode 100644 index 0000000000..763c2f5943 --- /dev/null +++ b/2022/CVE-2022-39177.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676973, + "name": "CVE-2022-39177", + "full_name": "Live-Hack-CVE\/CVE-2022-39177", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39177", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39177 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:02Z", + "updated_at": "2022-12-23T23:17:02Z", + "pushed_at": "2022-12-23T23:17:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39178.json b/2022/CVE-2022-39178.json deleted file mode 100644 index 5134ee9d82..0000000000 --- a/2022/CVE-2022-39178.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575136, - "name": "CVE-2022-39178", - "full_name": "Live-Hack-CVE\/CVE-2022-39178", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39178", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39178 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:53Z", - "updated_at": "2022-12-23T15:42:54Z", - "pushed_at": "2022-12-23T15:42:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39179.json b/2022/CVE-2022-39179.json deleted file mode 100644 index fc9d8ec58f..0000000000 --- a/2022/CVE-2022-39179.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596144, - "name": "CVE-2022-39179", - "full_name": "Live-Hack-CVE\/CVE-2022-39179", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39179", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39179 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:48Z", - "updated_at": "2022-12-23T17:00:48Z", - "pushed_at": "2022-12-23T17:00:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39180.json b/2022/CVE-2022-39180.json deleted file mode 100644 index 2abcd980d1..0000000000 --- a/2022/CVE-2022-39180.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596107, - "name": "CVE-2022-39180", - "full_name": "Live-Hack-CVE\/CVE-2022-39180", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39180", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39180 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:41Z", - "updated_at": "2022-12-23T17:00:41Z", - "pushed_at": "2022-12-23T17:00:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39181.json b/2022/CVE-2022-39181.json deleted file mode 100644 index 57ed8dfafc..0000000000 --- a/2022/CVE-2022-39181.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563099, - "name": "CVE-2022-39181", - "full_name": "Live-Hack-CVE\/CVE-2022-39181", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39181", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39181 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:08Z", - "updated_at": "2022-12-23T15:01:08Z", - "pushed_at": "2022-12-23T15:01:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39188.json b/2022/CVE-2022-39188.json deleted file mode 100644 index 76650ff01b..0000000000 --- a/2022/CVE-2022-39188.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584104, - "name": "CVE-2022-39188", - "full_name": "Live-Hack-CVE\/CVE-2022-39188", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39188", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39188 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:00Z", - "updated_at": "2022-12-23T16:16:00Z", - "pushed_at": "2022-12-23T16:16:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39190.json b/2022/CVE-2022-39190.json deleted file mode 100644 index cb55ab5053..0000000000 --- a/2022/CVE-2022-39190.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584123, - "name": "CVE-2022-39190", - "full_name": "Live-Hack-CVE\/CVE-2022-39190", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39190", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39190 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:16:03Z", - "updated_at": "2022-12-23T16:16:04Z", - "pushed_at": "2022-12-23T16:16:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39199.json b/2022/CVE-2022-39199.json deleted file mode 100644 index 331b0f8299..0000000000 --- a/2022/CVE-2022-39199.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560673, - "name": "CVE-2022-39199", - "full_name": "Live-Hack-CVE\/CVE-2022-39199", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39199", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39199 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:14Z", - "updated_at": "2022-12-23T14:53:14Z", - "pushed_at": "2022-12-23T14:53:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3920.json b/2022/CVE-2022-3920.json deleted file mode 100644 index bf5ac800da..0000000000 --- a/2022/CVE-2022-3920.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595195, - "name": "CVE-2022-3920", - "full_name": "Live-Hack-CVE\/CVE-2022-3920", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3920", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3920 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:25Z", - "updated_at": "2022-12-23T16:57:25Z", - "pushed_at": "2022-12-23T16:57:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39209.json b/2022/CVE-2022-39209.json new file mode 100644 index 0000000000..2936355f31 --- /dev/null +++ b/2022/CVE-2022-39209.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646269, + "name": "CVE-2022-39209", + "full_name": "Live-Hack-CVE\/CVE-2022-39209", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39209", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39209 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:32Z", + "updated_at": "2022-12-23T20:28:32Z", + "pushed_at": "2022-12-23T20:28:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39237.json b/2022/CVE-2022-39237.json new file mode 100644 index 0000000000..f4f9375cf1 --- /dev/null +++ b/2022/CVE-2022-39237.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637279, + "name": "CVE-2022-39237", + "full_name": "Live-Hack-CVE\/CVE-2022-39237", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39237", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39237 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:49Z", + "updated_at": "2022-12-23T19:46:49Z", + "pushed_at": "2022-12-23T19:46:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39241.json b/2022/CVE-2022-39241.json new file mode 100644 index 0000000000..e03dea9d43 --- /dev/null +++ b/2022/CVE-2022-39241.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682903, + "name": "CVE-2022-39241", + "full_name": "Live-Hack-CVE\/CVE-2022-39241", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39241", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39241 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:30Z", + "updated_at": "2022-12-23T23:56:30Z", + "pushed_at": "2022-12-23T23:56:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39244.json b/2022/CVE-2022-39244.json new file mode 100644 index 0000000000..c50c8905e9 --- /dev/null +++ b/2022/CVE-2022-39244.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655252, + "name": "CVE-2022-39244", + "full_name": "Live-Hack-CVE\/CVE-2022-39244", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39244", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39244 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:12Z", + "updated_at": "2022-12-23T21:13:12Z", + "pushed_at": "2022-12-23T21:13:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39261.json b/2022/CVE-2022-39261.json deleted file mode 100644 index 0442b55cd6..0000000000 --- a/2022/CVE-2022-39261.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585734, - "name": "CVE-2022-39261", - "full_name": "Live-Hack-CVE\/CVE-2022-39261", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39261", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39261 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:53Z", - "updated_at": "2022-12-23T16:21:53Z", - "pushed_at": "2022-12-23T16:21:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39264.json b/2022/CVE-2022-39264.json deleted file mode 100644 index 839341ee90..0000000000 --- a/2022/CVE-2022-39264.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581539034, - "name": "CVE-2022-39264", - "full_name": "Live-Hack-CVE\/CVE-2022-39264", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39264", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39264 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:39:33Z", - "updated_at": "2022-12-23T13:39:33Z", - "pushed_at": "2022-12-23T13:39:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39269.json b/2022/CVE-2022-39269.json new file mode 100644 index 0000000000..33840e529a --- /dev/null +++ b/2022/CVE-2022-39269.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655263, + "name": "CVE-2022-39269", + "full_name": "Live-Hack-CVE\/CVE-2022-39269", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39269", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39269 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:15Z", + "updated_at": "2022-12-23T21:13:15Z", + "pushed_at": "2022-12-23T21:13:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39270.json b/2022/CVE-2022-39270.json new file mode 100644 index 0000000000..749674b0d4 --- /dev/null +++ b/2022/CVE-2022-39270.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655228, + "name": "CVE-2022-39270", + "full_name": "Live-Hack-CVE\/CVE-2022-39270", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39270", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39270 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:13:05Z", + "updated_at": "2022-12-23T21:13:05Z", + "pushed_at": "2022-12-23T21:13:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39275.json b/2022/CVE-2022-39275.json new file mode 100644 index 0000000000..571ef3d933 --- /dev/null +++ b/2022/CVE-2022-39275.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637322, + "name": "CVE-2022-39275", + "full_name": "Live-Hack-CVE\/CVE-2022-39275", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39275", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39275 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:46:59Z", + "updated_at": "2022-12-23T19:46:59Z", + "pushed_at": "2022-12-23T19:47:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39280.json b/2022/CVE-2022-39280.json new file mode 100644 index 0000000000..ed32400cc7 --- /dev/null +++ b/2022/CVE-2022-39280.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655135, + "name": "CVE-2022-39280", + "full_name": "Live-Hack-CVE\/CVE-2022-39280", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39280", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39280 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:38Z", + "updated_at": "2022-12-23T21:12:38Z", + "pushed_at": "2022-12-23T21:12:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39299.json b/2022/CVE-2022-39299.json new file mode 100644 index 0000000000..f3a5545228 --- /dev/null +++ b/2022/CVE-2022-39299.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645567, + "name": "CVE-2022-39299", + "full_name": "Live-Hack-CVE\/CVE-2022-39299", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39299", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39299 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:17Z", + "updated_at": "2022-12-23T20:25:17Z", + "pushed_at": "2022-12-23T20:25:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39325.json b/2022/CVE-2022-39325.json deleted file mode 100644 index 0168d02f94..0000000000 --- a/2022/CVE-2022-39325.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524875, - "name": "CVE-2022-39325", - "full_name": "Live-Hack-CVE\/CVE-2022-39325", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39325", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39325 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:46Z", - "updated_at": "2022-12-23T12:49:46Z", - "pushed_at": "2022-12-23T12:49:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39331.json b/2022/CVE-2022-39331.json deleted file mode 100644 index c2b849aa42..0000000000 --- a/2022/CVE-2022-39331.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525629, - "name": "CVE-2022-39331", - "full_name": "Live-Hack-CVE\/CVE-2022-39331", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39331", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39331 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:17Z", - "updated_at": "2022-12-23T12:52:17Z", - "pushed_at": "2022-12-23T12:52:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39332.json b/2022/CVE-2022-39332.json deleted file mode 100644 index 4c8049b02b..0000000000 --- a/2022/CVE-2022-39332.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524864, - "name": "CVE-2022-39332", - "full_name": "Live-Hack-CVE\/CVE-2022-39332", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39332", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39332 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:43Z", - "updated_at": "2022-12-23T12:49:43Z", - "pushed_at": "2022-12-23T12:49:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39333.json b/2022/CVE-2022-39333.json deleted file mode 100644 index 2ae0884e56..0000000000 --- a/2022/CVE-2022-39333.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524848, - "name": "CVE-2022-39333", - "full_name": "Live-Hack-CVE\/CVE-2022-39333", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39333", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39333 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:39Z", - "updated_at": "2022-12-23T12:49:40Z", - "pushed_at": "2022-12-23T12:49:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39334.json b/2022/CVE-2022-39334.json deleted file mode 100644 index 296642b190..0000000000 --- a/2022/CVE-2022-39334.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525528, - "name": "CVE-2022-39334", - "full_name": "Live-Hack-CVE\/CVE-2022-39334", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39334", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39334 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:54Z", - "updated_at": "2022-12-23T12:51:54Z", - "pushed_at": "2022-12-23T12:51:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39338.json b/2022/CVE-2022-39338.json deleted file mode 100644 index 5331cfcf7f..0000000000 --- a/2022/CVE-2022-39338.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515869, - "name": "CVE-2022-39338", - "full_name": "Live-Hack-CVE\/CVE-2022-39338", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39338", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39338 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:36Z", - "updated_at": "2022-12-23T12:16:36Z", - "pushed_at": "2022-12-23T12:16:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39339.json b/2022/CVE-2022-39339.json deleted file mode 100644 index 3b1cc876f1..0000000000 --- a/2022/CVE-2022-39339.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515880, - "name": "CVE-2022-39339", - "full_name": "Live-Hack-CVE\/CVE-2022-39339", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39339", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39339 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:39Z", - "updated_at": "2022-12-23T12:16:39Z", - "pushed_at": "2022-12-23T12:16:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39343.json b/2022/CVE-2022-39343.json new file mode 100644 index 0000000000..8eccbf679f --- /dev/null +++ b/2022/CVE-2022-39343.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661179, + "name": "CVE-2022-39343", + "full_name": "Live-Hack-CVE\/CVE-2022-39343", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39343", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39343 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:38Z", + "updated_at": "2022-12-23T21:44:38Z", + "pushed_at": "2022-12-23T21:44:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39344.json b/2022/CVE-2022-39344.json new file mode 100644 index 0000000000..3fa8d50e53 --- /dev/null +++ b/2022/CVE-2022-39344.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676726, + "name": "CVE-2022-39344", + "full_name": "Live-Hack-CVE\/CVE-2022-39344", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39344", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39344 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:21Z", + "updated_at": "2022-12-23T23:15:21Z", + "pushed_at": "2022-12-23T23:15:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39348.json b/2022/CVE-2022-39348.json deleted file mode 100644 index f10094bc96..0000000000 --- a/2022/CVE-2022-39348.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550165, - "name": "CVE-2022-39348", - "full_name": "Live-Hack-CVE\/CVE-2022-39348", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39348", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39348 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:02Z", - "updated_at": "2022-12-23T14:18:02Z", - "pushed_at": "2022-12-23T14:18:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39352.json b/2022/CVE-2022-39352.json new file mode 100644 index 0000000000..75974b4236 --- /dev/null +++ b/2022/CVE-2022-39352.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661226, + "name": "CVE-2022-39352", + "full_name": "Live-Hack-CVE\/CVE-2022-39352", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39352", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39352 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:44:52Z", + "updated_at": "2022-12-23T21:44:52Z", + "pushed_at": "2022-12-23T21:44:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39353.json b/2022/CVE-2022-39353.json new file mode 100644 index 0000000000..5c1bed26bd --- /dev/null +++ b/2022/CVE-2022-39353.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683362, + "name": "CVE-2022-39353", + "full_name": "Live-Hack-CVE\/CVE-2022-39353", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39353", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39353 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:44Z", + "updated_at": "2022-12-23T23:59:44Z", + "pushed_at": "2022-12-23T23:59:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39356.json b/2022/CVE-2022-39356.json new file mode 100644 index 0000000000..a8454848b9 --- /dev/null +++ b/2022/CVE-2022-39356.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683080, + "name": "CVE-2022-39356", + "full_name": "Live-Hack-CVE\/CVE-2022-39356", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39356", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39356 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:40Z", + "updated_at": "2022-12-23T23:57:40Z", + "pushed_at": "2022-12-23T23:57:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39369.json b/2022/CVE-2022-39369.json new file mode 100644 index 0000000000..715ab9bab4 --- /dev/null +++ b/2022/CVE-2022-39369.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646148, + "name": "CVE-2022-39369", + "full_name": "Live-Hack-CVE\/CVE-2022-39369", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39369", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39369 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:55Z", + "updated_at": "2022-12-23T20:27:55Z", + "pushed_at": "2022-12-23T20:27:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39377.json b/2022/CVE-2022-39377.json deleted file mode 100644 index 1aaa06eb96..0000000000 --- a/2022/CVE-2022-39377.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573677, - "name": "CVE-2022-39377", - "full_name": "Live-Hack-CVE\/CVE-2022-39377", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39377", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39377 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:49Z", - "updated_at": "2022-12-23T15:37:49Z", - "pushed_at": "2022-12-23T15:37:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39378.json b/2022/CVE-2022-39378.json new file mode 100644 index 0000000000..ed4029d768 --- /dev/null +++ b/2022/CVE-2022-39378.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683137, + "name": "CVE-2022-39378", + "full_name": "Live-Hack-CVE\/CVE-2022-39378", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39378", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39378 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:58:03Z", + "updated_at": "2022-12-23T23:58:03Z", + "pushed_at": "2022-12-23T23:58:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39379.json b/2022/CVE-2022-39379.json new file mode 100644 index 0000000000..0fe2b2574a --- /dev/null +++ b/2022/CVE-2022-39379.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682891, + "name": "CVE-2022-39379", + "full_name": "Live-Hack-CVE\/CVE-2022-39379", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39379", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39379 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:27Z", + "updated_at": "2022-12-23T23:56:27Z", + "pushed_at": "2022-12-23T23:56:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39382.json b/2022/CVE-2022-39382.json new file mode 100644 index 0000000000..b1d794813d --- /dev/null +++ b/2022/CVE-2022-39382.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682842, + "name": "CVE-2022-39382", + "full_name": "Live-Hack-CVE\/CVE-2022-39382", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39382", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39382 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:09Z", + "updated_at": "2022-12-23T23:56:09Z", + "pushed_at": "2022-12-23T23:56:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39383.json b/2022/CVE-2022-39383.json deleted file mode 100644 index b11b5ca743..0000000000 --- a/2022/CVE-2022-39383.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594720, - "name": "CVE-2022-39383", - "full_name": "Live-Hack-CVE\/CVE-2022-39383", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39383", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39383 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:39Z", - "updated_at": "2022-12-23T16:55:39Z", - "pushed_at": "2022-12-23T16:55:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39386.json b/2022/CVE-2022-39386.json new file mode 100644 index 0000000000..f7b842e4cf --- /dev/null +++ b/2022/CVE-2022-39386.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662736, + "name": "CVE-2022-39386", + "full_name": "Live-Hack-CVE\/CVE-2022-39386", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39386", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39386 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:40Z", + "updated_at": "2022-12-23T21:52:40Z", + "pushed_at": "2022-12-23T21:52:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39387.json b/2022/CVE-2022-39387.json new file mode 100644 index 0000000000..5c1bb4c72b --- /dev/null +++ b/2022/CVE-2022-39387.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676120, + "name": "CVE-2022-39387", + "full_name": "Live-Hack-CVE\/CVE-2022-39387", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39387", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39387 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:11:21Z", + "updated_at": "2022-12-23T23:11:21Z", + "pushed_at": "2022-12-23T23:11:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39388.json b/2022/CVE-2022-39388.json new file mode 100644 index 0000000000..9d306e12fa --- /dev/null +++ b/2022/CVE-2022-39388.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637938, + "name": "CVE-2022-39388", + "full_name": "Live-Hack-CVE\/CVE-2022-39388", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39388", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39388 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:45Z", + "updated_at": "2022-12-23T19:49:45Z", + "pushed_at": "2022-12-23T19:49:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39389.json b/2022/CVE-2022-39389.json deleted file mode 100644 index ecdfc7bf3d..0000000000 --- a/2022/CVE-2022-39389.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573891, - "name": "CVE-2022-39389", - "full_name": "Live-Hack-CVE\/CVE-2022-39389", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39389", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39389 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:30Z", - "updated_at": "2022-12-23T15:38:30Z", - "pushed_at": "2022-12-23T15:38:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3939.json b/2022/CVE-2022-3939.json new file mode 100644 index 0000000000..e797ea249a --- /dev/null +++ b/2022/CVE-2022-3939.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637705, + "name": "CVE-2022-3939", + "full_name": "Live-Hack-CVE\/CVE-2022-3939", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3939", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3939 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:37Z", + "updated_at": "2022-12-23T19:48:37Z", + "pushed_at": "2022-12-23T19:48:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39392.json b/2022/CVE-2022-39392.json new file mode 100644 index 0000000000..e24c06ea37 --- /dev/null +++ b/2022/CVE-2022-39392.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637545, + "name": "CVE-2022-39392", + "full_name": "Live-Hack-CVE\/CVE-2022-39392", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39392", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39392 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:56Z", + "updated_at": "2022-12-23T19:47:56Z", + "pushed_at": "2022-12-23T19:47:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39394.json b/2022/CVE-2022-39394.json new file mode 100644 index 0000000000..acbae97b56 --- /dev/null +++ b/2022/CVE-2022-39394.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636533, + "name": "CVE-2022-39394", + "full_name": "Live-Hack-CVE\/CVE-2022-39394", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39394", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39394 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:43:58Z", + "updated_at": "2022-12-23T19:43:58Z", + "pushed_at": "2022-12-23T19:44:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39396.json b/2022/CVE-2022-39396.json new file mode 100644 index 0000000000..69d0683b72 --- /dev/null +++ b/2022/CVE-2022-39396.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646912, + "name": "CVE-2022-39396", + "full_name": "Live-Hack-CVE\/CVE-2022-39396", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39396", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39396 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:41Z", + "updated_at": "2022-12-23T20:31:41Z", + "pushed_at": "2022-12-23T20:31:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39397.json b/2022/CVE-2022-39397.json deleted file mode 100644 index 827e4a4868..0000000000 --- a/2022/CVE-2022-39397.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550713, - "name": "CVE-2022-39397", - "full_name": "Live-Hack-CVE\/CVE-2022-39397", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39397", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39397 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:48Z", - "updated_at": "2022-12-23T14:19:48Z", - "pushed_at": "2022-12-23T14:19:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39398.json b/2022/CVE-2022-39398.json new file mode 100644 index 0000000000..e1ee1cfbf3 --- /dev/null +++ b/2022/CVE-2022-39398.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646923, + "name": "CVE-2022-39398", + "full_name": "Live-Hack-CVE\/CVE-2022-39398", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39398", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39398 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:45Z", + "updated_at": "2022-12-23T20:31:45Z", + "pushed_at": "2022-12-23T20:31:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3940.json b/2022/CVE-2022-3940.json new file mode 100644 index 0000000000..2dd2b3194c --- /dev/null +++ b/2022/CVE-2022-3940.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637691, + "name": "CVE-2022-3940", + "full_name": "Live-Hack-CVE\/CVE-2022-3940", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3940", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3940 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:34Z", + "updated_at": "2022-12-23T19:48:34Z", + "pushed_at": "2022-12-23T19:48:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39400.json b/2022/CVE-2022-39400.json new file mode 100644 index 0000000000..e9ea8480ee --- /dev/null +++ b/2022/CVE-2022-39400.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682808, + "name": "CVE-2022-39400", + "full_name": "Live-Hack-CVE\/CVE-2022-39400", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39400", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39400 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:59Z", + "updated_at": "2022-12-23T23:55:59Z", + "pushed_at": "2022-12-23T23:56:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39408.json b/2022/CVE-2022-39408.json new file mode 100644 index 0000000000..c2f0a8273d --- /dev/null +++ b/2022/CVE-2022-39408.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682818, + "name": "CVE-2022-39408", + "full_name": "Live-Hack-CVE\/CVE-2022-39408", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39408", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39408 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:02Z", + "updated_at": "2022-12-23T23:56:02Z", + "pushed_at": "2022-12-23T23:56:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3941.json b/2022/CVE-2022-3941.json deleted file mode 100644 index 21d02c7bd0..0000000000 --- a/2022/CVE-2022-3941.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595149, - "name": "CVE-2022-3941", - "full_name": "Live-Hack-CVE\/CVE-2022-3941", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3941", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3941 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:15Z", - "updated_at": "2022-12-23T16:57:15Z", - "pushed_at": "2022-12-23T16:57:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39410.json b/2022/CVE-2022-39410.json new file mode 100644 index 0000000000..2fe0551480 --- /dev/null +++ b/2022/CVE-2022-39410.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682926, + "name": "CVE-2022-39410", + "full_name": "Live-Hack-CVE\/CVE-2022-39410", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39410", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39410 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:40Z", + "updated_at": "2022-12-23T23:56:40Z", + "pushed_at": "2022-12-23T23:56:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3942.json b/2022/CVE-2022-3942.json new file mode 100644 index 0000000000..6c93ca1a07 --- /dev/null +++ b/2022/CVE-2022-3942.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637673, + "name": "CVE-2022-3942", + "full_name": "Live-Hack-CVE\/CVE-2022-3942", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3942", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3942 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:29Z", + "updated_at": "2022-12-23T19:48:29Z", + "pushed_at": "2022-12-23T19:48:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3943.json b/2022/CVE-2022-3943.json new file mode 100644 index 0000000000..d023bcd38a --- /dev/null +++ b/2022/CVE-2022-3943.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637660, + "name": "CVE-2022-3943", + "full_name": "Live-Hack-CVE\/CVE-2022-3943", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3943", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3943 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:26Z", + "updated_at": "2022-12-23T19:48:26Z", + "pushed_at": "2022-12-23T19:48:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3944.json b/2022/CVE-2022-3944.json new file mode 100644 index 0000000000..9476061091 --- /dev/null +++ b/2022/CVE-2022-3944.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637626, + "name": "CVE-2022-3944", + "full_name": "Live-Hack-CVE\/CVE-2022-3944", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3944", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3944 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:16Z", + "updated_at": "2022-12-23T19:48:35Z", + "pushed_at": "2022-12-23T19:48:19Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3945.json b/2022/CVE-2022-3945.json new file mode 100644 index 0000000000..daf7e69e41 --- /dev/null +++ b/2022/CVE-2022-3945.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635873, + "name": "CVE-2022-3945", + "full_name": "Live-Hack-CVE\/CVE-2022-3945", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3945", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3945 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:22Z", + "updated_at": "2022-12-23T19:41:22Z", + "pushed_at": "2022-12-23T19:41:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3947.json b/2022/CVE-2022-3947.json new file mode 100644 index 0000000000..e4a276a063 --- /dev/null +++ b/2022/CVE-2022-3947.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637748, + "name": "CVE-2022-3947", + "full_name": "Live-Hack-CVE\/CVE-2022-3947", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3947", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3947 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:48Z", + "updated_at": "2022-12-23T19:48:48Z", + "pushed_at": "2022-12-23T19:48:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3948.json b/2022/CVE-2022-3948.json new file mode 100644 index 0000000000..5672b796ce --- /dev/null +++ b/2022/CVE-2022-3948.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637795, + "name": "CVE-2022-3948", + "full_name": "Live-Hack-CVE\/CVE-2022-3948", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3948", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3948 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:03Z", + "updated_at": "2022-12-23T19:49:03Z", + "pushed_at": "2022-12-23T19:49:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3949.json b/2022/CVE-2022-3949.json new file mode 100644 index 0000000000..04c025ae52 --- /dev/null +++ b/2022/CVE-2022-3949.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637946, + "name": "CVE-2022-3949", + "full_name": "Live-Hack-CVE\/CVE-2022-3949", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3949", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3949 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:49Z", + "updated_at": "2022-12-23T19:49:49Z", + "pushed_at": "2022-12-23T19:49:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3950.json b/2022/CVE-2022-3950.json new file mode 100644 index 0000000000..b8a525c534 --- /dev/null +++ b/2022/CVE-2022-3950.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637737, + "name": "CVE-2022-3950", + "full_name": "Live-Hack-CVE\/CVE-2022-3950", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3950", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3950 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:45Z", + "updated_at": "2022-12-23T19:48:45Z", + "pushed_at": "2022-12-23T19:48:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3952.json b/2022/CVE-2022-3952.json new file mode 100644 index 0000000000..a51689ce4e --- /dev/null +++ b/2022/CVE-2022-3952.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637847, + "name": "CVE-2022-3952", + "full_name": "Live-Hack-CVE\/CVE-2022-3952", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3952", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3952 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:20Z", + "updated_at": "2022-12-23T19:49:20Z", + "pushed_at": "2022-12-23T19:49:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3955.json b/2022/CVE-2022-3955.json new file mode 100644 index 0000000000..b01dd2badb --- /dev/null +++ b/2022/CVE-2022-3955.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635861, + "name": "CVE-2022-3955", + "full_name": "Live-Hack-CVE\/CVE-2022-3955", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3955", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3955 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:18Z", + "updated_at": "2022-12-23T19:41:18Z", + "pushed_at": "2022-12-23T19:41:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3956.json b/2022/CVE-2022-3956.json new file mode 100644 index 0000000000..96fdbcfd47 --- /dev/null +++ b/2022/CVE-2022-3956.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635829, + "name": "CVE-2022-3956", + "full_name": "Live-Hack-CVE\/CVE-2022-3956", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3956", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3956 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:11Z", + "updated_at": "2022-12-23T19:41:11Z", + "pushed_at": "2022-12-23T19:41:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3957.json b/2022/CVE-2022-3957.json new file mode 100644 index 0000000000..a114b13adf --- /dev/null +++ b/2022/CVE-2022-3957.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635814, + "name": "CVE-2022-3957", + "full_name": "Live-Hack-CVE\/CVE-2022-3957", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3957", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3957 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:08Z", + "updated_at": "2022-12-23T19:41:08Z", + "pushed_at": "2022-12-23T19:41:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3958.json b/2022/CVE-2022-3958.json new file mode 100644 index 0000000000..d159b27afd --- /dev/null +++ b/2022/CVE-2022-3958.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627041, + "name": "CVE-2022-3958", + "full_name": "Live-Hack-CVE\/CVE-2022-3958", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3958", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3958 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:29Z", + "updated_at": "2022-12-23T19:01:29Z", + "pushed_at": "2022-12-23T19:01:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3959.json b/2022/CVE-2022-3959.json new file mode 100644 index 0000000000..4ed53937de --- /dev/null +++ b/2022/CVE-2022-3959.json @@ -0,0 +1,31 @@ +[ + { + "id": 581635803, + "name": "CVE-2022-3959", + "full_name": "Live-Hack-CVE\/CVE-2022-3959", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3959", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3959 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:41:04Z", + "updated_at": "2022-12-23T19:41:04Z", + "pushed_at": "2022-12-23T19:41:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3975.json b/2022/CVE-2022-3975.json deleted file mode 100644 index f5c9a9b630..0000000000 --- a/2022/CVE-2022-3975.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595110, - "name": "CVE-2022-3975", - "full_name": "Live-Hack-CVE\/CVE-2022-3975", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3975", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3975 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:08Z", - "updated_at": "2022-12-23T16:57:09Z", - "pushed_at": "2022-12-23T16:57:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3976.json b/2022/CVE-2022-3976.json deleted file mode 100644 index af18a8bfe7..0000000000 --- a/2022/CVE-2022-3976.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595025, - "name": "CVE-2022-3976", - "full_name": "Live-Hack-CVE\/CVE-2022-3976", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3976", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3976 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:56:48Z", - "updated_at": "2022-12-23T16:56:48Z", - "pushed_at": "2022-12-23T16:56:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3978.json b/2022/CVE-2022-3978.json deleted file mode 100644 index ce70c427d9..0000000000 --- a/2022/CVE-2022-3978.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595004, - "name": "CVE-2022-3978", - "full_name": "Live-Hack-CVE\/CVE-2022-3978", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3978", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3978 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:56:45Z", - "updated_at": "2022-12-23T16:56:45Z", - "pushed_at": "2022-12-23T16:56:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3979.json b/2022/CVE-2022-3979.json deleted file mode 100644 index 9c6ad4560b..0000000000 --- a/2022/CVE-2022-3979.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594861, - "name": "CVE-2022-3979", - "full_name": "Live-Hack-CVE\/CVE-2022-3979", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3979", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3979 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:56:08Z", - "updated_at": "2022-12-23T16:56:08Z", - "pushed_at": "2022-12-23T16:56:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39800.json b/2022/CVE-2022-39800.json new file mode 100644 index 0000000000..366f63facd --- /dev/null +++ b/2022/CVE-2022-39800.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655122, + "name": "CVE-2022-39800", + "full_name": "Live-Hack-CVE\/CVE-2022-39800", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39800", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39800 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:35Z", + "updated_at": "2022-12-23T21:12:35Z", + "pushed_at": "2022-12-23T21:12:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39833.json b/2022/CVE-2022-39833.json deleted file mode 100644 index 1d5f83e957..0000000000 --- a/2022/CVE-2022-39833.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526975, - "name": "CVE-2022-39833", - "full_name": "Live-Hack-CVE\/CVE-2022-39833", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39833", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39833 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:27Z", - "updated_at": "2022-12-23T12:57:27Z", - "pushed_at": "2022-12-23T12:57:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39879.json b/2022/CVE-2022-39879.json new file mode 100644 index 0000000000..54a51ae312 --- /dev/null +++ b/2022/CVE-2022-39879.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654118, + "name": "CVE-2022-39879", + "full_name": "Live-Hack-CVE\/CVE-2022-39879", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39879", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39879 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:52Z", + "updated_at": "2022-12-23T21:07:52Z", + "pushed_at": "2022-12-23T21:07:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3988.json b/2022/CVE-2022-3988.json new file mode 100644 index 0000000000..50211f3bec --- /dev/null +++ b/2022/CVE-2022-3988.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627831, + "name": "CVE-2022-3988", + "full_name": "Live-Hack-CVE\/CVE-2022-3988", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3988", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3988 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:04:59Z", + "updated_at": "2022-12-23T19:05:00Z", + "pushed_at": "2022-12-23T19:05:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39880.json b/2022/CVE-2022-39880.json new file mode 100644 index 0000000000..80cadb51e1 --- /dev/null +++ b/2022/CVE-2022-39880.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654132, + "name": "CVE-2022-39880", + "full_name": "Live-Hack-CVE\/CVE-2022-39880", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39880", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39880 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:55Z", + "updated_at": "2022-12-23T21:07:55Z", + "pushed_at": "2022-12-23T21:07:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39881.json b/2022/CVE-2022-39881.json new file mode 100644 index 0000000000..a5dfc9b3f5 --- /dev/null +++ b/2022/CVE-2022-39881.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654174, + "name": "CVE-2022-39881", + "full_name": "Live-Hack-CVE\/CVE-2022-39881", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39881", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39881 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:05Z", + "updated_at": "2022-12-23T21:08:05Z", + "pushed_at": "2022-12-23T21:08:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39882.json b/2022/CVE-2022-39882.json new file mode 100644 index 0000000000..86df2634dc --- /dev/null +++ b/2022/CVE-2022-39882.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654143, + "name": "CVE-2022-39882", + "full_name": "Live-Hack-CVE\/CVE-2022-39882", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39882", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39882 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:59Z", + "updated_at": "2022-12-23T21:07:59Z", + "pushed_at": "2022-12-23T21:08:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39883.json b/2022/CVE-2022-39883.json new file mode 100644 index 0000000000..1a6f270638 --- /dev/null +++ b/2022/CVE-2022-39883.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654075, + "name": "CVE-2022-39883", + "full_name": "Live-Hack-CVE\/CVE-2022-39883", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39883", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39883 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:38Z", + "updated_at": "2022-12-23T21:07:38Z", + "pushed_at": "2022-12-23T21:07:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39884.json b/2022/CVE-2022-39884.json new file mode 100644 index 0000000000..3b27f7f3d8 --- /dev/null +++ b/2022/CVE-2022-39884.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654083, + "name": "CVE-2022-39884", + "full_name": "Live-Hack-CVE\/CVE-2022-39884", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39884", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39884 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:41Z", + "updated_at": "2022-12-23T21:07:41Z", + "pushed_at": "2022-12-23T21:07:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39885.json b/2022/CVE-2022-39885.json new file mode 100644 index 0000000000..c2e6f63900 --- /dev/null +++ b/2022/CVE-2022-39885.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654095, + "name": "CVE-2022-39885", + "full_name": "Live-Hack-CVE\/CVE-2022-39885", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39885", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39885 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:07:45Z", + "updated_at": "2022-12-23T21:07:45Z", + "pushed_at": "2022-12-23T21:07:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39886.json b/2022/CVE-2022-39886.json new file mode 100644 index 0000000000..8c0decbd1a --- /dev/null +++ b/2022/CVE-2022-39886.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654288, + "name": "CVE-2022-39886", + "full_name": "Live-Hack-CVE\/CVE-2022-39886", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39886", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39886 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:38Z", + "updated_at": "2022-12-23T21:08:38Z", + "pushed_at": "2022-12-23T21:08:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39887.json b/2022/CVE-2022-39887.json new file mode 100644 index 0000000000..6760ae6332 --- /dev/null +++ b/2022/CVE-2022-39887.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653952, + "name": "CVE-2022-39887", + "full_name": "Live-Hack-CVE\/CVE-2022-39887", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39887", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39887 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:55Z", + "updated_at": "2022-12-23T21:06:55Z", + "pushed_at": "2022-12-23T21:06:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39889.json b/2022/CVE-2022-39889.json new file mode 100644 index 0000000000..697976af22 --- /dev/null +++ b/2022/CVE-2022-39889.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646707, + "name": "CVE-2022-39889", + "full_name": "Live-Hack-CVE\/CVE-2022-39889", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39889", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39889 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:40Z", + "updated_at": "2022-12-23T20:30:40Z", + "pushed_at": "2022-12-23T20:30:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39890.json b/2022/CVE-2022-39890.json new file mode 100644 index 0000000000..6df5d9d298 --- /dev/null +++ b/2022/CVE-2022-39890.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653941, + "name": "CVE-2022-39890", + "full_name": "Live-Hack-CVE\/CVE-2022-39890", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39890", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39890 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:06:52Z", + "updated_at": "2022-12-23T21:06:52Z", + "pushed_at": "2022-12-23T21:06:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39891.json b/2022/CVE-2022-39891.json new file mode 100644 index 0000000000..4b75b07ca1 --- /dev/null +++ b/2022/CVE-2022-39891.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646533, + "name": "CVE-2022-39891", + "full_name": "Live-Hack-CVE\/CVE-2022-39891", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39891", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39891 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:56Z", + "updated_at": "2022-12-23T20:29:57Z", + "pushed_at": "2022-12-23T20:29:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39892.json b/2022/CVE-2022-39892.json new file mode 100644 index 0000000000..b0cbaf4157 --- /dev/null +++ b/2022/CVE-2022-39892.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653605, + "name": "CVE-2022-39892", + "full_name": "Live-Hack-CVE\/CVE-2022-39892", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39892", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39892 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:16Z", + "updated_at": "2022-12-23T21:05:16Z", + "pushed_at": "2022-12-23T21:05:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39893.json b/2022/CVE-2022-39893.json new file mode 100644 index 0000000000..c6a21814e6 --- /dev/null +++ b/2022/CVE-2022-39893.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653589, + "name": "CVE-2022-39893", + "full_name": "Live-Hack-CVE\/CVE-2022-39893", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39893", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39893 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:13Z", + "updated_at": "2022-12-23T21:10:16Z", + "pushed_at": "2022-12-23T21:05:15Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3991.json b/2022/CVE-2022-3991.json deleted file mode 100644 index 9a32042f63..0000000000 --- a/2022/CVE-2022-3991.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524600, - "name": "CVE-2022-3991", - "full_name": "Live-Hack-CVE\/CVE-2022-3991", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3991", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3991 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:43Z", - "updated_at": "2022-12-23T12:48:43Z", - "pushed_at": "2022-12-23T12:48:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3995.json b/2022/CVE-2022-3995.json deleted file mode 100644 index 1ac2ea8037..0000000000 --- a/2022/CVE-2022-3995.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524340, - "name": "CVE-2022-3995", - "full_name": "Live-Hack-CVE\/CVE-2022-3995", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3995", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3995 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:56Z", - "updated_at": "2022-12-23T12:47:56Z", - "pushed_at": "2022-12-23T12:47:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-39955.json b/2022/CVE-2022-39955.json new file mode 100644 index 0000000000..cec04d24fd --- /dev/null +++ b/2022/CVE-2022-39955.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646204, + "name": "CVE-2022-39955", + "full_name": "Live-Hack-CVE\/CVE-2022-39955", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39955", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39955 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:12Z", + "updated_at": "2022-12-23T20:28:12Z", + "pushed_at": "2022-12-23T20:28:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39956.json b/2022/CVE-2022-39956.json new file mode 100644 index 0000000000..55aee39837 --- /dev/null +++ b/2022/CVE-2022-39956.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646219, + "name": "CVE-2022-39956", + "full_name": "Live-Hack-CVE\/CVE-2022-39956", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39956", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39956 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:15Z", + "updated_at": "2022-12-23T20:28:16Z", + "pushed_at": "2022-12-23T20:28:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39957.json b/2022/CVE-2022-39957.json new file mode 100644 index 0000000000..f07ad0596f --- /dev/null +++ b/2022/CVE-2022-39957.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646234, + "name": "CVE-2022-39957", + "full_name": "Live-Hack-CVE\/CVE-2022-39957", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39957", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39957 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:19Z", + "updated_at": "2022-12-23T20:28:19Z", + "pushed_at": "2022-12-23T20:28:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-39958.json b/2022/CVE-2022-39958.json new file mode 100644 index 0000000000..f9344b0c16 --- /dev/null +++ b/2022/CVE-2022-39958.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646243, + "name": "CVE-2022-39958", + "full_name": "Live-Hack-CVE\/CVE-2022-39958", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-39958", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-39958 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:22Z", + "updated_at": "2022-12-23T20:28:22Z", + "pushed_at": "2022-12-23T20:28:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-3997.json b/2022/CVE-2022-3997.json deleted file mode 100644 index e12a42b33a..0000000000 --- a/2022/CVE-2022-3997.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574423, - "name": "CVE-2022-3997", - "full_name": "Live-Hack-CVE\/CVE-2022-3997", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3997", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3997 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:16Z", - "updated_at": "2022-12-23T15:40:16Z", - "pushed_at": "2022-12-23T15:40:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-3998.json b/2022/CVE-2022-3998.json deleted file mode 100644 index 984ff01cf5..0000000000 --- a/2022/CVE-2022-3998.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574403, - "name": "CVE-2022-3998", - "full_name": "Live-Hack-CVE\/CVE-2022-3998", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-3998", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-3998 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:12Z", - "updated_at": "2022-12-23T15:40:12Z", - "pushed_at": "2022-12-23T15:40:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4006.json b/2022/CVE-2022-4006.json deleted file mode 100644 index cef500c1f3..0000000000 --- a/2022/CVE-2022-4006.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595519, - "name": "CVE-2022-4006", - "full_name": "Live-Hack-CVE\/CVE-2022-4006", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4006", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4006 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:58:41Z", - "updated_at": "2022-12-23T16:58:41Z", - "pushed_at": "2022-12-23T16:58:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4011.json b/2022/CVE-2022-4011.json deleted file mode 100644 index c0d190f72c..0000000000 --- a/2022/CVE-2022-4011.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595187, - "name": "CVE-2022-4011", - "full_name": "Live-Hack-CVE\/CVE-2022-4011", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4011", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4011 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:21Z", - "updated_at": "2022-12-23T16:57:21Z", - "pushed_at": "2022-12-23T16:57:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40127.json b/2022/CVE-2022-40127.json new file mode 100644 index 0000000000..790bebb254 --- /dev/null +++ b/2022/CVE-2022-40127.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627887, + "name": "CVE-2022-40127", + "full_name": "Live-Hack-CVE\/CVE-2022-40127", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40127", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40127 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:11Z", + "updated_at": "2022-12-23T19:05:11Z", + "pushed_at": "2022-12-23T19:05:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40128.json b/2022/CVE-2022-40128.json new file mode 100644 index 0000000000..acc167e8cb --- /dev/null +++ b/2022/CVE-2022-40128.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662832, + "name": "CVE-2022-40128", + "full_name": "Live-Hack-CVE\/CVE-2022-40128", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40128", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40128 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:13Z", + "updated_at": "2022-12-23T21:53:13Z", + "pushed_at": "2022-12-23T21:53:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40129.json b/2022/CVE-2022-40129.json deleted file mode 100644 index 8e4a87ef3f..0000000000 --- a/2022/CVE-2022-40129.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574896, - "name": "CVE-2022-40129", - "full_name": "Live-Hack-CVE\/CVE-2022-40129", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40129", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40129 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:58Z", - "updated_at": "2022-12-23T15:41:58Z", - "pushed_at": "2022-12-23T15:41:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40130.json b/2022/CVE-2022-40130.json deleted file mode 100644 index 2a8cc9e944..0000000000 --- a/2022/CVE-2022-40130.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586440, - "name": "CVE-2022-40130", - "full_name": "Live-Hack-CVE\/CVE-2022-40130", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40130", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40130 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:27Z", - "updated_at": "2022-12-23T16:24:27Z", - "pushed_at": "2022-12-23T16:24:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40131.json b/2022/CVE-2022-40131.json new file mode 100644 index 0000000000..d7dbeae7f4 --- /dev/null +++ b/2022/CVE-2022-40131.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682502, + "name": "CVE-2022-40131", + "full_name": "Live-Hack-CVE\/CVE-2022-40131", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40131", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40131 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:00Z", + "updated_at": "2022-12-23T23:54:00Z", + "pushed_at": "2022-12-23T23:54:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4014.json b/2022/CVE-2022-4014.json deleted file mode 100644 index 03e7727b46..0000000000 --- a/2022/CVE-2022-4014.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595093, - "name": "CVE-2022-4014", - "full_name": "Live-Hack-CVE\/CVE-2022-4014", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4014", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4014 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:05Z", - "updated_at": "2022-12-23T16:57:05Z", - "pushed_at": "2022-12-23T16:57:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4015.json b/2022/CVE-2022-4015.json deleted file mode 100644 index de1afeeafb..0000000000 --- a/2022/CVE-2022-4015.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595035, - "name": "CVE-2022-4015", - "full_name": "Live-Hack-CVE\/CVE-2022-4015", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4015", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4015 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:56:51Z", - "updated_at": "2022-12-23T16:56:51Z", - "pushed_at": "2022-12-23T16:56:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40152.json b/2022/CVE-2022-40152.json deleted file mode 100644 index f60edf62f5..0000000000 --- a/2022/CVE-2022-40152.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561103, - "name": "CVE-2022-40152", - "full_name": "Live-Hack-CVE\/CVE-2022-40152", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40152", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40152 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:41Z", - "updated_at": "2022-12-23T14:54:41Z", - "pushed_at": "2022-12-23T14:54:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40159.json b/2022/CVE-2022-40159.json new file mode 100644 index 0000000000..f6123bc1c7 --- /dev/null +++ b/2022/CVE-2022-40159.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654184, + "name": "CVE-2022-40159", + "full_name": "Live-Hack-CVE\/CVE-2022-40159", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40159", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40159 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:08Z", + "updated_at": "2022-12-23T21:08:08Z", + "pushed_at": "2022-12-23T21:08:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40160.json b/2022/CVE-2022-40160.json new file mode 100644 index 0000000000..3370bb676d --- /dev/null +++ b/2022/CVE-2022-40160.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637643, + "name": "CVE-2022-40160", + "full_name": "Live-Hack-CVE\/CVE-2022-40160", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40160", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40160 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:21Z", + "updated_at": "2022-12-23T19:48:21Z", + "pushed_at": "2022-12-23T19:48:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40186.json b/2022/CVE-2022-40186.json new file mode 100644 index 0000000000..00b06f904c --- /dev/null +++ b/2022/CVE-2022-40186.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646197, + "name": "CVE-2022-40186", + "full_name": "Live-Hack-CVE\/CVE-2022-40186", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40186", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40186 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:28:09Z", + "updated_at": "2022-12-23T20:28:09Z", + "pushed_at": "2022-12-23T20:28:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40189.json b/2022/CVE-2022-40189.json deleted file mode 100644 index c0d3992b3d..0000000000 --- a/2022/CVE-2022-40189.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538624, - "name": "CVE-2022-40189", - "full_name": "Live-Hack-CVE\/CVE-2022-40189", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40189", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40189 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:08Z", - "updated_at": "2022-12-23T13:38:08Z", - "pushed_at": "2022-12-23T13:38:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4019.json b/2022/CVE-2022-4019.json deleted file mode 100644 index 0a29984081..0000000000 --- a/2022/CVE-2022-4019.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560557, - "name": "CVE-2022-4019", - "full_name": "Live-Hack-CVE\/CVE-2022-4019", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4019", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4019 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:50Z", - "updated_at": "2022-12-23T14:52:50Z", - "pushed_at": "2022-12-23T14:52:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40192.json b/2022/CVE-2022-40192.json deleted file mode 100644 index 04f7522872..0000000000 --- a/2022/CVE-2022-40192.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575151, - "name": "CVE-2022-40192", - "full_name": "Live-Hack-CVE\/CVE-2022-40192", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40192", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40192 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:57Z", - "updated_at": "2022-12-23T15:42:57Z", - "pushed_at": "2022-12-23T15:42:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4020.json b/2022/CVE-2022-4020.json deleted file mode 100644 index a90b5e9b73..0000000000 --- a/2022/CVE-2022-4020.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524052, - "name": "CVE-2022-4020", - "full_name": "Live-Hack-CVE\/CVE-2022-4020", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4020", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4020 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:01Z", - "updated_at": "2022-12-23T12:47:01Z", - "pushed_at": "2022-12-23T12:47:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40200.json b/2022/CVE-2022-40200.json deleted file mode 100644 index 980ae19f19..0000000000 --- a/2022/CVE-2022-40200.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575177, - "name": "CVE-2022-40200", - "full_name": "Live-Hack-CVE\/CVE-2022-40200", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40200", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40200 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:00Z", - "updated_at": "2022-12-23T15:43:00Z", - "pushed_at": "2022-12-23T15:43:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40205.json b/2022/CVE-2022-40205.json new file mode 100644 index 0000000000..05cc0711d2 --- /dev/null +++ b/2022/CVE-2022-40205.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663024, + "name": "CVE-2022-40205", + "full_name": "Live-Hack-CVE\/CVE-2022-40205", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40205", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40205 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:18Z", + "updated_at": "2022-12-23T21:54:18Z", + "pushed_at": "2022-12-23T21:54:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40206.json b/2022/CVE-2022-40206.json new file mode 100644 index 0000000000..0240cc079c --- /dev/null +++ b/2022/CVE-2022-40206.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663031, + "name": "CVE-2022-40206", + "full_name": "Live-Hack-CVE\/CVE-2022-40206", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40206", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40206 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:21Z", + "updated_at": "2022-12-23T21:54:21Z", + "pushed_at": "2022-12-23T21:54:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40216.json b/2022/CVE-2022-40216.json deleted file mode 100644 index aca93f6397..0000000000 --- a/2022/CVE-2022-40216.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562018, - "name": "CVE-2022-40216", - "full_name": "Live-Hack-CVE\/CVE-2022-40216", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40216", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40216 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:40Z", - "updated_at": "2022-12-23T14:57:40Z", - "pushed_at": "2022-12-23T14:57:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40223.json b/2022/CVE-2022-40223.json new file mode 100644 index 0000000000..ffde5119e6 --- /dev/null +++ b/2022/CVE-2022-40223.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663044, + "name": "CVE-2022-40223", + "full_name": "Live-Hack-CVE\/CVE-2022-40223", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40223", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40223 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:24Z", + "updated_at": "2022-12-23T21:54:24Z", + "pushed_at": "2022-12-23T21:54:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40228.json b/2022/CVE-2022-40228.json deleted file mode 100644 index 110f0780a5..0000000000 --- a/2022/CVE-2022-40228.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560713, - "name": "CVE-2022-40228", - "full_name": "Live-Hack-CVE\/CVE-2022-40228", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40228", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40228 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:21Z", - "updated_at": "2022-12-23T14:53:21Z", - "pushed_at": "2022-12-23T14:53:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40230.json b/2022/CVE-2022-40230.json new file mode 100644 index 0000000000..6b8a97fbbb --- /dev/null +++ b/2022/CVE-2022-40230.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682519, + "name": "CVE-2022-40230", + "full_name": "Live-Hack-CVE\/CVE-2022-40230", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40230", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40230 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:07Z", + "updated_at": "2022-12-23T23:54:07Z", + "pushed_at": "2022-12-23T23:54:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40235.json b/2022/CVE-2022-40235.json new file mode 100644 index 0000000000..0e43160ed1 --- /dev/null +++ b/2022/CVE-2022-40235.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682529, + "name": "CVE-2022-40235", + "full_name": "Live-Hack-CVE\/CVE-2022-40235", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40235", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40235 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:54:11Z", + "updated_at": "2022-12-23T23:54:11Z", + "pushed_at": "2022-12-23T23:54:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40263.json b/2022/CVE-2022-40263.json new file mode 100644 index 0000000000..0c5b32c364 --- /dev/null +++ b/2022/CVE-2022-40263.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676594, + "name": "CVE-2022-40263", + "full_name": "Live-Hack-CVE\/CVE-2022-40263", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40263", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40263 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:31Z", + "updated_at": "2022-12-23T23:14:31Z", + "pushed_at": "2022-12-23T23:14:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40266.json b/2022/CVE-2022-40266.json deleted file mode 100644 index 047a9f0def..0000000000 --- a/2022/CVE-2022-40266.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526672, - "name": "CVE-2022-40266", - "full_name": "Live-Hack-CVE\/CVE-2022-40266", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40266", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40266 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:15Z", - "updated_at": "2022-12-23T12:56:15Z", - "pushed_at": "2022-12-23T12:56:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4027.json b/2022/CVE-2022-4027.json deleted file mode 100644 index a216c28a94..0000000000 --- a/2022/CVE-2022-4027.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524316, - "name": "CVE-2022-4027", - "full_name": "Live-Hack-CVE\/CVE-2022-4027", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4027", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4027 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:52Z", - "updated_at": "2022-12-23T12:47:52Z", - "pushed_at": "2022-12-23T12:47:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40276.json b/2022/CVE-2022-40276.json new file mode 100644 index 0000000000..38e9e334c0 --- /dev/null +++ b/2022/CVE-2022-40276.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681961, + "name": "CVE-2022-40276", + "full_name": "Live-Hack-CVE\/CVE-2022-40276", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40276", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40276 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:50Z", + "updated_at": "2022-12-23T23:50:50Z", + "pushed_at": "2022-12-23T23:50:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4028.json b/2022/CVE-2022-4028.json deleted file mode 100644 index 88a8bec2ab..0000000000 --- a/2022/CVE-2022-4028.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524679, - "name": "CVE-2022-4028", - "full_name": "Live-Hack-CVE\/CVE-2022-4028", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4028", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4028 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:01Z", - "updated_at": "2022-12-23T12:49:01Z", - "pushed_at": "2022-12-23T12:49:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40282.json b/2022/CVE-2022-40282.json deleted file mode 100644 index 3253a87409..0000000000 --- a/2022/CVE-2022-40282.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525612, - "name": "CVE-2022-40282", - "full_name": "Live-Hack-CVE\/CVE-2022-40282", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40282", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40282 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:14Z", - "updated_at": "2022-12-23T12:52:14Z", - "pushed_at": "2022-12-23T12:52:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4029.json b/2022/CVE-2022-4029.json deleted file mode 100644 index 1160fab10e..0000000000 --- a/2022/CVE-2022-4029.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524641, - "name": "CVE-2022-4029", - "full_name": "Live-Hack-CVE\/CVE-2022-4029", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4029", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4029 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:54Z", - "updated_at": "2022-12-23T12:48:54Z", - "pushed_at": "2022-12-23T12:48:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4030.json b/2022/CVE-2022-4030.json deleted file mode 100644 index 0f57b8e37a..0000000000 --- a/2022/CVE-2022-4030.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524615, - "name": "CVE-2022-4030", - "full_name": "Live-Hack-CVE\/CVE-2022-4030", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4030", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4030 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:47Z", - "updated_at": "2022-12-23T12:48:47Z", - "pushed_at": "2022-12-23T12:48:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40307.json b/2022/CVE-2022-40307.json deleted file mode 100644 index 4402c2d52a..0000000000 --- a/2022/CVE-2022-40307.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584347, - "name": "CVE-2022-40307", - "full_name": "Live-Hack-CVE\/CVE-2022-40307", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40307", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40307 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:00Z", - "updated_at": "2022-12-23T16:17:00Z", - "pushed_at": "2022-12-23T16:17:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4031.json b/2022/CVE-2022-4031.json deleted file mode 100644 index e5541a8d4e..0000000000 --- a/2022/CVE-2022-4031.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524663, - "name": "CVE-2022-4031", - "full_name": "Live-Hack-CVE\/CVE-2022-4031", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4031", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4031 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:58Z", - "updated_at": "2022-12-23T12:48:58Z", - "pushed_at": "2022-12-23T12:49:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4036.json b/2022/CVE-2022-4036.json deleted file mode 100644 index 8de78ca2e5..0000000000 --- a/2022/CVE-2022-4036.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515615, - "name": "CVE-2022-4036", - "full_name": "Live-Hack-CVE\/CVE-2022-4036", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4036", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4036 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:35Z", - "updated_at": "2022-12-23T12:15:35Z", - "pushed_at": "2022-12-23T12:15:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4044.json b/2022/CVE-2022-4044.json deleted file mode 100644 index 76bf19acc6..0000000000 --- a/2022/CVE-2022-4044.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560566, - "name": "CVE-2022-4044", - "full_name": "Live-Hack-CVE\/CVE-2022-4044", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4044", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4044 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:53Z", - "updated_at": "2022-12-23T14:52:53Z", - "pushed_at": "2022-12-23T14:52:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4045.json b/2022/CVE-2022-4045.json deleted file mode 100644 index 9120980a58..0000000000 --- a/2022/CVE-2022-4045.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560498, - "name": "CVE-2022-4045", - "full_name": "Live-Hack-CVE\/CVE-2022-4045", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4045", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4045 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:40Z", - "updated_at": "2022-12-23T14:52:40Z", - "pushed_at": "2022-12-23T14:52:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40470.json b/2022/CVE-2022-40470.json deleted file mode 100644 index 356d066ce8..0000000000 --- a/2022/CVE-2022-40470.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574913, - "name": "CVE-2022-40470", - "full_name": "Live-Hack-CVE\/CVE-2022-40470", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40470", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40470 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:01Z", - "updated_at": "2022-12-23T15:42:01Z", - "pushed_at": "2022-12-23T15:42:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4051.json b/2022/CVE-2022-4051.json deleted file mode 100644 index 2fd1d9de9a..0000000000 --- a/2022/CVE-2022-4051.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585826, - "name": "CVE-2022-4051", - "full_name": "Live-Hack-CVE\/CVE-2022-4051", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4051", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4051 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:14Z", - "updated_at": "2022-12-23T16:22:14Z", - "pushed_at": "2022-12-23T16:22:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4052.json b/2022/CVE-2022-4052.json deleted file mode 100644 index bb72bb5550..0000000000 --- a/2022/CVE-2022-4052.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596252, - "name": "CVE-2022-4052", - "full_name": "Live-Hack-CVE\/CVE-2022-4052", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4052", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4052 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:15Z", - "updated_at": "2022-12-23T17:01:15Z", - "pushed_at": "2022-12-23T17:01:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4053.json b/2022/CVE-2022-4053.json deleted file mode 100644 index 3b9d6b46ae..0000000000 --- a/2022/CVE-2022-4053.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596242, - "name": "CVE-2022-4053", - "full_name": "Live-Hack-CVE\/CVE-2022-4053", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4053", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4053 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:12Z", - "updated_at": "2022-12-23T17:01:12Z", - "pushed_at": "2022-12-23T17:01:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4055.json b/2022/CVE-2022-4055.json deleted file mode 100644 index 5939791ecc..0000000000 --- a/2022/CVE-2022-4055.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561036, - "name": "CVE-2022-4055", - "full_name": "Live-Hack-CVE\/CVE-2022-4055", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4055", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4055 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:27Z", - "updated_at": "2022-12-23T14:54:27Z", - "pushed_at": "2022-12-23T14:54:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40602.json b/2022/CVE-2022-40602.json deleted file mode 100644 index e3b7e6311c..0000000000 --- a/2022/CVE-2022-40602.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560873, - "name": "CVE-2022-40602", - "full_name": "Live-Hack-CVE\/CVE-2022-40602", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40602", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40602 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:57Z", - "updated_at": "2022-12-23T14:53:57Z", - "pushed_at": "2022-12-23T14:53:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40617.json b/2022/CVE-2022-40617.json new file mode 100644 index 0000000000..9a174814b1 --- /dev/null +++ b/2022/CVE-2022-40617.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646160, + "name": "CVE-2022-40617", + "full_name": "Live-Hack-CVE\/CVE-2022-40617", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40617", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40617 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:58Z", + "updated_at": "2022-12-23T20:27:58Z", + "pushed_at": "2022-12-23T20:28:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40632.json b/2022/CVE-2022-40632.json new file mode 100644 index 0000000000..7c69496640 --- /dev/null +++ b/2022/CVE-2022-40632.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663050, + "name": "CVE-2022-40632", + "full_name": "Live-Hack-CVE\/CVE-2022-40632", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40632", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40632 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:28Z", + "updated_at": "2022-12-23T21:54:28Z", + "pushed_at": "2022-12-23T21:54:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4064.json b/2022/CVE-2022-4064.json deleted file mode 100644 index c510bfda9a..0000000000 --- a/2022/CVE-2022-4064.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560978, - "name": "CVE-2022-4064", - "full_name": "Live-Hack-CVE\/CVE-2022-4064", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4064", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4064 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:17Z", - "updated_at": "2022-12-23T14:54:17Z", - "pushed_at": "2022-12-23T14:54:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4065.json b/2022/CVE-2022-4065.json deleted file mode 100644 index 907b0c4767..0000000000 --- a/2022/CVE-2022-4065.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560966, - "name": "CVE-2022-4065", - "full_name": "Live-Hack-CVE\/CVE-2022-4065", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4065", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4065 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:14Z", - "updated_at": "2022-12-23T14:54:14Z", - "pushed_at": "2022-12-23T14:54:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4066.json b/2022/CVE-2022-4066.json deleted file mode 100644 index fade748441..0000000000 --- a/2022/CVE-2022-4066.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581551074, - "name": "CVE-2022-4066", - "full_name": "Live-Hack-CVE\/CVE-2022-4066", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4066", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4066 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:57Z", - "updated_at": "2022-12-23T14:20:57Z", - "pushed_at": "2022-12-23T14:20:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40664.json b/2022/CVE-2022-40664.json deleted file mode 100644 index ed6e8eb5bb..0000000000 --- a/2022/CVE-2022-40664.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595678, - "name": "CVE-2022-40664", - "full_name": "Live-Hack-CVE\/CVE-2022-40664", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40664", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40664 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:15Z", - "updated_at": "2022-12-23T16:59:15Z", - "pushed_at": "2022-12-23T16:59:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4067.json b/2022/CVE-2022-4067.json deleted file mode 100644 index 83776a313b..0000000000 --- a/2022/CVE-2022-4067.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586189, - "name": "CVE-2022-4067", - "full_name": "Live-Hack-CVE\/CVE-2022-4067", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4067", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4067 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:29Z", - "updated_at": "2022-12-23T16:23:29Z", - "pushed_at": "2022-12-23T16:23:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40674.json b/2022/CVE-2022-40674.json deleted file mode 100644 index de03ebe1d0..0000000000 --- a/2022/CVE-2022-40674.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574503, - "name": "CVE-2022-40674", - "full_name": "Live-Hack-CVE\/CVE-2022-40674", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40674", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40674 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:33Z", - "updated_at": "2022-12-23T15:40:33Z", - "pushed_at": "2022-12-23T15:40:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4068.json b/2022/CVE-2022-4068.json deleted file mode 100644 index fcad7e2c25..0000000000 --- a/2022/CVE-2022-4068.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538789, - "name": "CVE-2022-4068", - "full_name": "Live-Hack-CVE\/CVE-2022-4068", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4068", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4068 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:43Z", - "updated_at": "2022-12-23T13:38:43Z", - "pushed_at": "2022-12-23T13:38:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40686.json b/2022/CVE-2022-40686.json deleted file mode 100644 index baef447529..0000000000 --- a/2022/CVE-2022-40686.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586322, - "name": "CVE-2022-40686", - "full_name": "Live-Hack-CVE\/CVE-2022-40686", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40686", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40686 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:00Z", - "updated_at": "2022-12-23T16:24:00Z", - "pushed_at": "2022-12-23T16:24:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40687.json b/2022/CVE-2022-40687.json deleted file mode 100644 index 644b54e84a..0000000000 --- a/2022/CVE-2022-40687.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586421, - "name": "CVE-2022-40687", - "full_name": "Live-Hack-CVE\/CVE-2022-40687", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40687", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40687 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:20Z", - "updated_at": "2022-12-23T16:24:20Z", - "pushed_at": "2022-12-23T16:24:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4069.json b/2022/CVE-2022-4069.json deleted file mode 100644 index 81881a8f4c..0000000000 --- a/2022/CVE-2022-4069.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586041, - "name": "CVE-2022-4069", - "full_name": "Live-Hack-CVE\/CVE-2022-4069", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4069", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4069 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:58Z", - "updated_at": "2022-12-23T16:22:58Z", - "pushed_at": "2022-12-23T16:23:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40694.json b/2022/CVE-2022-40694.json deleted file mode 100644 index c2d744dcce..0000000000 --- a/2022/CVE-2022-40694.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575200, - "name": "CVE-2022-40694", - "full_name": "Live-Hack-CVE\/CVE-2022-40694", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40694", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40694 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:04Z", - "updated_at": "2022-12-23T15:43:04Z", - "pushed_at": "2022-12-23T15:43:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40695.json b/2022/CVE-2022-40695.json deleted file mode 100644 index ab1ea1c868..0000000000 --- a/2022/CVE-2022-40695.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586404, - "name": "CVE-2022-40695", - "full_name": "Live-Hack-CVE\/CVE-2022-40695", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40695", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40695 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:17Z", - "updated_at": "2022-12-23T16:24:17Z", - "pushed_at": "2022-12-23T16:24:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40698.json b/2022/CVE-2022-40698.json deleted file mode 100644 index 2555930b22..0000000000 --- a/2022/CVE-2022-40698.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586364, - "name": "CVE-2022-40698", - "full_name": "Live-Hack-CVE\/CVE-2022-40698", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40698", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40698 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:10Z", - "updated_at": "2022-12-23T16:24:10Z", - "pushed_at": "2022-12-23T16:24:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4070.json b/2022/CVE-2022-4070.json deleted file mode 100644 index 1b49115b78..0000000000 --- a/2022/CVE-2022-4070.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586025, - "name": "CVE-2022-4070", - "full_name": "Live-Hack-CVE\/CVE-2022-4070", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4070", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4070 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:54Z", - "updated_at": "2022-12-23T16:22:54Z", - "pushed_at": "2022-12-23T16:22:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40735.json b/2022/CVE-2022-40735.json deleted file mode 100644 index e216a85c5c..0000000000 --- a/2022/CVE-2022-40735.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575341, - "name": "CVE-2022-40735", - "full_name": "Live-Hack-CVE\/CVE-2022-40735", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40735", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40735 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:35Z", - "updated_at": "2022-12-23T15:43:35Z", - "pushed_at": "2022-12-23T15:43:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40746.json b/2022/CVE-2022-40746.json deleted file mode 100644 index 2f25634aa8..0000000000 --- a/2022/CVE-2022-40746.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562913, - "name": "CVE-2022-40746", - "full_name": "Live-Hack-CVE\/CVE-2022-40746", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40746", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40746 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:33Z", - "updated_at": "2022-12-23T15:00:33Z", - "pushed_at": "2022-12-23T15:00:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40747.json b/2022/CVE-2022-40747.json new file mode 100644 index 0000000000..1dcda76452 --- /dev/null +++ b/2022/CVE-2022-40747.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682713, + "name": "CVE-2022-40747", + "full_name": "Live-Hack-CVE\/CVE-2022-40747", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40747", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40747 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:21Z", + "updated_at": "2022-12-23T23:55:21Z", + "pushed_at": "2022-12-23T23:55:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40750.json b/2022/CVE-2022-40750.json new file mode 100644 index 0000000000..aaf63d4a9f --- /dev/null +++ b/2022/CVE-2022-40750.json @@ -0,0 +1,31 @@ +[ + { + "id": 581629211, + "name": "CVE-2022-40750", + "full_name": "Live-Hack-CVE\/CVE-2022-40750", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40750", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40750 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:10:44Z", + "updated_at": "2022-12-23T19:10:44Z", + "pushed_at": "2022-12-23T19:10:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40751.json b/2022/CVE-2022-40751.json deleted file mode 100644 index ac9ffc1956..0000000000 --- a/2022/CVE-2022-40751.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595644, - "name": "CVE-2022-40751", - "full_name": "Live-Hack-CVE\/CVE-2022-40751", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40751", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40751 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:08Z", - "updated_at": "2022-12-23T16:59:08Z", - "pushed_at": "2022-12-23T16:59:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40752.json b/2022/CVE-2022-40752.json deleted file mode 100644 index b64298b6f1..0000000000 --- a/2022/CVE-2022-40752.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586609, - "name": "CVE-2022-40752", - "full_name": "Live-Hack-CVE\/CVE-2022-40752", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40752", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40752 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:25:04Z", - "updated_at": "2022-12-23T16:25:04Z", - "pushed_at": "2022-12-23T16:25:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40753.json b/2022/CVE-2022-40753.json deleted file mode 100644 index b8e24ab8bc..0000000000 --- a/2022/CVE-2022-40753.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596591, - "name": "CVE-2022-40753", - "full_name": "Live-Hack-CVE\/CVE-2022-40753", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40753", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40753 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:34Z", - "updated_at": "2022-12-23T17:02:35Z", - "pushed_at": "2022-12-23T17:02:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40765.json b/2022/CVE-2022-40765.json deleted file mode 100644 index 5ccf2464e4..0000000000 --- a/2022/CVE-2022-40765.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560921, - "name": "CVE-2022-40765", - "full_name": "Live-Hack-CVE\/CVE-2022-40765", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40765", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40765 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:07Z", - "updated_at": "2022-12-23T14:54:07Z", - "pushed_at": "2022-12-23T14:54:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40768.json b/2022/CVE-2022-40768.json new file mode 100644 index 0000000000..42065e2b6c --- /dev/null +++ b/2022/CVE-2022-40768.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670632, + "name": "CVE-2022-40768", + "full_name": "Live-Hack-CVE\/CVE-2022-40768", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40768", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40768 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:38Z", + "updated_at": "2022-12-23T22:37:38Z", + "pushed_at": "2022-12-23T22:37:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40770.json b/2022/CVE-2022-40770.json deleted file mode 100644 index a72e02a994..0000000000 --- a/2022/CVE-2022-40770.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549194, - "name": "CVE-2022-40770", - "full_name": "Live-Hack-CVE\/CVE-2022-40770", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40770", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40770 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:03Z", - "updated_at": "2022-12-23T14:15:03Z", - "pushed_at": "2022-12-23T14:15:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40771.json b/2022/CVE-2022-40771.json deleted file mode 100644 index 9b11cd1645..0000000000 --- a/2022/CVE-2022-40771.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537129, - "name": "CVE-2022-40771", - "full_name": "Live-Hack-CVE\/CVE-2022-40771", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40771", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40771 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:33:08Z", - "updated_at": "2022-12-23T13:33:08Z", - "pushed_at": "2022-12-23T13:33:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40772.json b/2022/CVE-2022-40772.json deleted file mode 100644 index b8d71e6dfd..0000000000 --- a/2022/CVE-2022-40772.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537151, - "name": "CVE-2022-40772", - "full_name": "Live-Hack-CVE\/CVE-2022-40772", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40772", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40772 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:33:12Z", - "updated_at": "2022-12-23T13:33:12Z", - "pushed_at": "2022-12-23T13:33:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40773.json b/2022/CVE-2022-40773.json new file mode 100644 index 0000000000..53e6c712b1 --- /dev/null +++ b/2022/CVE-2022-40773.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628370, + "name": "CVE-2022-40773", + "full_name": "Live-Hack-CVE\/CVE-2022-40773", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40773", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40773 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:04Z", + "updated_at": "2022-12-23T19:07:04Z", + "pushed_at": "2022-12-23T19:07:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-40797.json b/2022/CVE-2022-40797.json deleted file mode 100644 index f90399dbff..0000000000 --- a/2022/CVE-2022-40797.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584964, - "name": "CVE-2022-40797", - "full_name": "Live-Hack-CVE\/CVE-2022-40797", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40797", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40797 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:14Z", - "updated_at": "2022-12-23T16:19:14Z", - "pushed_at": "2022-12-23T16:19:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40799.json b/2022/CVE-2022-40799.json deleted file mode 100644 index 4d2b0b63b5..0000000000 --- a/2022/CVE-2022-40799.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515684, - "name": "CVE-2022-40799", - "full_name": "Live-Hack-CVE\/CVE-2022-40799", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40799", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40799 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:53Z", - "updated_at": "2022-12-23T12:15:53Z", - "pushed_at": "2022-12-23T12:15:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40842.json b/2022/CVE-2022-40842.json deleted file mode 100644 index d069631c77..0000000000 --- a/2022/CVE-2022-40842.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563203, - "name": "CVE-2022-40842", - "full_name": "Live-Hack-CVE\/CVE-2022-40842", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40842", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40842 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:27Z", - "updated_at": "2022-12-23T15:01:27Z", - "pushed_at": "2022-12-23T15:01:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40843.json b/2022/CVE-2022-40843.json deleted file mode 100644 index a6d9b16031..0000000000 --- a/2022/CVE-2022-40843.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597018, - "name": "CVE-2022-40843", - "full_name": "Live-Hack-CVE\/CVE-2022-40843", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40843", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40843 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:11Z", - "updated_at": "2022-12-23T17:04:11Z", - "pushed_at": "2022-12-23T17:04:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40844.json b/2022/CVE-2022-40844.json deleted file mode 100644 index 6824400670..0000000000 --- a/2022/CVE-2022-40844.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594789, - "name": "CVE-2022-40844", - "full_name": "Live-Hack-CVE\/CVE-2022-40844", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40844", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40844 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:55Z", - "updated_at": "2022-12-23T16:55:55Z", - "pushed_at": "2022-12-23T16:55:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40845.json b/2022/CVE-2022-40845.json deleted file mode 100644 index 5b2fa16381..0000000000 --- a/2022/CVE-2022-40845.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594764, - "name": "CVE-2022-40845", - "full_name": "Live-Hack-CVE\/CVE-2022-40845", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40845", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40845 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:48Z", - "updated_at": "2022-12-23T16:55:48Z", - "pushed_at": "2022-12-23T16:55:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40846.json b/2022/CVE-2022-40846.json deleted file mode 100644 index d9c59cee9a..0000000000 --- a/2022/CVE-2022-40846.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594734, - "name": "CVE-2022-40846", - "full_name": "Live-Hack-CVE\/CVE-2022-40846", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40846", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40846 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:42Z", - "updated_at": "2022-12-23T16:55:42Z", - "pushed_at": "2022-12-23T16:55:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40847.json b/2022/CVE-2022-40847.json deleted file mode 100644 index c9e8a29f33..0000000000 --- a/2022/CVE-2022-40847.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594775, - "name": "CVE-2022-40847", - "full_name": "Live-Hack-CVE\/CVE-2022-40847", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40847", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40847 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:52Z", - "updated_at": "2022-12-23T16:55:52Z", - "pushed_at": "2022-12-23T16:55:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40870.json b/2022/CVE-2022-40870.json deleted file mode 100644 index c5fe497144..0000000000 --- a/2022/CVE-2022-40870.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560637, - "name": "CVE-2022-40870", - "full_name": "Live-Hack-CVE\/CVE-2022-40870", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40870", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40870 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:07Z", - "updated_at": "2022-12-23T14:53:07Z", - "pushed_at": "2022-12-23T14:53:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4088.json b/2022/CVE-2022-4088.json deleted file mode 100644 index fee118735b..0000000000 --- a/2022/CVE-2022-4088.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548953, - "name": "CVE-2022-4088", - "full_name": "Live-Hack-CVE\/CVE-2022-4088", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4088", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4088 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:15Z", - "updated_at": "2022-12-23T14:14:15Z", - "pushed_at": "2022-12-23T14:14:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40881.json b/2022/CVE-2022-40881.json deleted file mode 100644 index 99bbdbc875..0000000000 --- a/2022/CVE-2022-40881.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595829, - "name": "CVE-2022-40881", - "full_name": "Live-Hack-CVE\/CVE-2022-40881", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40881", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40881 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:46Z", - "updated_at": "2022-12-23T16:59:46Z", - "pushed_at": "2022-12-23T16:59:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4089.json b/2022/CVE-2022-4089.json deleted file mode 100644 index 443de7af17..0000000000 --- a/2022/CVE-2022-4089.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548968, - "name": "CVE-2022-4089", - "full_name": "Live-Hack-CVE\/CVE-2022-4089", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4089", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4089 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:18Z", - "updated_at": "2022-12-23T14:14:18Z", - "pushed_at": "2022-12-23T14:14:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4090.json b/2022/CVE-2022-4090.json deleted file mode 100644 index 957a5aa159..0000000000 --- a/2022/CVE-2022-4090.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548981, - "name": "CVE-2022-4090", - "full_name": "Live-Hack-CVE\/CVE-2022-4090", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4090", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4090 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:22Z", - "updated_at": "2022-12-23T14:14:22Z", - "pushed_at": "2022-12-23T14:14:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40903.json b/2022/CVE-2022-40903.json deleted file mode 100644 index dd7b1d3b95..0000000000 --- a/2022/CVE-2022-40903.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573828, - "name": "CVE-2022-40903", - "full_name": "Live-Hack-CVE\/CVE-2022-40903", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40903", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40903 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:17Z", - "updated_at": "2022-12-23T15:38:17Z", - "pushed_at": "2022-12-23T15:38:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4091.json b/2022/CVE-2022-4091.json deleted file mode 100644 index bf89a66d14..0000000000 --- a/2022/CVE-2022-4091.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526287, - "name": "CVE-2022-4091", - "full_name": "Live-Hack-CVE\/CVE-2022-4091", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4091", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4091 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:54:51Z", - "updated_at": "2022-12-23T12:54:51Z", - "pushed_at": "2022-12-23T12:54:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4093.json b/2022/CVE-2022-4093.json deleted file mode 100644 index 1591501509..0000000000 --- a/2022/CVE-2022-4093.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572507, - "name": "CVE-2022-4093", - "full_name": "Live-Hack-CVE\/CVE-2022-4093", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4093", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4093 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:58Z", - "updated_at": "2022-12-23T15:33:58Z", - "pushed_at": "2022-12-23T15:34:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40954.json b/2022/CVE-2022-40954.json deleted file mode 100644 index 1e1a5cc692..0000000000 --- a/2022/CVE-2022-40954.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550330, - "name": "CVE-2022-40954", - "full_name": "Live-Hack-CVE\/CVE-2022-40954", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40954", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40954 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:33Z", - "updated_at": "2022-12-23T14:18:33Z", - "pushed_at": "2022-12-23T14:18:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4096.json b/2022/CVE-2022-4096.json deleted file mode 100644 index c05076b919..0000000000 --- a/2022/CVE-2022-4096.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563489, - "name": "CVE-2022-4096", - "full_name": "Live-Hack-CVE\/CVE-2022-4096", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4096", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4096 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:02:26Z", - "updated_at": "2022-12-23T15:02:26Z", - "pushed_at": "2022-12-23T15:02:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40963.json b/2022/CVE-2022-40963.json deleted file mode 100644 index 5daaf6ed2d..0000000000 --- a/2022/CVE-2022-40963.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561997, - "name": "CVE-2022-40963", - "full_name": "Live-Hack-CVE\/CVE-2022-40963", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40963", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40963 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:36Z", - "updated_at": "2022-12-23T14:57:36Z", - "pushed_at": "2022-12-23T14:57:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40976.json b/2022/CVE-2022-40976.json deleted file mode 100644 index 98657bd872..0000000000 --- a/2022/CVE-2022-40976.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525540, - "name": "CVE-2022-40976", - "full_name": "Live-Hack-CVE\/CVE-2022-40976", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40976", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40976 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:57Z", - "updated_at": "2022-12-23T12:51:57Z", - "pushed_at": "2022-12-23T12:51:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40977.json b/2022/CVE-2022-40977.json deleted file mode 100644 index 385d59a063..0000000000 --- a/2022/CVE-2022-40977.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525556, - "name": "CVE-2022-40977", - "full_name": "Live-Hack-CVE\/CVE-2022-40977", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40977", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40977 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:00Z", - "updated_at": "2022-12-23T12:52:00Z", - "pushed_at": "2022-12-23T12:52:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-40981.json b/2022/CVE-2022-40981.json new file mode 100644 index 0000000000..f41a82e47f --- /dev/null +++ b/2022/CVE-2022-40981.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636192, + "name": "CVE-2022-40981", + "full_name": "Live-Hack-CVE\/CVE-2022-40981", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-40981", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-40981 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:41Z", + "updated_at": "2022-12-23T19:42:41Z", + "pushed_at": "2022-12-23T19:42:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41035.json b/2022/CVE-2022-41035.json new file mode 100644 index 0000000000..13920ae0f1 --- /dev/null +++ b/2022/CVE-2022-41035.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646503, + "name": "CVE-2022-41035", + "full_name": "Live-Hack-CVE\/CVE-2022-41035", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41035", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41035 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:29:50Z", + "updated_at": "2022-12-23T20:29:50Z", + "pushed_at": "2022-12-23T20:29:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41039.json b/2022/CVE-2022-41039.json new file mode 100644 index 0000000000..6408e97ede --- /dev/null +++ b/2022/CVE-2022-41039.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646731, + "name": "CVE-2022-41039", + "full_name": "Live-Hack-CVE\/CVE-2022-41039", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41039", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41039 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:46Z", + "updated_at": "2022-12-23T20:30:47Z", + "pushed_at": "2022-12-23T20:30:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41044.json b/2022/CVE-2022-41044.json new file mode 100644 index 0000000000..d88b6fe41f --- /dev/null +++ b/2022/CVE-2022-41044.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646737, + "name": "CVE-2022-41044", + "full_name": "Live-Hack-CVE\/CVE-2022-41044", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41044", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41044 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:50Z", + "updated_at": "2022-12-23T20:30:50Z", + "pushed_at": "2022-12-23T20:30:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41045.json b/2022/CVE-2022-41045.json new file mode 100644 index 0000000000..0226818736 --- /dev/null +++ b/2022/CVE-2022-41045.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646751, + "name": "CVE-2022-41045", + "full_name": "Live-Hack-CVE\/CVE-2022-41045", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41045", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41045 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:53Z", + "updated_at": "2022-12-23T20:30:53Z", + "pushed_at": "2022-12-23T20:30:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41047.json b/2022/CVE-2022-41047.json new file mode 100644 index 0000000000..4a06939390 --- /dev/null +++ b/2022/CVE-2022-41047.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646759, + "name": "CVE-2022-41047", + "full_name": "Live-Hack-CVE\/CVE-2022-41047", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41047", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41047 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:56Z", + "updated_at": "2022-12-23T20:30:56Z", + "pushed_at": "2022-12-23T20:30:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41048.json b/2022/CVE-2022-41048.json new file mode 100644 index 0000000000..8dff0a58ed --- /dev/null +++ b/2022/CVE-2022-41048.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646790, + "name": "CVE-2022-41048", + "full_name": "Live-Hack-CVE\/CVE-2022-41048", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41048", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41048 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:07Z", + "updated_at": "2022-12-23T20:31:07Z", + "pushed_at": "2022-12-23T20:31:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41049.json b/2022/CVE-2022-41049.json new file mode 100644 index 0000000000..205f93d00c --- /dev/null +++ b/2022/CVE-2022-41049.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644925, + "name": "CVE-2022-41049", + "full_name": "Live-Hack-CVE\/CVE-2022-41049", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41049", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41049 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:16Z", + "updated_at": "2022-12-23T20:22:16Z", + "pushed_at": "2022-12-23T20:22:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4105.json b/2022/CVE-2022-4105.json deleted file mode 100644 index bc15338e71..0000000000 --- a/2022/CVE-2022-4105.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562542, - "name": "CVE-2022-4105", - "full_name": "Live-Hack-CVE\/CVE-2022-4105", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4105", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4105 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:16Z", - "updated_at": "2022-12-23T14:59:16Z", - "pushed_at": "2022-12-23T14:59:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41050.json b/2022/CVE-2022-41050.json new file mode 100644 index 0000000000..df55bcecfa --- /dev/null +++ b/2022/CVE-2022-41050.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644935, + "name": "CVE-2022-41050", + "full_name": "Live-Hack-CVE\/CVE-2022-41050", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41050", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41050 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:20Z", + "updated_at": "2022-12-23T20:22:20Z", + "pushed_at": "2022-12-23T20:22:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41051.json b/2022/CVE-2022-41051.json new file mode 100644 index 0000000000..06b187fbf8 --- /dev/null +++ b/2022/CVE-2022-41051.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644973, + "name": "CVE-2022-41051", + "full_name": "Live-Hack-CVE\/CVE-2022-41051", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41051", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41051 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:33Z", + "updated_at": "2022-12-23T20:22:33Z", + "pushed_at": "2022-12-23T20:22:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41052.json b/2022/CVE-2022-41052.json new file mode 100644 index 0000000000..80f119c82b --- /dev/null +++ b/2022/CVE-2022-41052.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644953, + "name": "CVE-2022-41052", + "full_name": "Live-Hack-CVE\/CVE-2022-41052", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41052", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41052 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:27Z", + "updated_at": "2022-12-23T20:22:27Z", + "pushed_at": "2022-12-23T20:22:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41053.json b/2022/CVE-2022-41053.json new file mode 100644 index 0000000000..0f3940a956 --- /dev/null +++ b/2022/CVE-2022-41053.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644962, + "name": "CVE-2022-41053", + "full_name": "Live-Hack-CVE\/CVE-2022-41053", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41053", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41053 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:30Z", + "updated_at": "2022-12-23T20:22:30Z", + "pushed_at": "2022-12-23T20:22:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41054.json b/2022/CVE-2022-41054.json new file mode 100644 index 0000000000..3a326d19c0 --- /dev/null +++ b/2022/CVE-2022-41054.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645054, + "name": "CVE-2022-41054", + "full_name": "Live-Hack-CVE\/CVE-2022-41054", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41054", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41054 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:53Z", + "updated_at": "2022-12-23T20:22:54Z", + "pushed_at": "2022-12-23T20:22:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41055.json b/2022/CVE-2022-41055.json new file mode 100644 index 0000000000..2bf0acb5b6 --- /dev/null +++ b/2022/CVE-2022-41055.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646862, + "name": "CVE-2022-41055", + "full_name": "Live-Hack-CVE\/CVE-2022-41055", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41055", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41055 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:28Z", + "updated_at": "2022-12-23T20:31:28Z", + "pushed_at": "2022-12-23T20:31:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41056.json b/2022/CVE-2022-41056.json new file mode 100644 index 0000000000..8f7d4e0b6b --- /dev/null +++ b/2022/CVE-2022-41056.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646876, + "name": "CVE-2022-41056", + "full_name": "Live-Hack-CVE\/CVE-2022-41056", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41056", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41056 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:31Z", + "updated_at": "2022-12-23T20:31:31Z", + "pushed_at": "2022-12-23T20:31:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41058.json b/2022/CVE-2022-41058.json new file mode 100644 index 0000000000..eb83738695 --- /dev/null +++ b/2022/CVE-2022-41058.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646902, + "name": "CVE-2022-41058", + "full_name": "Live-Hack-CVE\/CVE-2022-41058", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41058", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41058 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:38Z", + "updated_at": "2022-12-23T20:31:38Z", + "pushed_at": "2022-12-23T20:31:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41060.json b/2022/CVE-2022-41060.json new file mode 100644 index 0000000000..7b5f7b32e8 --- /dev/null +++ b/2022/CVE-2022-41060.json @@ -0,0 +1,31 @@ +[ + { + "id": 581644983, + "name": "CVE-2022-41060", + "full_name": "Live-Hack-CVE\/CVE-2022-41060", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41060", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41060 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:37Z", + "updated_at": "2022-12-23T20:22:37Z", + "pushed_at": "2022-12-23T20:22:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41061.json b/2022/CVE-2022-41061.json new file mode 100644 index 0000000000..6758f900ea --- /dev/null +++ b/2022/CVE-2022-41061.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645141, + "name": "CVE-2022-41061", + "full_name": "Live-Hack-CVE\/CVE-2022-41061", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41061", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41061 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:21Z", + "updated_at": "2022-12-23T20:23:21Z", + "pushed_at": "2022-12-23T20:23:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41062.json b/2022/CVE-2022-41062.json new file mode 100644 index 0000000000..2ddbe43c30 --- /dev/null +++ b/2022/CVE-2022-41062.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645802, + "name": "CVE-2022-41062", + "full_name": "Live-Hack-CVE\/CVE-2022-41062", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41062", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41062 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:25Z", + "updated_at": "2022-12-23T20:26:25Z", + "pushed_at": "2022-12-23T20:26:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41063.json b/2022/CVE-2022-41063.json new file mode 100644 index 0000000000..d43d4007cd --- /dev/null +++ b/2022/CVE-2022-41063.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645812, + "name": "CVE-2022-41063", + "full_name": "Live-Hack-CVE\/CVE-2022-41063", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41063", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41063 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:29Z", + "updated_at": "2022-12-23T20:26:29Z", + "pushed_at": "2022-12-23T20:26:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41064.json b/2022/CVE-2022-41064.json deleted file mode 100644 index 764d6ec105..0000000000 --- a/2022/CVE-2022-41064.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538513, - "name": "CVE-2022-41064", - "full_name": "Live-Hack-CVE\/CVE-2022-41064", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41064", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41064 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:47Z", - "updated_at": "2022-12-23T13:37:47Z", - "pushed_at": "2022-12-23T13:37:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41066.json b/2022/CVE-2022-41066.json new file mode 100644 index 0000000000..887f54b73b --- /dev/null +++ b/2022/CVE-2022-41066.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646631, + "name": "CVE-2022-41066", + "full_name": "Live-Hack-CVE\/CVE-2022-41066", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41066", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41066 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:21Z", + "updated_at": "2022-12-23T20:30:21Z", + "pushed_at": "2022-12-23T20:30:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41073.json b/2022/CVE-2022-41073.json new file mode 100644 index 0000000000..6a107113bc --- /dev/null +++ b/2022/CVE-2022-41073.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645822, + "name": "CVE-2022-41073", + "full_name": "Live-Hack-CVE\/CVE-2022-41073", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41073", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41073 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:32Z", + "updated_at": "2022-12-23T20:26:32Z", + "pushed_at": "2022-12-23T20:26:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41080.json b/2022/CVE-2022-41080.json new file mode 100644 index 0000000000..2a8b355845 --- /dev/null +++ b/2022/CVE-2022-41080.json @@ -0,0 +1,60 @@ +[ + { + "id": 581654810, + "name": "CVE-2022-41080", + "full_name": "Live-Hack-CVE\/CVE-2022-41080", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41080", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41080 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:03Z", + "updated_at": "2022-12-23T21:11:03Z", + "pushed_at": "2022-12-23T21:11:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + }, + { + "id": 581681361, + "name": "CVE-2022-41080", + "full_name": "ohnonoyesyes\/CVE-2022-41080", + "owner": { + "login": "ohnonoyesyes", + "id": 93457304, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4", + "html_url": "https:\/\/github.com\/ohnonoyesyes" + }, + "html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2022-41080", + "description": null, + "fork": false, + "created_at": "2022-12-23T23:46:36Z", + "updated_at": "2022-12-23T23:46:36Z", + "pushed_at": "2022-12-23T23:55:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41085.json b/2022/CVE-2022-41085.json new file mode 100644 index 0000000000..7ca48f4775 --- /dev/null +++ b/2022/CVE-2022-41085.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645833, + "name": "CVE-2022-41085", + "full_name": "Live-Hack-CVE\/CVE-2022-41085", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41085", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41085 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:35Z", + "updated_at": "2022-12-23T20:26:35Z", + "pushed_at": "2022-12-23T20:26:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41086.json b/2022/CVE-2022-41086.json new file mode 100644 index 0000000000..4f013e26ec --- /dev/null +++ b/2022/CVE-2022-41086.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654399, + "name": "CVE-2022-41086", + "full_name": "Live-Hack-CVE\/CVE-2022-41086", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41086", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41086 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:12Z", + "updated_at": "2022-12-23T21:09:12Z", + "pushed_at": "2022-12-23T21:09:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41088.json b/2022/CVE-2022-41088.json new file mode 100644 index 0000000000..298accfc0a --- /dev/null +++ b/2022/CVE-2022-41088.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645856, + "name": "CVE-2022-41088", + "full_name": "Live-Hack-CVE\/CVE-2022-41088", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41088", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41088 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:42Z", + "updated_at": "2022-12-23T20:26:42Z", + "pushed_at": "2022-12-23T20:26:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41090.json b/2022/CVE-2022-41090.json new file mode 100644 index 0000000000..33be541fa3 --- /dev/null +++ b/2022/CVE-2022-41090.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645879, + "name": "CVE-2022-41090", + "full_name": "Live-Hack-CVE\/CVE-2022-41090", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41090", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41090 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:45Z", + "updated_at": "2022-12-23T20:26:45Z", + "pushed_at": "2022-12-23T20:26:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41091.json b/2022/CVE-2022-41091.json new file mode 100644 index 0000000000..f3e77c7065 --- /dev/null +++ b/2022/CVE-2022-41091.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645894, + "name": "CVE-2022-41091", + "full_name": "Live-Hack-CVE\/CVE-2022-41091", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41091", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41091 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:49Z", + "updated_at": "2022-12-23T20:26:49Z", + "pushed_at": "2022-12-23T20:26:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41092.json b/2022/CVE-2022-41092.json new file mode 100644 index 0000000000..ba8c4fb2ca --- /dev/null +++ b/2022/CVE-2022-41092.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645908, + "name": "CVE-2022-41092", + "full_name": "Live-Hack-CVE\/CVE-2022-41092", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41092", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41092 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:52Z", + "updated_at": "2022-12-23T20:26:52Z", + "pushed_at": "2022-12-23T20:26:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41093.json b/2022/CVE-2022-41093.json new file mode 100644 index 0000000000..c910d2a358 --- /dev/null +++ b/2022/CVE-2022-41093.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645918, + "name": "CVE-2022-41093", + "full_name": "Live-Hack-CVE\/CVE-2022-41093", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41093", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41093 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:56Z", + "updated_at": "2022-12-23T20:26:56Z", + "pushed_at": "2022-12-23T20:26:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41095.json b/2022/CVE-2022-41095.json new file mode 100644 index 0000000000..e70862e02a --- /dev/null +++ b/2022/CVE-2022-41095.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645929, + "name": "CVE-2022-41095", + "full_name": "Live-Hack-CVE\/CVE-2022-41095", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41095", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41095 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:59Z", + "updated_at": "2022-12-23T20:26:59Z", + "pushed_at": "2022-12-23T20:27:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41096.json b/2022/CVE-2022-41096.json new file mode 100644 index 0000000000..8d6edbcec5 --- /dev/null +++ b/2022/CVE-2022-41096.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645943, + "name": "CVE-2022-41096", + "full_name": "Live-Hack-CVE\/CVE-2022-41096", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41096", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41096 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:02Z", + "updated_at": "2022-12-23T20:27:02Z", + "pushed_at": "2022-12-23T20:27:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41097.json b/2022/CVE-2022-41097.json new file mode 100644 index 0000000000..e773a40f5d --- /dev/null +++ b/2022/CVE-2022-41097.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645292, + "name": "CVE-2022-41097", + "full_name": "Live-Hack-CVE\/CVE-2022-41097", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41097", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41097 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:58Z", + "updated_at": "2022-12-23T20:23:58Z", + "pushed_at": "2022-12-23T20:24:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41098.json b/2022/CVE-2022-41098.json new file mode 100644 index 0000000000..ea204fed5b --- /dev/null +++ b/2022/CVE-2022-41098.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645954, + "name": "CVE-2022-41098", + "full_name": "Live-Hack-CVE\/CVE-2022-41098", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41098", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41098 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:06Z", + "updated_at": "2022-12-23T20:27:06Z", + "pushed_at": "2022-12-23T20:27:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41099.json b/2022/CVE-2022-41099.json new file mode 100644 index 0000000000..7a865c7532 --- /dev/null +++ b/2022/CVE-2022-41099.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645968, + "name": "CVE-2022-41099", + "full_name": "Live-Hack-CVE\/CVE-2022-41099", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41099", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41099 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:27:10Z", + "updated_at": "2022-12-23T20:27:10Z", + "pushed_at": "2022-12-23T20:27:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41100.json b/2022/CVE-2022-41100.json new file mode 100644 index 0000000000..971e3a2f79 --- /dev/null +++ b/2022/CVE-2022-41100.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645134, + "name": "CVE-2022-41100", + "full_name": "Live-Hack-CVE\/CVE-2022-41100", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41100", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41100 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:18Z", + "updated_at": "2022-12-23T20:23:18Z", + "pushed_at": "2022-12-23T20:23:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41101.json b/2022/CVE-2022-41101.json new file mode 100644 index 0000000000..ea7d92f69c --- /dev/null +++ b/2022/CVE-2022-41101.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645105, + "name": "CVE-2022-41101", + "full_name": "Live-Hack-CVE\/CVE-2022-41101", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41101", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41101 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:11Z", + "updated_at": "2022-12-23T20:23:11Z", + "pushed_at": "2022-12-23T20:23:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41102.json b/2022/CVE-2022-41102.json new file mode 100644 index 0000000000..898487078b --- /dev/null +++ b/2022/CVE-2022-41102.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645397, + "name": "CVE-2022-41102", + "full_name": "Live-Hack-CVE\/CVE-2022-41102", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41102", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41102 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:31Z", + "updated_at": "2022-12-23T20:24:31Z", + "pushed_at": "2022-12-23T20:24:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41103.json b/2022/CVE-2022-41103.json new file mode 100644 index 0000000000..1c06f3b1d8 --- /dev/null +++ b/2022/CVE-2022-41103.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645327, + "name": "CVE-2022-41103", + "full_name": "Live-Hack-CVE\/CVE-2022-41103", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41103", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41103 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:24:11Z", + "updated_at": "2022-12-23T20:24:11Z", + "pushed_at": "2022-12-23T20:24:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41104.json b/2022/CVE-2022-41104.json new file mode 100644 index 0000000000..86d5b93963 --- /dev/null +++ b/2022/CVE-2022-41104.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646639, + "name": "CVE-2022-41104", + "full_name": "Live-Hack-CVE\/CVE-2022-41104", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41104", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41104 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:24Z", + "updated_at": "2022-12-23T20:30:24Z", + "pushed_at": "2022-12-23T20:30:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41105.json b/2022/CVE-2022-41105.json new file mode 100644 index 0000000000..f1c04c00c6 --- /dev/null +++ b/2022/CVE-2022-41105.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646717, + "name": "CVE-2022-41105", + "full_name": "Live-Hack-CVE\/CVE-2022-41105", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41105", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41105 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:30:43Z", + "updated_at": "2022-12-23T20:30:43Z", + "pushed_at": "2022-12-23T20:30:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41106.json b/2022/CVE-2022-41106.json new file mode 100644 index 0000000000..9f370472c9 --- /dev/null +++ b/2022/CVE-2022-41106.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637616, + "name": "CVE-2022-41106", + "full_name": "Live-Hack-CVE\/CVE-2022-41106", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41106", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41106 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:13Z", + "updated_at": "2022-12-23T19:48:56Z", + "pushed_at": "2022-12-23T19:48:15Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41107.json b/2022/CVE-2022-41107.json new file mode 100644 index 0000000000..a1686bf89a --- /dev/null +++ b/2022/CVE-2022-41107.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646829, + "name": "CVE-2022-41107", + "full_name": "Live-Hack-CVE\/CVE-2022-41107", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41107", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41107 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:21Z", + "updated_at": "2022-12-23T20:31:21Z", + "pushed_at": "2022-12-23T20:31:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41109.json b/2022/CVE-2022-41109.json new file mode 100644 index 0000000000..5d316e3fcf --- /dev/null +++ b/2022/CVE-2022-41109.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645045, + "name": "CVE-2022-41109", + "full_name": "Live-Hack-CVE\/CVE-2022-41109", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41109", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41109 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:22:50Z", + "updated_at": "2022-12-23T20:22:50Z", + "pushed_at": "2022-12-23T20:22:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4111.json b/2022/CVE-2022-4111.json deleted file mode 100644 index 61461c67a0..0000000000 --- a/2022/CVE-2022-4111.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560858, - "name": "CVE-2022-4111", - "full_name": "Live-Hack-CVE\/CVE-2022-4111", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4111", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4111 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:53Z", - "updated_at": "2022-12-23T14:53:53Z", - "pushed_at": "2022-12-23T14:53:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41113.json b/2022/CVE-2022-41113.json new file mode 100644 index 0000000000..8fb55b2904 --- /dev/null +++ b/2022/CVE-2022-41113.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645095, + "name": "CVE-2022-41113", + "full_name": "Live-Hack-CVE\/CVE-2022-41113", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41113", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41113 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:08Z", + "updated_at": "2022-12-23T20:23:08Z", + "pushed_at": "2022-12-23T20:23:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41114.json b/2022/CVE-2022-41114.json new file mode 100644 index 0000000000..acd715d523 --- /dev/null +++ b/2022/CVE-2022-41114.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645083, + "name": "CVE-2022-41114", + "full_name": "Live-Hack-CVE\/CVE-2022-41114", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41114", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41114 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:04Z", + "updated_at": "2022-12-23T20:23:04Z", + "pushed_at": "2022-12-23T20:23:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41116.json b/2022/CVE-2022-41116.json new file mode 100644 index 0000000000..b2d8ce2860 --- /dev/null +++ b/2022/CVE-2022-41116.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645075, + "name": "CVE-2022-41116", + "full_name": "Live-Hack-CVE\/CVE-2022-41116", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41116", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41116 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:00Z", + "updated_at": "2022-12-23T20:23:00Z", + "pushed_at": "2022-12-23T20:23:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41118.json b/2022/CVE-2022-41118.json new file mode 100644 index 0000000000..f45310a807 --- /dev/null +++ b/2022/CVE-2022-41118.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646890, + "name": "CVE-2022-41118", + "full_name": "Live-Hack-CVE\/CVE-2022-41118", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41118", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41118 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:35Z", + "updated_at": "2022-12-23T20:31:35Z", + "pushed_at": "2022-12-23T20:31:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41119.json b/2022/CVE-2022-41119.json new file mode 100644 index 0000000000..3431f0face --- /dev/null +++ b/2022/CVE-2022-41119.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646845, + "name": "CVE-2022-41119", + "full_name": "Live-Hack-CVE\/CVE-2022-41119", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41119", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41119 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:24Z", + "updated_at": "2022-12-23T20:31:24Z", + "pushed_at": "2022-12-23T20:31:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41120.json b/2022/CVE-2022-41120.json new file mode 100644 index 0000000000..6eacb218d9 --- /dev/null +++ b/2022/CVE-2022-41120.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637528, + "name": "CVE-2022-41120", + "full_name": "Live-Hack-CVE\/CVE-2022-41120", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41120", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41120 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:47:49Z", + "updated_at": "2022-12-23T19:47:49Z", + "pushed_at": "2022-12-23T19:47:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41122.json b/2022/CVE-2022-41122.json new file mode 100644 index 0000000000..b615e6ac3a --- /dev/null +++ b/2022/CVE-2022-41122.json @@ -0,0 +1,31 @@ +[ + { + "id": 581646816, + "name": "CVE-2022-41122", + "full_name": "Live-Hack-CVE\/CVE-2022-41122", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41122", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41122 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:31:17Z", + "updated_at": "2022-12-23T20:31:17Z", + "pushed_at": "2022-12-23T20:31:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41123.json b/2022/CVE-2022-41123.json new file mode 100644 index 0000000000..9d0ea25630 --- /dev/null +++ b/2022/CVE-2022-41123.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654817, + "name": "CVE-2022-41123", + "full_name": "Live-Hack-CVE\/CVE-2022-41123", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41123", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41123 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:06Z", + "updated_at": "2022-12-23T21:11:06Z", + "pushed_at": "2022-12-23T21:11:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41125.json b/2022/CVE-2022-41125.json new file mode 100644 index 0000000000..f5146a5206 --- /dev/null +++ b/2022/CVE-2022-41125.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654854, + "name": "CVE-2022-41125", + "full_name": "Live-Hack-CVE\/CVE-2022-41125", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41125", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41125 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:19Z", + "updated_at": "2022-12-23T21:11:19Z", + "pushed_at": "2022-12-23T21:11:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41128.json b/2022/CVE-2022-41128.json new file mode 100644 index 0000000000..ae6975e097 --- /dev/null +++ b/2022/CVE-2022-41128.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654407, + "name": "CVE-2022-41128", + "full_name": "Live-Hack-CVE\/CVE-2022-41128", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41128", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41128 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:15Z", + "updated_at": "2022-12-23T21:09:15Z", + "pushed_at": "2022-12-23T21:09:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41131.json b/2022/CVE-2022-41131.json deleted file mode 100644 index 18f31e5415..0000000000 --- a/2022/CVE-2022-41131.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550480, - "name": "CVE-2022-41131", - "full_name": "Live-Hack-CVE\/CVE-2022-41131", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41131", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41131 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:02Z", - "updated_at": "2022-12-23T14:19:02Z", - "pushed_at": "2022-12-23T14:19:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41132.json b/2022/CVE-2022-41132.json deleted file mode 100644 index 8b84225039..0000000000 --- a/2022/CVE-2022-41132.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575213, - "name": "CVE-2022-41132", - "full_name": "Live-Hack-CVE\/CVE-2022-41132", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41132", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41132 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:07Z", - "updated_at": "2022-12-23T15:43:07Z", - "pushed_at": "2022-12-23T15:43:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41135.json b/2022/CVE-2022-41135.json deleted file mode 100644 index 56dd45e70f..0000000000 --- a/2022/CVE-2022-41135.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561979, - "name": "CVE-2022-41135", - "full_name": "Live-Hack-CVE\/CVE-2022-41135", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41135", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41135 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:33Z", - "updated_at": "2022-12-23T14:57:33Z", - "pushed_at": "2022-12-23T14:57:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41136.json b/2022/CVE-2022-41136.json new file mode 100644 index 0000000000..3d084bdbdf --- /dev/null +++ b/2022/CVE-2022-41136.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663105, + "name": "CVE-2022-41136", + "full_name": "Live-Hack-CVE\/CVE-2022-41136", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41136", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41136 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:47Z", + "updated_at": "2022-12-23T21:54:47Z", + "pushed_at": "2022-12-23T21:54:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41155.json b/2022/CVE-2022-41155.json deleted file mode 100644 index 87e90ba258..0000000000 --- a/2022/CVE-2022-41155.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572717, - "name": "CVE-2022-41155", - "full_name": "Live-Hack-CVE\/CVE-2022-41155", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41155", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41155 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:41Z", - "updated_at": "2022-12-23T15:34:41Z", - "pushed_at": "2022-12-23T15:34:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41156.json b/2022/CVE-2022-41156.json deleted file mode 100644 index 333722d808..0000000000 --- a/2022/CVE-2022-41156.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524482, - "name": "CVE-2022-41156", - "full_name": "Live-Hack-CVE\/CVE-2022-41156", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41156", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41156 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:19Z", - "updated_at": "2022-12-23T12:48:19Z", - "pushed_at": "2022-12-23T12:48:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41157.json b/2022/CVE-2022-41157.json deleted file mode 100644 index 0b527e2817..0000000000 --- a/2022/CVE-2022-41157.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524491, - "name": "CVE-2022-41157", - "full_name": "Live-Hack-CVE\/CVE-2022-41157", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41157", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41157 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:22Z", - "updated_at": "2022-12-23T12:48:22Z", - "pushed_at": "2022-12-23T12:48:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41158.json b/2022/CVE-2022-41158.json deleted file mode 100644 index 61270f794a..0000000000 --- a/2022/CVE-2022-41158.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525294, - "name": "CVE-2022-41158", - "full_name": "Live-Hack-CVE\/CVE-2022-41158", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41158", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41158 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:12Z", - "updated_at": "2022-12-23T12:51:12Z", - "pushed_at": "2022-12-23T12:51:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41203.json b/2022/CVE-2022-41203.json new file mode 100644 index 0000000000..a2d38accbf --- /dev/null +++ b/2022/CVE-2022-41203.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662758, + "name": "CVE-2022-41203", + "full_name": "Live-Hack-CVE\/CVE-2022-41203", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41203", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41203 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:47Z", + "updated_at": "2022-12-23T21:52:47Z", + "pushed_at": "2022-12-23T21:52:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41207.json b/2022/CVE-2022-41207.json new file mode 100644 index 0000000000..7e47434157 --- /dev/null +++ b/2022/CVE-2022-41207.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662791, + "name": "CVE-2022-41207", + "full_name": "Live-Hack-CVE\/CVE-2022-41207", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41207", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41207 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:52:57Z", + "updated_at": "2022-12-23T21:52:57Z", + "pushed_at": "2022-12-23T21:52:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41212.json b/2022/CVE-2022-41212.json new file mode 100644 index 0000000000..275277c31b --- /dev/null +++ b/2022/CVE-2022-41212.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662802, + "name": "CVE-2022-41212", + "full_name": "Live-Hack-CVE\/CVE-2022-41212", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41212", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41212 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:03Z", + "updated_at": "2022-12-23T21:53:03Z", + "pushed_at": "2022-12-23T21:53:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41222.json b/2022/CVE-2022-41222.json new file mode 100644 index 0000000000..49ef9e3a8f --- /dev/null +++ b/2022/CVE-2022-41222.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676547, + "name": "CVE-2022-41222", + "full_name": "Live-Hack-CVE\/CVE-2022-41222", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41222", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41222 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:13Z", + "updated_at": "2022-12-23T23:14:13Z", + "pushed_at": "2022-12-23T23:14:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41223.json b/2022/CVE-2022-41223.json deleted file mode 100644 index 67a844d5b2..0000000000 --- a/2022/CVE-2022-41223.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560944, - "name": "CVE-2022-41223", - "full_name": "Live-Hack-CVE\/CVE-2022-41223", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41223", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41223 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:10Z", - "updated_at": "2022-12-23T14:54:10Z", - "pushed_at": "2022-12-23T14:54:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41235.json b/2022/CVE-2022-41235.json deleted file mode 100644 index d104b524a3..0000000000 --- a/2022/CVE-2022-41235.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538679, - "name": "CVE-2022-41235", - "full_name": "Live-Hack-CVE\/CVE-2022-41235", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41235", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41235 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:18Z", - "updated_at": "2022-12-23T13:38:18Z", - "pushed_at": "2022-12-23T13:38:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41259.json b/2022/CVE-2022-41259.json new file mode 100644 index 0000000000..72c5af8372 --- /dev/null +++ b/2022/CVE-2022-41259.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662813, + "name": "CVE-2022-41259", + "full_name": "Live-Hack-CVE\/CVE-2022-41259", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41259", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41259 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:53:07Z", + "updated_at": "2022-12-23T21:53:07Z", + "pushed_at": "2022-12-23T21:53:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4127.json b/2022/CVE-2022-4127.json deleted file mode 100644 index d9532cee6c..0000000000 --- a/2022/CVE-2022-4127.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524584, - "name": "CVE-2022-4127", - "full_name": "Live-Hack-CVE\/CVE-2022-4127", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4127", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4127 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:39Z", - "updated_at": "2022-12-23T12:48:39Z", - "pushed_at": "2022-12-23T12:48:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4128.json b/2022/CVE-2022-4128.json deleted file mode 100644 index bcecebe6cb..0000000000 --- a/2022/CVE-2022-4128.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524699, - "name": "CVE-2022-4128", - "full_name": "Live-Hack-CVE\/CVE-2022-4128", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4128", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4128 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:04Z", - "updated_at": "2022-12-23T12:49:04Z", - "pushed_at": "2022-12-23T12:49:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41315.json b/2022/CVE-2022-41315.json deleted file mode 100644 index 7bd9c75f70..0000000000 --- a/2022/CVE-2022-41315.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575226, - "name": "CVE-2022-41315", - "full_name": "Live-Hack-CVE\/CVE-2022-41315", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41315", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41315 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:11Z", - "updated_at": "2022-12-23T15:43:11Z", - "pushed_at": "2022-12-23T15:43:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41319.json b/2022/CVE-2022-41319.json deleted file mode 100644 index cf99d525fd..0000000000 --- a/2022/CVE-2022-41319.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584531, - "name": "CVE-2022-41319", - "full_name": "Live-Hack-CVE\/CVE-2022-41319", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41319", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41319 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:38Z", - "updated_at": "2022-12-23T16:17:38Z", - "pushed_at": "2022-12-23T16:17:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41323.json b/2022/CVE-2022-41323.json deleted file mode 100644 index a772b07170..0000000000 --- a/2022/CVE-2022-41323.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537181, - "name": "CVE-2022-41323", - "full_name": "Live-Hack-CVE\/CVE-2022-41323", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41323", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41323 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:33:18Z", - "updated_at": "2022-12-23T13:33:18Z", - "pushed_at": "2022-12-23T13:33:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41326.json b/2022/CVE-2022-41326.json deleted file mode 100644 index 3e2600a3a3..0000000000 --- a/2022/CVE-2022-41326.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560882, - "name": "CVE-2022-41326", - "full_name": "Live-Hack-CVE\/CVE-2022-41326", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41326", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41326 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:00Z", - "updated_at": "2022-12-23T14:54:00Z", - "pushed_at": "2022-12-23T14:54:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41339.json b/2022/CVE-2022-41339.json new file mode 100644 index 0000000000..92d8b077d4 --- /dev/null +++ b/2022/CVE-2022-41339.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628353, + "name": "CVE-2022-41339", + "full_name": "Live-Hack-CVE\/CVE-2022-41339", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41339", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41339 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:00Z", + "updated_at": "2022-12-23T19:07:01Z", + "pushed_at": "2022-12-23T19:07:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41343.json b/2022/CVE-2022-41343.json deleted file mode 100644 index c4559bec71..0000000000 --- a/2022/CVE-2022-41343.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584753, - "name": "CVE-2022-41343", - "full_name": "Live-Hack-CVE\/CVE-2022-41343", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41343", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41343 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:18:26Z", - "updated_at": "2022-12-23T16:18:26Z", - "pushed_at": "2022-12-23T16:18:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-4135.json b/2022/CVE-2022-4135.json deleted file mode 100644 index 063abc9ea8..0000000000 --- a/2022/CVE-2022-4135.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537622, - "name": "CVE-2022-4135", - "full_name": "Live-Hack-CVE\/CVE-2022-4135", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4135", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4135 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:44Z", - "updated_at": "2022-12-23T13:34:44Z", - "pushed_at": "2022-12-23T13:34:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41352.json b/2022/CVE-2022-41352.json new file mode 100644 index 0000000000..801c613f14 --- /dev/null +++ b/2022/CVE-2022-41352.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661738, + "name": "CVE-2022-41352", + "full_name": "Live-Hack-CVE\/CVE-2022-41352", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41352", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41352 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:38Z", + "updated_at": "2022-12-23T21:47:38Z", + "pushed_at": "2022-12-23T21:47:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-4136.json b/2022/CVE-2022-4136.json deleted file mode 100644 index 5b8c3d5a28..0000000000 --- a/2022/CVE-2022-4136.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526686, - "name": "CVE-2022-4136", - "full_name": "Live-Hack-CVE\/CVE-2022-4136", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-4136", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-4136 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:19Z", - "updated_at": "2022-12-23T12:56:19Z", - "pushed_at": "2022-12-23T12:56:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41392.json b/2022/CVE-2022-41392.json new file mode 100644 index 0000000000..d4c422d2aa --- /dev/null +++ b/2022/CVE-2022-41392.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682224, + "name": "CVE-2022-41392", + "full_name": "Live-Hack-CVE\/CVE-2022-41392", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41392", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41392 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:21Z", + "updated_at": "2022-12-23T23:52:21Z", + "pushed_at": "2022-12-23T23:52:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41395.json b/2022/CVE-2022-41395.json deleted file mode 100644 index acfb208112..0000000000 --- a/2022/CVE-2022-41395.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536000, - "name": "CVE-2022-41395", - "full_name": "Live-Hack-CVE\/CVE-2022-41395", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41395", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41395 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:19Z", - "updated_at": "2022-12-23T13:29:20Z", - "pushed_at": "2022-12-23T13:29:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41396.json b/2022/CVE-2022-41396.json deleted file mode 100644 index 9cb2a94c0c..0000000000 --- a/2022/CVE-2022-41396.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536022, - "name": "CVE-2022-41396", - "full_name": "Live-Hack-CVE\/CVE-2022-41396", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41396", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41396 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:24Z", - "updated_at": "2022-12-23T13:29:24Z", - "pushed_at": "2022-12-23T13:29:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41404.json b/2022/CVE-2022-41404.json deleted file mode 100644 index 4b6b909bb9..0000000000 --- a/2022/CVE-2022-41404.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537195, - "name": "CVE-2022-41404", - "full_name": "Live-Hack-CVE\/CVE-2022-41404", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41404", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41404 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:33:22Z", - "updated_at": "2022-12-23T13:33:22Z", - "pushed_at": "2022-12-23T13:33:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41432.json b/2022/CVE-2022-41432.json new file mode 100644 index 0000000000..e24de35ace --- /dev/null +++ b/2022/CVE-2022-41432.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669981, + "name": "CVE-2022-41432", + "full_name": "Live-Hack-CVE\/CVE-2022-41432", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41432", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41432 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:51Z", + "updated_at": "2022-12-23T22:33:51Z", + "pushed_at": "2022-12-23T22:33:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41433.json b/2022/CVE-2022-41433.json new file mode 100644 index 0000000000..066bd79fa6 --- /dev/null +++ b/2022/CVE-2022-41433.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669993, + "name": "CVE-2022-41433", + "full_name": "Live-Hack-CVE\/CVE-2022-41433", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41433", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41433 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:54Z", + "updated_at": "2022-12-23T22:33:54Z", + "pushed_at": "2022-12-23T22:33:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41434.json b/2022/CVE-2022-41434.json new file mode 100644 index 0000000000..c8f7cfa943 --- /dev/null +++ b/2022/CVE-2022-41434.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670006, + "name": "CVE-2022-41434", + "full_name": "Live-Hack-CVE\/CVE-2022-41434", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41434", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41434 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:57Z", + "updated_at": "2022-12-23T22:33:57Z", + "pushed_at": "2022-12-23T22:34:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41435.json b/2022/CVE-2022-41435.json new file mode 100644 index 0000000000..69321ff410 --- /dev/null +++ b/2022/CVE-2022-41435.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683285, + "name": "CVE-2022-41435", + "full_name": "Live-Hack-CVE\/CVE-2022-41435", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41435", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41435 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:09Z", + "updated_at": "2022-12-23T23:59:09Z", + "pushed_at": "2022-12-23T23:59:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41445.json b/2022/CVE-2022-41445.json deleted file mode 100644 index 832c98ab65..0000000000 --- a/2022/CVE-2022-41445.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562155, - "name": "CVE-2022-41445", - "full_name": "Live-Hack-CVE\/CVE-2022-41445", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41445", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41445 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:03Z", - "updated_at": "2022-12-23T14:58:03Z", - "pushed_at": "2022-12-23T14:58:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41446.json b/2022/CVE-2022-41446.json deleted file mode 100644 index 5f55922412..0000000000 --- a/2022/CVE-2022-41446.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549258, - "name": "CVE-2022-41446", - "full_name": "Live-Hack-CVE\/CVE-2022-41446", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41446", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41446 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:13Z", - "updated_at": "2022-12-23T14:15:13Z", - "pushed_at": "2022-12-23T14:15:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41483.json b/2022/CVE-2022-41483.json new file mode 100644 index 0000000000..12f3fa8db7 --- /dev/null +++ b/2022/CVE-2022-41483.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682102, + "name": "CVE-2022-41483", + "full_name": "Live-Hack-CVE\/CVE-2022-41483", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41483", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41483 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:35Z", + "updated_at": "2022-12-23T23:51:35Z", + "pushed_at": "2022-12-23T23:51:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41558.json b/2022/CVE-2022-41558.json deleted file mode 100644 index 6cccb55b36..0000000000 --- a/2022/CVE-2022-41558.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594800, - "name": "CVE-2022-41558", - "full_name": "Live-Hack-CVE\/CVE-2022-41558", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41558", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41558 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:58Z", - "updated_at": "2022-12-23T16:55:58Z", - "pushed_at": "2022-12-23T16:56:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41607.json b/2022/CVE-2022-41607.json new file mode 100644 index 0000000000..80ec33ac0d --- /dev/null +++ b/2022/CVE-2022-41607.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636175, + "name": "CVE-2022-41607", + "full_name": "Live-Hack-CVE\/CVE-2022-41607", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41607", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41607 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:42:38Z", + "updated_at": "2022-12-23T19:42:38Z", + "pushed_at": "2022-12-23T19:42:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41609.json b/2022/CVE-2022-41609.json deleted file mode 100644 index 08ec0d4482..0000000000 --- a/2022/CVE-2022-41609.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586380, - "name": "CVE-2022-41609", - "full_name": "Live-Hack-CVE\/CVE-2022-41609", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41609", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41609 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:14Z", - "updated_at": "2022-12-23T16:24:14Z", - "pushed_at": "2022-12-23T16:24:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41611.json b/2022/CVE-2022-41611.json new file mode 100644 index 0000000000..6b30fe7776 --- /dev/null +++ b/2022/CVE-2022-41611.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627054, + "name": "CVE-2022-41611", + "full_name": "Live-Hack-CVE\/CVE-2022-41611", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41611", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41611 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:33Z", + "updated_at": "2022-12-23T19:01:33Z", + "pushed_at": "2022-12-23T19:01:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41615.json b/2022/CVE-2022-41615.json deleted file mode 100644 index 52679bd6aa..0000000000 --- a/2022/CVE-2022-41615.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561942, - "name": "CVE-2022-41615", - "full_name": "Live-Hack-CVE\/CVE-2022-41615", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41615", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41615 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:26Z", - "updated_at": "2022-12-23T14:57:26Z", - "pushed_at": "2022-12-23T14:57:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41618.json b/2022/CVE-2022-41618.json deleted file mode 100644 index 37d0704d47..0000000000 --- a/2022/CVE-2022-41618.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549073, - "name": "CVE-2022-41618", - "full_name": "Live-Hack-CVE\/CVE-2022-41618", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41618", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41618 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:38Z", - "updated_at": "2022-12-23T14:14:38Z", - "pushed_at": "2022-12-23T14:14:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41634.json b/2022/CVE-2022-41634.json deleted file mode 100644 index b4f8eb34c8..0000000000 --- a/2022/CVE-2022-41634.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562628, - "name": "CVE-2022-41634", - "full_name": "Live-Hack-CVE\/CVE-2022-41634", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41634", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41634 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:36Z", - "updated_at": "2022-12-23T14:59:36Z", - "pushed_at": "2022-12-23T14:59:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41643.json b/2022/CVE-2022-41643.json deleted file mode 100644 index 80f75343bf..0000000000 --- a/2022/CVE-2022-41643.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562707, - "name": "CVE-2022-41643", - "full_name": "Live-Hack-CVE\/CVE-2022-41643", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41643", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41643 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:53Z", - "updated_at": "2022-12-23T14:59:53Z", - "pushed_at": "2022-12-23T14:59:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41652.json b/2022/CVE-2022-41652.json deleted file mode 100644 index a6083c50cf..0000000000 --- a/2022/CVE-2022-41652.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585351, - "name": "CVE-2022-41652", - "full_name": "Live-Hack-CVE\/CVE-2022-41652", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41652", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41652 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:42Z", - "updated_at": "2022-12-23T16:20:42Z", - "pushed_at": "2022-12-23T16:20:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41655.json b/2022/CVE-2022-41655.json deleted file mode 100644 index 82a2bf3ed2..0000000000 --- a/2022/CVE-2022-41655.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562722, - "name": "CVE-2022-41655", - "full_name": "Live-Hack-CVE\/CVE-2022-41655", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41655", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41655 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:56Z", - "updated_at": "2022-12-23T14:59:56Z", - "pushed_at": "2022-12-23T14:59:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41666.json b/2022/CVE-2022-41666.json new file mode 100644 index 0000000000..782e61b6a7 --- /dev/null +++ b/2022/CVE-2022-41666.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681910, + "name": "CVE-2022-41666", + "full_name": "Live-Hack-CVE\/CVE-2022-41666", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41666", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41666 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:31Z", + "updated_at": "2022-12-23T23:50:31Z", + "pushed_at": "2022-12-23T23:50:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41667.json b/2022/CVE-2022-41667.json new file mode 100644 index 0000000000..84aa2c9017 --- /dev/null +++ b/2022/CVE-2022-41667.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681893, + "name": "CVE-2022-41667", + "full_name": "Live-Hack-CVE\/CVE-2022-41667", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41667", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41667 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:24Z", + "updated_at": "2022-12-23T23:50:24Z", + "pushed_at": "2022-12-23T23:50:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41668.json b/2022/CVE-2022-41668.json new file mode 100644 index 0000000000..6f3e8235c6 --- /dev/null +++ b/2022/CVE-2022-41668.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681899, + "name": "CVE-2022-41668", + "full_name": "Live-Hack-CVE\/CVE-2022-41668", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41668", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41668 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:27Z", + "updated_at": "2022-12-23T23:50:27Z", + "pushed_at": "2022-12-23T23:50:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41669.json b/2022/CVE-2022-41669.json new file mode 100644 index 0000000000..024de11a7e --- /dev/null +++ b/2022/CVE-2022-41669.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669723, + "name": "CVE-2022-41669", + "full_name": "Live-Hack-CVE\/CVE-2022-41669", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41669", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41669 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:33Z", + "updated_at": "2022-12-23T22:32:33Z", + "pushed_at": "2022-12-23T22:32:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41670.json b/2022/CVE-2022-41670.json new file mode 100644 index 0000000000..ff8573c138 --- /dev/null +++ b/2022/CVE-2022-41670.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669717, + "name": "CVE-2022-41670", + "full_name": "Live-Hack-CVE\/CVE-2022-41670", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41670", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41670 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:30Z", + "updated_at": "2022-12-23T22:32:30Z", + "pushed_at": "2022-12-23T22:32:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41671.json b/2022/CVE-2022-41671.json new file mode 100644 index 0000000000..a70c516996 --- /dev/null +++ b/2022/CVE-2022-41671.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669699, + "name": "CVE-2022-41671", + "full_name": "Live-Hack-CVE\/CVE-2022-41671", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41671", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41671 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:26Z", + "updated_at": "2022-12-23T22:32:27Z", + "pushed_at": "2022-12-23T22:32:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41674.json b/2022/CVE-2022-41674.json deleted file mode 100644 index 3537aceda0..0000000000 --- a/2022/CVE-2022-41674.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584978, - "name": "CVE-2022-41674", - "full_name": "Live-Hack-CVE\/CVE-2022-41674", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41674", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41674 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:18Z", - "updated_at": "2022-12-23T16:19:18Z", - "pushed_at": "2022-12-23T16:19:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41675.json b/2022/CVE-2022-41675.json deleted file mode 100644 index 82d16f1040..0000000000 --- a/2022/CVE-2022-41675.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525183, - "name": "CVE-2022-41675", - "full_name": "Live-Hack-CVE\/CVE-2022-41675", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41675", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41675 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:55Z", - "updated_at": "2022-12-23T12:50:55Z", - "pushed_at": "2022-12-23T12:50:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41676.json b/2022/CVE-2022-41676.json deleted file mode 100644 index 53ed0a3811..0000000000 --- a/2022/CVE-2022-41676.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525319, - "name": "CVE-2022-41676", - "full_name": "Live-Hack-CVE\/CVE-2022-41676", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41676", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41676 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:15Z", - "updated_at": "2022-12-23T12:51:15Z", - "pushed_at": "2022-12-23T12:51:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41685.json b/2022/CVE-2022-41685.json deleted file mode 100644 index d4289681e1..0000000000 --- a/2022/CVE-2022-41685.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563001, - "name": "CVE-2022-41685", - "full_name": "Live-Hack-CVE\/CVE-2022-41685", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41685", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41685 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:47Z", - "updated_at": "2022-12-23T15:00:47Z", - "pushed_at": "2022-12-23T15:00:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41692.json b/2022/CVE-2022-41692.json deleted file mode 100644 index 99e5b21f26..0000000000 --- a/2022/CVE-2022-41692.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585369, - "name": "CVE-2022-41692", - "full_name": "Live-Hack-CVE\/CVE-2022-41692", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41692", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41692 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:45Z", - "updated_at": "2022-12-23T16:20:45Z", - "pushed_at": "2022-12-23T16:20:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41705.json b/2022/CVE-2022-41705.json deleted file mode 100644 index 0103cfc83b..0000000000 --- a/2022/CVE-2022-41705.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527033, - "name": "CVE-2022-41705", - "full_name": "Live-Hack-CVE\/CVE-2022-41705", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41705", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41705 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:41Z", - "updated_at": "2022-12-23T12:57:41Z", - "pushed_at": "2022-12-23T12:57:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41706.json b/2022/CVE-2022-41706.json deleted file mode 100644 index 2ed129a83a..0000000000 --- a/2022/CVE-2022-41706.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525199, - "name": "CVE-2022-41706", - "full_name": "Live-Hack-CVE\/CVE-2022-41706", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41706", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41706 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:58Z", - "updated_at": "2022-12-23T12:50:58Z", - "pushed_at": "2022-12-23T12:51:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41710.json b/2022/CVE-2022-41710.json new file mode 100644 index 0000000000..7e0c559360 --- /dev/null +++ b/2022/CVE-2022-41710.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683112, + "name": "CVE-2022-41710", + "full_name": "Live-Hack-CVE\/CVE-2022-41710", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41710", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41710 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:53Z", + "updated_at": "2022-12-23T23:57:53Z", + "pushed_at": "2022-12-23T23:57:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41712.json b/2022/CVE-2022-41712.json deleted file mode 100644 index 8e3aceb902..0000000000 --- a/2022/CVE-2022-41712.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527158, - "name": "CVE-2022-41712", - "full_name": "Live-Hack-CVE\/CVE-2022-41712", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41712", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41712 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:58:07Z", - "updated_at": "2022-12-23T12:58:07Z", - "pushed_at": "2022-12-23T12:58:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41713.json b/2022/CVE-2022-41713.json new file mode 100644 index 0000000000..2ac0c8e5ca --- /dev/null +++ b/2022/CVE-2022-41713.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681952, + "name": "CVE-2022-41713", + "full_name": "Live-Hack-CVE\/CVE-2022-41713", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41713", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41713 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:47Z", + "updated_at": "2022-12-23T23:50:47Z", + "pushed_at": "2022-12-23T23:50:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41714.json b/2022/CVE-2022-41714.json new file mode 100644 index 0000000000..ca54f4bb74 --- /dev/null +++ b/2022/CVE-2022-41714.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682047, + "name": "CVE-2022-41714", + "full_name": "Live-Hack-CVE\/CVE-2022-41714", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41714", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41714 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:19Z", + "updated_at": "2022-12-23T23:51:19Z", + "pushed_at": "2022-12-23T23:51:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41716.json b/2022/CVE-2022-41716.json new file mode 100644 index 0000000000..377dec4dd3 --- /dev/null +++ b/2022/CVE-2022-41716.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683321, + "name": "CVE-2022-41716", + "full_name": "Live-Hack-CVE\/CVE-2022-41716", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41716", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41716 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:25Z", + "updated_at": "2022-12-23T23:59:25Z", + "pushed_at": "2022-12-23T23:59:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41719.json b/2022/CVE-2022-41719.json new file mode 100644 index 0000000000..9aedac5190 --- /dev/null +++ b/2022/CVE-2022-41719.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637814, + "name": "CVE-2022-41719", + "full_name": "Live-Hack-CVE\/CVE-2022-41719", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41719", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41719 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:10Z", + "updated_at": "2022-12-23T19:49:10Z", + "pushed_at": "2022-12-23T19:49:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41742.json b/2022/CVE-2022-41742.json deleted file mode 100644 index a4ca98e622..0000000000 --- a/2022/CVE-2022-41742.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572793, - "name": "CVE-2022-41742", - "full_name": "Live-Hack-CVE\/CVE-2022-41742", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41742", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41742 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:54Z", - "updated_at": "2022-12-23T15:34:54Z", - "pushed_at": "2022-12-23T15:34:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41757.json b/2022/CVE-2022-41757.json new file mode 100644 index 0000000000..2059dc7b57 --- /dev/null +++ b/2022/CVE-2022-41757.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662394, + "name": "CVE-2022-41757", + "full_name": "Live-Hack-CVE\/CVE-2022-41757", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41757", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41757 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:53Z", + "updated_at": "2022-12-23T21:50:53Z", + "pushed_at": "2022-12-23T21:50:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41775.json b/2022/CVE-2022-41775.json deleted file mode 100644 index 8e0a5ef94e..0000000000 --- a/2022/CVE-2022-41775.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595983, - "name": "CVE-2022-41775", - "full_name": "Live-Hack-CVE\/CVE-2022-41775", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41775", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41775 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:19Z", - "updated_at": "2022-12-23T17:00:19Z", - "pushed_at": "2022-12-23T17:00:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41781.json b/2022/CVE-2022-41781.json deleted file mode 100644 index 5b5e8ab7e3..0000000000 --- a/2022/CVE-2022-41781.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585385, - "name": "CVE-2022-41781", - "full_name": "Live-Hack-CVE\/CVE-2022-41781", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41781", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41781 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:48Z", - "updated_at": "2022-12-23T16:20:49Z", - "pushed_at": "2022-12-23T16:20:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41788.json b/2022/CVE-2022-41788.json deleted file mode 100644 index f6ae1c715a..0000000000 --- a/2022/CVE-2022-41788.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563329, - "name": "CVE-2022-41788", - "full_name": "Live-Hack-CVE\/CVE-2022-41788", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41788", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41788 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:51Z", - "updated_at": "2022-12-23T15:01:51Z", - "pushed_at": "2022-12-23T15:01:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41789.json b/2022/CVE-2022-41789.json new file mode 100644 index 0000000000..f30fb4f4c6 --- /dev/null +++ b/2022/CVE-2022-41789.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627100, + "name": "CVE-2022-41789", + "full_name": "Live-Hack-CVE\/CVE-2022-41789", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41789", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41789 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:43Z", + "updated_at": "2022-12-23T19:01:43Z", + "pushed_at": "2022-12-23T19:01:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41791.json b/2022/CVE-2022-41791.json deleted file mode 100644 index 62ff693a66..0000000000 --- a/2022/CVE-2022-41791.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575296, - "name": "CVE-2022-41791", - "full_name": "Live-Hack-CVE\/CVE-2022-41791", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41791", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41791 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:25Z", - "updated_at": "2022-12-23T15:43:25Z", - "pushed_at": "2022-12-23T15:43:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41805.json b/2022/CVE-2022-41805.json deleted file mode 100644 index 58545bf969..0000000000 --- a/2022/CVE-2022-41805.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586431, - "name": "CVE-2022-41805", - "full_name": "Live-Hack-CVE\/CVE-2022-41805", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41805", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41805 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:24Z", - "updated_at": "2022-12-23T16:24:24Z", - "pushed_at": "2022-12-23T16:24:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41814.json b/2022/CVE-2022-41814.json new file mode 100644 index 0000000000..7ab746b8ab --- /dev/null +++ b/2022/CVE-2022-41814.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627069, + "name": "CVE-2022-41814", + "full_name": "Live-Hack-CVE\/CVE-2022-41814", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41814", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41814 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:36Z", + "updated_at": "2022-12-23T19:01:36Z", + "pushed_at": "2022-12-23T19:01:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41828.json b/2022/CVE-2022-41828.json new file mode 100644 index 0000000000..a17bf656d2 --- /dev/null +++ b/2022/CVE-2022-41828.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676793, + "name": "CVE-2022-41828", + "full_name": "Live-Hack-CVE\/CVE-2022-41828", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41828", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41828 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:48Z", + "updated_at": "2022-12-23T23:15:48Z", + "pushed_at": "2022-12-23T23:15:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41839.json b/2022/CVE-2022-41839.json deleted file mode 100644 index 7c2c8baf36..0000000000 --- a/2022/CVE-2022-41839.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573385, - "name": "CVE-2022-41839", - "full_name": "Live-Hack-CVE\/CVE-2022-41839", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41839", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41839 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:51Z", - "updated_at": "2022-12-23T15:36:51Z", - "pushed_at": "2022-12-23T15:36:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41840.json b/2022/CVE-2022-41840.json deleted file mode 100644 index 5974378136..0000000000 --- a/2022/CVE-2022-41840.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585399, - "name": "CVE-2022-41840", - "full_name": "Live-Hack-CVE\/CVE-2022-41840", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41840", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41840 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:52Z", - "updated_at": "2022-12-23T16:20:52Z", - "pushed_at": "2022-12-23T16:20:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41874.json b/2022/CVE-2022-41874.json new file mode 100644 index 0000000000..c659789d83 --- /dev/null +++ b/2022/CVE-2022-41874.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637960, + "name": "CVE-2022-41874", + "full_name": "Live-Hack-CVE\/CVE-2022-41874", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41874", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41874 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:52Z", + "updated_at": "2022-12-23T19:49:52Z", + "pushed_at": "2022-12-23T19:49:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41875.json b/2022/CVE-2022-41875.json deleted file mode 100644 index 4d56dc85ed..0000000000 --- a/2022/CVE-2022-41875.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527061, - "name": "CVE-2022-41875", - "full_name": "Live-Hack-CVE\/CVE-2022-41875", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41875", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41875 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:48Z", - "updated_at": "2022-12-23T12:57:48Z", - "pushed_at": "2022-12-23T12:57:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41876.json b/2022/CVE-2022-41876.json new file mode 100644 index 0000000000..53380a0f6b --- /dev/null +++ b/2022/CVE-2022-41876.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637978, + "name": "CVE-2022-41876", + "full_name": "Live-Hack-CVE\/CVE-2022-41876", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41876", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41876 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:55Z", + "updated_at": "2022-12-23T19:49:55Z", + "pushed_at": "2022-12-23T19:49:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41878.json b/2022/CVE-2022-41878.json new file mode 100644 index 0000000000..a6b4f948bd --- /dev/null +++ b/2022/CVE-2022-41878.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638016, + "name": "CVE-2022-41878", + "full_name": "Live-Hack-CVE\/CVE-2022-41878", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41878", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41878 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:05Z", + "updated_at": "2022-12-23T19:50:05Z", + "pushed_at": "2022-12-23T19:50:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41879.json b/2022/CVE-2022-41879.json new file mode 100644 index 0000000000..006603fb55 --- /dev/null +++ b/2022/CVE-2022-41879.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638081, + "name": "CVE-2022-41879", + "full_name": "Live-Hack-CVE\/CVE-2022-41879", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41879", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41879 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:22Z", + "updated_at": "2022-12-23T19:50:22Z", + "pushed_at": "2022-12-23T19:50:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41880.json b/2022/CVE-2022-41880.json deleted file mode 100644 index 6607dbc88c..0000000000 --- a/2022/CVE-2022-41880.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572889, - "name": "CVE-2022-41880", - "full_name": "Live-Hack-CVE\/CVE-2022-41880", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41880", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41880 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:11Z", - "updated_at": "2022-12-23T15:35:11Z", - "pushed_at": "2022-12-23T15:35:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41882.json b/2022/CVE-2022-41882.json new file mode 100644 index 0000000000..803af1058e --- /dev/null +++ b/2022/CVE-2022-41882.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628917, + "name": "CVE-2022-41882", + "full_name": "Live-Hack-CVE\/CVE-2022-41882", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41882", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41882 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:09:28Z", + "updated_at": "2022-12-23T19:09:28Z", + "pushed_at": "2022-12-23T19:09:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41883.json b/2022/CVE-2022-41883.json deleted file mode 100644 index dfde0d914e..0000000000 --- a/2022/CVE-2022-41883.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562592, - "name": "CVE-2022-41883", - "full_name": "Live-Hack-CVE\/CVE-2022-41883", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41883", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41883 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:29Z", - "updated_at": "2022-12-23T14:59:29Z", - "pushed_at": "2022-12-23T14:59:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41884.json b/2022/CVE-2022-41884.json deleted file mode 100644 index 14308a838b..0000000000 --- a/2022/CVE-2022-41884.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572866, - "name": "CVE-2022-41884", - "full_name": "Live-Hack-CVE\/CVE-2022-41884", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41884", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41884 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:08Z", - "updated_at": "2022-12-23T15:35:08Z", - "pushed_at": "2022-12-23T15:35:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41885.json b/2022/CVE-2022-41885.json deleted file mode 100644 index 9a24f62940..0000000000 --- a/2022/CVE-2022-41885.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562735, - "name": "CVE-2022-41885", - "full_name": "Live-Hack-CVE\/CVE-2022-41885", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41885", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41885 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:00Z", - "updated_at": "2022-12-23T15:00:00Z", - "pushed_at": "2022-12-23T15:00:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41886.json b/2022/CVE-2022-41886.json deleted file mode 100644 index bf34d8dafb..0000000000 --- a/2022/CVE-2022-41886.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572848, - "name": "CVE-2022-41886", - "full_name": "Live-Hack-CVE\/CVE-2022-41886", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41886", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41886 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:05Z", - "updated_at": "2022-12-23T15:35:05Z", - "pushed_at": "2022-12-23T15:35:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41887.json b/2022/CVE-2022-41887.json deleted file mode 100644 index 2d9fb903c9..0000000000 --- a/2022/CVE-2022-41887.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572828, - "name": "CVE-2022-41887", - "full_name": "Live-Hack-CVE\/CVE-2022-41887", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41887", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41887 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:01Z", - "updated_at": "2022-12-23T15:35:01Z", - "pushed_at": "2022-12-23T15:35:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41888.json b/2022/CVE-2022-41888.json deleted file mode 100644 index 7edaeabe1b..0000000000 --- a/2022/CVE-2022-41888.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573086, - "name": "CVE-2022-41888", - "full_name": "Live-Hack-CVE\/CVE-2022-41888", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41888", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41888 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:55Z", - "updated_at": "2022-12-23T15:35:55Z", - "pushed_at": "2022-12-23T15:35:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41889.json b/2022/CVE-2022-41889.json deleted file mode 100644 index 7761d3b634..0000000000 --- a/2022/CVE-2022-41889.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573066, - "name": "CVE-2022-41889", - "full_name": "Live-Hack-CVE\/CVE-2022-41889", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41889", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41889 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:51Z", - "updated_at": "2022-12-23T15:35:51Z", - "pushed_at": "2022-12-23T15:35:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41890.json b/2022/CVE-2022-41890.json deleted file mode 100644 index 467d3de45a..0000000000 --- a/2022/CVE-2022-41890.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573051, - "name": "CVE-2022-41890", - "full_name": "Live-Hack-CVE\/CVE-2022-41890", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41890", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41890 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:48Z", - "updated_at": "2022-12-23T15:35:48Z", - "pushed_at": "2022-12-23T15:35:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41891.json b/2022/CVE-2022-41891.json deleted file mode 100644 index 6d496f510a..0000000000 --- a/2022/CVE-2022-41891.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572909, - "name": "CVE-2022-41891", - "full_name": "Live-Hack-CVE\/CVE-2022-41891", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41891", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41891 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:15Z", - "updated_at": "2022-12-23T15:35:15Z", - "pushed_at": "2022-12-23T15:35:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41892.json b/2022/CVE-2022-41892.json new file mode 100644 index 0000000000..447ca1d85d --- /dev/null +++ b/2022/CVE-2022-41892.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637555, + "name": "CVE-2022-41892", + "full_name": "Live-Hack-CVE\/CVE-2022-41892", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41892", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41892 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:48:00Z", + "updated_at": "2022-12-23T19:48:00Z", + "pushed_at": "2022-12-23T19:48:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41893.json b/2022/CVE-2022-41893.json deleted file mode 100644 index fc5260ba21..0000000000 --- a/2022/CVE-2022-41893.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573259, - "name": "CVE-2022-41893", - "full_name": "Live-Hack-CVE\/CVE-2022-41893", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41893", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41893 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:27Z", - "updated_at": "2022-12-23T15:36:27Z", - "pushed_at": "2022-12-23T15:36:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41894.json b/2022/CVE-2022-41894.json deleted file mode 100644 index dce9cdd96a..0000000000 --- a/2022/CVE-2022-41894.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573181, - "name": "CVE-2022-41894", - "full_name": "Live-Hack-CVE\/CVE-2022-41894", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41894", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41894 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:12Z", - "updated_at": "2022-12-23T15:36:12Z", - "pushed_at": "2022-12-23T15:36:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41895.json b/2022/CVE-2022-41895.json deleted file mode 100644 index e7945aeebf..0000000000 --- a/2022/CVE-2022-41895.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573106, - "name": "CVE-2022-41895", - "full_name": "Live-Hack-CVE\/CVE-2022-41895", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41895", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41895 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:35:58Z", - "updated_at": "2022-12-23T15:35:58Z", - "pushed_at": "2022-12-23T15:36:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41896.json b/2022/CVE-2022-41896.json deleted file mode 100644 index c929b236a1..0000000000 --- a/2022/CVE-2022-41896.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573572, - "name": "CVE-2022-41896", - "full_name": "Live-Hack-CVE\/CVE-2022-41896", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41896", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41896 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:29Z", - "updated_at": "2022-12-23T15:37:29Z", - "pushed_at": "2022-12-23T15:37:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41897.json b/2022/CVE-2022-41897.json deleted file mode 100644 index 896c604e97..0000000000 --- a/2022/CVE-2022-41897.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573553, - "name": "CVE-2022-41897", - "full_name": "Live-Hack-CVE\/CVE-2022-41897", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41897", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41897 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:26Z", - "updated_at": "2022-12-23T15:37:26Z", - "pushed_at": "2022-12-23T15:37:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41898.json b/2022/CVE-2022-41898.json deleted file mode 100644 index d97f8d601d..0000000000 --- a/2022/CVE-2022-41898.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573137, - "name": "CVE-2022-41898", - "full_name": "Live-Hack-CVE\/CVE-2022-41898", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41898", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41898 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:05Z", - "updated_at": "2022-12-23T15:36:05Z", - "pushed_at": "2022-12-23T15:36:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41899.json b/2022/CVE-2022-41899.json deleted file mode 100644 index af4183f729..0000000000 --- a/2022/CVE-2022-41899.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572703, - "name": "CVE-2022-41899", - "full_name": "Live-Hack-CVE\/CVE-2022-41899", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41899", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41899 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:37Z", - "updated_at": "2022-12-23T15:34:37Z", - "pushed_at": "2022-12-23T15:34:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41900.json b/2022/CVE-2022-41900.json deleted file mode 100644 index ab7f96357b..0000000000 --- a/2022/CVE-2022-41900.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572686, - "name": "CVE-2022-41900", - "full_name": "Live-Hack-CVE\/CVE-2022-41900", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41900", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41900 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:34Z", - "updated_at": "2022-12-23T15:34:34Z", - "pushed_at": "2022-12-23T15:34:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41901.json b/2022/CVE-2022-41901.json deleted file mode 100644 index 6a5d22b67b..0000000000 --- a/2022/CVE-2022-41901.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572669, - "name": "CVE-2022-41901", - "full_name": "Live-Hack-CVE\/CVE-2022-41901", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41901", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41901 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:31Z", - "updated_at": "2022-12-23T15:34:31Z", - "pushed_at": "2022-12-23T15:34:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41904.json b/2022/CVE-2022-41904.json new file mode 100644 index 0000000000..a20f0925b2 --- /dev/null +++ b/2022/CVE-2022-41904.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628775, + "name": "CVE-2022-41904", + "full_name": "Live-Hack-CVE\/CVE-2022-41904", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41904", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41904 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:08:48Z", + "updated_at": "2022-12-23T19:08:48Z", + "pushed_at": "2022-12-23T19:08:50Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41905.json b/2022/CVE-2022-41905.json new file mode 100644 index 0000000000..b553247466 --- /dev/null +++ b/2022/CVE-2022-41905.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628292, + "name": "CVE-2022-41905", + "full_name": "Live-Hack-CVE\/CVE-2022-41905", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41905", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41905 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:47Z", + "updated_at": "2022-12-23T19:06:47Z", + "pushed_at": "2022-12-23T19:06:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41906.json b/2022/CVE-2022-41906.json new file mode 100644 index 0000000000..e8c11186dd --- /dev/null +++ b/2022/CVE-2022-41906.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628597, + "name": "CVE-2022-41906", + "full_name": "Live-Hack-CVE\/CVE-2022-41906", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41906", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41906 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:59Z", + "updated_at": "2022-12-23T19:07:59Z", + "pushed_at": "2022-12-23T19:08:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41907.json b/2022/CVE-2022-41907.json deleted file mode 100644 index eba77a10b8..0000000000 --- a/2022/CVE-2022-41907.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572653, - "name": "CVE-2022-41907", - "full_name": "Live-Hack-CVE\/CVE-2022-41907", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41907", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41907 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:27Z", - "updated_at": "2022-12-23T15:34:27Z", - "pushed_at": "2022-12-23T15:34:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41908.json b/2022/CVE-2022-41908.json deleted file mode 100644 index d017521c02..0000000000 --- a/2022/CVE-2022-41908.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572619, - "name": "CVE-2022-41908", - "full_name": "Live-Hack-CVE\/CVE-2022-41908", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41908", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41908 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:20Z", - "updated_at": "2022-12-23T15:34:20Z", - "pushed_at": "2022-12-23T15:34:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41909.json b/2022/CVE-2022-41909.json deleted file mode 100644 index 87c981f535..0000000000 --- a/2022/CVE-2022-41909.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563038, - "name": "CVE-2022-41909", - "full_name": "Live-Hack-CVE\/CVE-2022-41909", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41909", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41909 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:54Z", - "updated_at": "2022-12-23T15:00:54Z", - "pushed_at": "2022-12-23T15:00:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41911.json b/2022/CVE-2022-41911.json deleted file mode 100644 index 3acdb9b8ca..0000000000 --- a/2022/CVE-2022-41911.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563014, - "name": "CVE-2022-41911", - "full_name": "Live-Hack-CVE\/CVE-2022-41911", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41911", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41911 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:51Z", - "updated_at": "2022-12-23T15:00:51Z", - "pushed_at": "2022-12-23T15:00:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41912.json b/2022/CVE-2022-41912.json deleted file mode 100644 index 5bb57e40da..0000000000 --- a/2022/CVE-2022-41912.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524138, - "name": "CVE-2022-41912", - "full_name": "Live-Hack-CVE\/CVE-2022-41912", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41912", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41912 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:22Z", - "updated_at": "2022-12-23T12:47:22Z", - "pushed_at": "2022-12-23T12:47:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41914.json b/2022/CVE-2022-41914.json deleted file mode 100644 index 77a7a43c63..0000000000 --- a/2022/CVE-2022-41914.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583794, - "name": "CVE-2022-41914", - "full_name": "Live-Hack-CVE\/CVE-2022-41914", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41914", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41914 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:58Z", - "updated_at": "2022-12-23T16:14:58Z", - "pushed_at": "2022-12-23T16:15:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41916.json b/2022/CVE-2022-41916.json deleted file mode 100644 index 89d84969c9..0000000000 --- a/2022/CVE-2022-41916.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548082, - "name": "CVE-2022-41916", - "full_name": "Live-Hack-CVE\/CVE-2022-41916", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41916", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41916 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:11:17Z", - "updated_at": "2022-12-23T14:11:17Z", - "pushed_at": "2022-12-23T14:11:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41917.json b/2022/CVE-2022-41917.json deleted file mode 100644 index 61c99c086a..0000000000 --- a/2022/CVE-2022-41917.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595130, - "name": "CVE-2022-41917", - "full_name": "Live-Hack-CVE\/CVE-2022-41917", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41917", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41917 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:12Z", - "updated_at": "2022-12-23T16:57:12Z", - "pushed_at": "2022-12-23T16:57:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41919.json b/2022/CVE-2022-41919.json deleted file mode 100644 index db489d7f94..0000000000 --- a/2022/CVE-2022-41919.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560579, - "name": "CVE-2022-41919", - "full_name": "Live-Hack-CVE\/CVE-2022-41919", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41919", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41919 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:57Z", - "updated_at": "2022-12-23T14:52:57Z", - "pushed_at": "2022-12-23T14:52:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41920.json b/2022/CVE-2022-41920.json deleted file mode 100644 index 6f74ac29ed..0000000000 --- a/2022/CVE-2022-41920.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573604, - "name": "CVE-2022-41920", - "full_name": "Live-Hack-CVE\/CVE-2022-41920", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41920", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41920 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:36Z", - "updated_at": "2022-12-23T15:37:36Z", - "pushed_at": "2022-12-23T15:37:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41921.json b/2022/CVE-2022-41921.json deleted file mode 100644 index cadaff28c2..0000000000 --- a/2022/CVE-2022-41921.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524154, - "name": "CVE-2022-41921", - "full_name": "Live-Hack-CVE\/CVE-2022-41921", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41921", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41921 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:25Z", - "updated_at": "2022-12-23T12:47:25Z", - "pushed_at": "2022-12-23T12:47:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41922.json b/2022/CVE-2022-41922.json deleted file mode 100644 index 483654db13..0000000000 --- a/2022/CVE-2022-41922.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535963, - "name": "CVE-2022-41922", - "full_name": "Live-Hack-CVE\/CVE-2022-41922", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41922", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41922 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:09Z", - "updated_at": "2022-12-23T13:29:09Z", - "pushed_at": "2022-12-23T13:29:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41923.json b/2022/CVE-2022-41923.json deleted file mode 100644 index a0c8b6010b..0000000000 --- a/2022/CVE-2022-41923.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525274, - "name": "CVE-2022-41923", - "full_name": "Live-Hack-CVE\/CVE-2022-41923", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41923", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41923 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:08Z", - "updated_at": "2022-12-23T12:51:08Z", - "pushed_at": "2022-12-23T12:51:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41924.json b/2022/CVE-2022-41924.json deleted file mode 100644 index 608e41a745..0000000000 --- a/2022/CVE-2022-41924.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525245, - "name": "CVE-2022-41924", - "full_name": "Live-Hack-CVE\/CVE-2022-41924", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41924", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41924 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:05Z", - "updated_at": "2022-12-23T12:51:05Z", - "pushed_at": "2022-12-23T12:51:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41925.json b/2022/CVE-2022-41925.json deleted file mode 100644 index d54c0e3e90..0000000000 --- a/2022/CVE-2022-41925.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525128, - "name": "CVE-2022-41925", - "full_name": "Live-Hack-CVE\/CVE-2022-41925", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41925", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41925 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:41Z", - "updated_at": "2022-12-23T12:50:41Z", - "pushed_at": "2022-12-23T12:50:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41926.json b/2022/CVE-2022-41926.json deleted file mode 100644 index cc687e7b83..0000000000 --- a/2022/CVE-2022-41926.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525348, - "name": "CVE-2022-41926", - "full_name": "Live-Hack-CVE\/CVE-2022-41926", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41926", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41926 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:22Z", - "updated_at": "2022-12-23T12:51:22Z", - "pushed_at": "2022-12-23T12:51:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41927.json b/2022/CVE-2022-41927.json deleted file mode 100644 index 74b596ad97..0000000000 --- a/2022/CVE-2022-41927.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581527014, - "name": "CVE-2022-41927", - "full_name": "Live-Hack-CVE\/CVE-2022-41927", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41927", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41927 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:37Z", - "updated_at": "2022-12-23T12:57:37Z", - "pushed_at": "2022-12-23T12:57:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41928.json b/2022/CVE-2022-41928.json deleted file mode 100644 index 76c9e77189..0000000000 --- a/2022/CVE-2022-41928.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526953, - "name": "CVE-2022-41928", - "full_name": "Live-Hack-CVE\/CVE-2022-41928", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41928", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41928 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:24Z", - "updated_at": "2022-12-23T12:57:24Z", - "pushed_at": "2022-12-23T12:57:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41929.json b/2022/CVE-2022-41929.json deleted file mode 100644 index cec0e4dc23..0000000000 --- a/2022/CVE-2022-41929.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526941, - "name": "CVE-2022-41929", - "full_name": "Live-Hack-CVE\/CVE-2022-41929", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41929", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41929 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:20Z", - "updated_at": "2022-12-23T12:57:20Z", - "pushed_at": "2022-12-23T12:57:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41930.json b/2022/CVE-2022-41930.json deleted file mode 100644 index 8d87078063..0000000000 --- a/2022/CVE-2022-41930.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526928, - "name": "CVE-2022-41930", - "full_name": "Live-Hack-CVE\/CVE-2022-41930", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41930", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41930 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:17Z", - "updated_at": "2022-12-23T12:57:17Z", - "pushed_at": "2022-12-23T12:57:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41931.json b/2022/CVE-2022-41931.json deleted file mode 100644 index f930a32b70..0000000000 --- a/2022/CVE-2022-41931.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526916, - "name": "CVE-2022-41931", - "full_name": "Live-Hack-CVE\/CVE-2022-41931", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41931", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41931 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:13Z", - "updated_at": "2022-12-23T12:57:13Z", - "pushed_at": "2022-12-23T12:57:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41932.json b/2022/CVE-2022-41932.json deleted file mode 100644 index 88b93494fe..0000000000 --- a/2022/CVE-2022-41932.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526844, - "name": "CVE-2022-41932", - "full_name": "Live-Hack-CVE\/CVE-2022-41932", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41932", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41932 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:00Z", - "updated_at": "2022-12-23T12:57:00Z", - "pushed_at": "2022-12-23T12:57:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41934.json b/2022/CVE-2022-41934.json deleted file mode 100644 index ba11c323c5..0000000000 --- a/2022/CVE-2022-41934.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526897, - "name": "CVE-2022-41934", - "full_name": "Live-Hack-CVE\/CVE-2022-41934", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41934", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41934 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:10Z", - "updated_at": "2022-12-23T12:57:10Z", - "pushed_at": "2022-12-23T12:57:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41935.json b/2022/CVE-2022-41935.json deleted file mode 100644 index 760e1212c6..0000000000 --- a/2022/CVE-2022-41935.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526871, - "name": "CVE-2022-41935", - "full_name": "Live-Hack-CVE\/CVE-2022-41935", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41935", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41935 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:57:06Z", - "updated_at": "2022-12-23T12:57:06Z", - "pushed_at": "2022-12-23T12:57:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41936.json b/2022/CVE-2022-41936.json deleted file mode 100644 index a7f6b9ccf1..0000000000 --- a/2022/CVE-2022-41936.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550766, - "name": "CVE-2022-41936", - "full_name": "Live-Hack-CVE\/CVE-2022-41936", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41936", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41936 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:57Z", - "updated_at": "2022-12-23T14:19:57Z", - "pushed_at": "2022-12-23T14:19:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41937.json b/2022/CVE-2022-41937.json deleted file mode 100644 index 59f076ec7e..0000000000 --- a/2022/CVE-2022-41937.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550751, - "name": "CVE-2022-41937", - "full_name": "Live-Hack-CVE\/CVE-2022-41937", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41937", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41937 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:54Z", - "updated_at": "2022-12-23T14:19:54Z", - "pushed_at": "2022-12-23T14:19:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41938.json b/2022/CVE-2022-41938.json deleted file mode 100644 index 0b602b4bab..0000000000 --- a/2022/CVE-2022-41938.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561017, - "name": "CVE-2022-41938", - "full_name": "Live-Hack-CVE\/CVE-2022-41938", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41938", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41938 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:23Z", - "updated_at": "2022-12-23T14:54:23Z", - "pushed_at": "2022-12-23T14:54:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41939.json b/2022/CVE-2022-41939.json deleted file mode 100644 index 321328629c..0000000000 --- a/2022/CVE-2022-41939.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560993, - "name": "CVE-2022-41939", - "full_name": "Live-Hack-CVE\/CVE-2022-41939", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41939", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41939 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:20Z", - "updated_at": "2022-12-23T14:54:20Z", - "pushed_at": "2022-12-23T14:54:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41940.json b/2022/CVE-2022-41940.json deleted file mode 100644 index 56b58a11a7..0000000000 --- a/2022/CVE-2022-41940.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560902, - "name": "CVE-2022-41940", - "full_name": "Live-Hack-CVE\/CVE-2022-41940", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41940", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41940 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:54:03Z", - "updated_at": "2022-12-23T14:54:03Z", - "pushed_at": "2022-12-23T14:54:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41942.json b/2022/CVE-2022-41942.json deleted file mode 100644 index 03205ca498..0000000000 --- a/2022/CVE-2022-41942.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560729, - "name": "CVE-2022-41942", - "full_name": "Live-Hack-CVE\/CVE-2022-41942", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41942", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41942 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:24Z", - "updated_at": "2022-12-23T14:53:24Z", - "pushed_at": "2022-12-23T14:53:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41943.json b/2022/CVE-2022-41943.json deleted file mode 100644 index 8fa87c0bfb..0000000000 --- a/2022/CVE-2022-41943.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560699, - "name": "CVE-2022-41943", - "full_name": "Live-Hack-CVE\/CVE-2022-41943", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41943", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41943 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:17Z", - "updated_at": "2022-12-23T14:53:17Z", - "pushed_at": "2022-12-23T14:53:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41944.json b/2022/CVE-2022-41944.json deleted file mode 100644 index 04856994bd..0000000000 --- a/2022/CVE-2022-41944.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515943, - "name": "CVE-2022-41944", - "full_name": "Live-Hack-CVE\/CVE-2022-41944", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41944", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41944 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:49Z", - "updated_at": "2022-12-23T12:16:49Z", - "pushed_at": "2022-12-23T12:16:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41945.json b/2022/CVE-2022-41945.json deleted file mode 100644 index cc4b72d116..0000000000 --- a/2022/CVE-2022-41945.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550832, - "name": "CVE-2022-41945", - "full_name": "Live-Hack-CVE\/CVE-2022-41945", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41945", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41945 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:07Z", - "updated_at": "2022-12-23T14:20:07Z", - "pushed_at": "2022-12-23T14:20:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41950.json b/2022/CVE-2022-41950.json deleted file mode 100644 index 17843e3967..0000000000 --- a/2022/CVE-2022-41950.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560746, - "name": "CVE-2022-41950", - "full_name": "Live-Hack-CVE\/CVE-2022-41950", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41950", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41950 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:28Z", - "updated_at": "2022-12-23T14:53:28Z", - "pushed_at": "2022-12-23T14:53:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41952.json b/2022/CVE-2022-41952.json deleted file mode 100644 index cd27f66ba3..0000000000 --- a/2022/CVE-2022-41952.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560844, - "name": "CVE-2022-41952", - "full_name": "Live-Hack-CVE\/CVE-2022-41952", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41952", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41952 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:53:50Z", - "updated_at": "2022-12-23T14:53:50Z", - "pushed_at": "2022-12-23T14:53:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41954.json b/2022/CVE-2022-41954.json deleted file mode 100644 index f53c511560..0000000000 --- a/2022/CVE-2022-41954.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524895, - "name": "CVE-2022-41954", - "full_name": "Live-Hack-CVE\/CVE-2022-41954", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41954", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41954 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:50Z", - "updated_at": "2022-12-23T12:49:50Z", - "pushed_at": "2022-12-23T12:49:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41957.json b/2022/CVE-2022-41957.json deleted file mode 100644 index 0a453a9080..0000000000 --- a/2022/CVE-2022-41957.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515895, - "name": "CVE-2022-41957", - "full_name": "Live-Hack-CVE\/CVE-2022-41957", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41957", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41957 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:42Z", - "updated_at": "2022-12-23T12:16:42Z", - "pushed_at": "2022-12-23T12:16:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41958.json b/2022/CVE-2022-41958.json deleted file mode 100644 index d5610cc99c..0000000000 --- a/2022/CVE-2022-41958.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526613, - "name": "CVE-2022-41958", - "full_name": "Live-Hack-CVE\/CVE-2022-41958", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41958", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41958 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:01Z", - "updated_at": "2022-12-23T12:56:01Z", - "pushed_at": "2022-12-23T12:56:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-41978.json b/2022/CVE-2022-41978.json new file mode 100644 index 0000000000..16a6ab97a6 --- /dev/null +++ b/2022/CVE-2022-41978.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662147, + "name": "CVE-2022-41978", + "full_name": "Live-Hack-CVE\/CVE-2022-41978", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41978", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41978 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:36Z", + "updated_at": "2022-12-23T21:49:36Z", + "pushed_at": "2022-12-23T21:49:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-41980.json b/2022/CVE-2022-41980.json new file mode 100644 index 0000000000..8fdf0143a6 --- /dev/null +++ b/2022/CVE-2022-41980.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663087, + "name": "CVE-2022-41980", + "full_name": "Live-Hack-CVE\/CVE-2022-41980", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-41980", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-41980 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:41Z", + "updated_at": "2022-12-23T21:54:41Z", + "pushed_at": "2022-12-23T21:54:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42000.json b/2022/CVE-2022-42000.json new file mode 100644 index 0000000000..eb9cf5965a --- /dev/null +++ b/2022/CVE-2022-42000.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627084, + "name": "CVE-2022-42000", + "full_name": "Live-Hack-CVE\/CVE-2022-42000", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42000", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42000 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:40Z", + "updated_at": "2022-12-23T19:01:40Z", + "pushed_at": "2022-12-23T19:01:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42001.json b/2022/CVE-2022-42001.json new file mode 100644 index 0000000000..dffe7e4893 --- /dev/null +++ b/2022/CVE-2022-42001.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626994, + "name": "CVE-2022-42001", + "full_name": "Live-Hack-CVE\/CVE-2022-42001", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42001", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42001 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:19Z", + "updated_at": "2022-12-23T19:01:19Z", + "pushed_at": "2022-12-23T19:01:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42053.json b/2022/CVE-2022-42053.json deleted file mode 100644 index 670ba5490f..0000000000 --- a/2022/CVE-2022-42053.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594747, - "name": "CVE-2022-42053", - "full_name": "Live-Hack-CVE\/CVE-2022-42053", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42053", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42053 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:45Z", - "updated_at": "2022-12-23T16:55:45Z", - "pushed_at": "2022-12-23T16:55:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42058.json b/2022/CVE-2022-42058.json deleted file mode 100644 index b44c5f2520..0000000000 --- a/2022/CVE-2022-42058.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536033, - "name": "CVE-2022-42058", - "full_name": "Live-Hack-CVE\/CVE-2022-42058", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42058", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42058 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:27Z", - "updated_at": "2022-12-23T13:29:27Z", - "pushed_at": "2022-12-23T13:29:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42060.json b/2022/CVE-2022-42060.json deleted file mode 100644 index a5fd31f468..0000000000 --- a/2022/CVE-2022-42060.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536053, - "name": "CVE-2022-42060", - "full_name": "Live-Hack-CVE\/CVE-2022-42060", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42060", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42060 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:30Z", - "updated_at": "2022-12-23T13:29:30Z", - "pushed_at": "2022-12-23T13:29:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42075.json b/2022/CVE-2022-42075.json new file mode 100644 index 0000000000..c9103fe866 --- /dev/null +++ b/2022/CVE-2022-42075.json @@ -0,0 +1,31 @@ +[ + { + "id": 581655182, + "name": "CVE-2022-42075", + "full_name": "Live-Hack-CVE\/CVE-2022-42075", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42075", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42075 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:12:51Z", + "updated_at": "2022-12-23T21:12:51Z", + "pushed_at": "2022-12-23T21:12:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42094.json b/2022/CVE-2022-42094.json deleted file mode 100644 index 614a1f5276..0000000000 --- a/2022/CVE-2022-42094.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562131, - "name": "CVE-2022-42094", - "full_name": "Live-Hack-CVE\/CVE-2022-42094", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42094", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42094 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:00Z", - "updated_at": "2022-12-23T14:58:00Z", - "pushed_at": "2022-12-23T14:58:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42095.json b/2022/CVE-2022-42095.json deleted file mode 100644 index d1c3546a5d..0000000000 --- a/2022/CVE-2022-42095.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535907, - "name": "CVE-2022-42095", - "full_name": "Live-Hack-CVE\/CVE-2022-42095", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42095", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42095 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:59Z", - "updated_at": "2022-12-23T13:28:59Z", - "pushed_at": "2022-12-23T13:29:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42096.json b/2022/CVE-2022-42096.json deleted file mode 100644 index 81ce350971..0000000000 --- a/2022/CVE-2022-42096.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572314, - "name": "CVE-2022-42096", - "full_name": "Live-Hack-CVE\/CVE-2022-42096", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42096", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42096 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:17Z", - "updated_at": "2022-12-23T15:33:17Z", - "pushed_at": "2022-12-23T15:33:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42097.json b/2022/CVE-2022-42097.json deleted file mode 100644 index 927fc4e342..0000000000 --- a/2022/CVE-2022-42097.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562040, - "name": "CVE-2022-42097", - "full_name": "Live-Hack-CVE\/CVE-2022-42097", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42097", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42097 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:43Z", - "updated_at": "2022-12-23T14:57:43Z", - "pushed_at": "2022-12-23T14:57:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42098.json b/2022/CVE-2022-42098.json deleted file mode 100644 index a7bf39cc37..0000000000 --- a/2022/CVE-2022-42098.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562065, - "name": "CVE-2022-42098", - "full_name": "Live-Hack-CVE\/CVE-2022-42098", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42098", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42098 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:46Z", - "updated_at": "2022-12-23T14:57:46Z", - "pushed_at": "2022-12-23T14:57:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42099.json b/2022/CVE-2022-42099.json deleted file mode 100644 index 4807b20320..0000000000 --- a/2022/CVE-2022-42099.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536223, - "name": "CVE-2022-42099", - "full_name": "Live-Hack-CVE\/CVE-2022-42099", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42099", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42099 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:08Z", - "updated_at": "2022-12-23T13:30:08Z", - "pushed_at": "2022-12-23T13:30:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42100.json b/2022/CVE-2022-42100.json deleted file mode 100644 index 42305f7cce..0000000000 --- a/2022/CVE-2022-42100.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536249, - "name": "CVE-2022-42100", - "full_name": "Live-Hack-CVE\/CVE-2022-42100", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42100", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42100 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:11Z", - "updated_at": "2022-12-23T13:30:11Z", - "pushed_at": "2022-12-23T13:30:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42109.json b/2022/CVE-2022-42109.json deleted file mode 100644 index f70f01da67..0000000000 --- a/2022/CVE-2022-42109.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536266, - "name": "CVE-2022-42109", - "full_name": "Live-Hack-CVE\/CVE-2022-42109", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42109", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42109 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:14Z", - "updated_at": "2022-12-23T13:30:14Z", - "pushed_at": "2022-12-23T13:30:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42124.json b/2022/CVE-2022-42124.json deleted file mode 100644 index b1be353e93..0000000000 --- a/2022/CVE-2022-42124.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597139, - "name": "CVE-2022-42124", - "full_name": "Live-Hack-CVE\/CVE-2022-42124", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42124", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42124 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:38Z", - "updated_at": "2022-12-23T17:04:38Z", - "pushed_at": "2022-12-23T17:04:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42125.json b/2022/CVE-2022-42125.json deleted file mode 100644 index 2de4c984da..0000000000 --- a/2022/CVE-2022-42125.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597093, - "name": "CVE-2022-42125", - "full_name": "Live-Hack-CVE\/CVE-2022-42125", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42125", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42125 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:28Z", - "updated_at": "2022-12-23T17:04:28Z", - "pushed_at": "2022-12-23T17:04:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42126.json b/2022/CVE-2022-42126.json deleted file mode 100644 index cc43ea9d77..0000000000 --- a/2022/CVE-2022-42126.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597074, - "name": "CVE-2022-42126", - "full_name": "Live-Hack-CVE\/CVE-2022-42126", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42126", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42126 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:25Z", - "updated_at": "2022-12-23T17:04:25Z", - "pushed_at": "2022-12-23T17:04:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42127.json b/2022/CVE-2022-42127.json deleted file mode 100644 index 5f8b10b5cb..0000000000 --- a/2022/CVE-2022-42127.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597057, - "name": "CVE-2022-42127", - "full_name": "Live-Hack-CVE\/CVE-2022-42127", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42127", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42127 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:21Z", - "updated_at": "2022-12-23T17:04:21Z", - "pushed_at": "2022-12-23T17:04:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42128.json b/2022/CVE-2022-42128.json deleted file mode 100644 index 52b9470399..0000000000 --- a/2022/CVE-2022-42128.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597043, - "name": "CVE-2022-42128", - "full_name": "Live-Hack-CVE\/CVE-2022-42128", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42128", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42128 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:18Z", - "updated_at": "2022-12-23T17:04:18Z", - "pushed_at": "2022-12-23T17:04:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42176.json b/2022/CVE-2022-42176.json new file mode 100644 index 0000000000..6d2ca38ca3 --- /dev/null +++ b/2022/CVE-2022-42176.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682271, + "name": "CVE-2022-42176", + "full_name": "Live-Hack-CVE\/CVE-2022-42176", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42176", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42176 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:37Z", + "updated_at": "2022-12-23T23:52:37Z", + "pushed_at": "2022-12-23T23:52:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42309.json b/2022/CVE-2022-42309.json deleted file mode 100644 index 094aad7b29..0000000000 --- a/2022/CVE-2022-42309.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537496, - "name": "CVE-2022-42309", - "full_name": "Live-Hack-CVE\/CVE-2022-42309", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42309", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42309 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:20Z", - "updated_at": "2022-12-23T13:34:20Z", - "pushed_at": "2022-12-23T13:34:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42318.json b/2022/CVE-2022-42318.json deleted file mode 100644 index 30bbc4fda4..0000000000 --- a/2022/CVE-2022-42318.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537436, - "name": "CVE-2022-42318", - "full_name": "Live-Hack-CVE\/CVE-2022-42318", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42318", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42318 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:07Z", - "updated_at": "2022-12-23T13:34:07Z", - "pushed_at": "2022-12-23T13:34:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42319.json b/2022/CVE-2022-42319.json deleted file mode 100644 index 4e39b0fe66..0000000000 --- a/2022/CVE-2022-42319.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537446, - "name": "CVE-2022-42319", - "full_name": "Live-Hack-CVE\/CVE-2022-42319", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42319", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42319 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:10Z", - "updated_at": "2022-12-23T13:34:10Z", - "pushed_at": "2022-12-23T13:34:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42320.json b/2022/CVE-2022-42320.json deleted file mode 100644 index c1c0b6186a..0000000000 --- a/2022/CVE-2022-42320.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537462, - "name": "CVE-2022-42320", - "full_name": "Live-Hack-CVE\/CVE-2022-42320", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42320", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42320 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:13Z", - "updated_at": "2022-12-23T13:34:13Z", - "pushed_at": "2022-12-23T13:34:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42321.json b/2022/CVE-2022-42321.json deleted file mode 100644 index 9cd19b745f..0000000000 --- a/2022/CVE-2022-42321.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549129, - "name": "CVE-2022-42321", - "full_name": "Live-Hack-CVE\/CVE-2022-42321", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42321", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42321 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:48Z", - "updated_at": "2022-12-23T14:14:48Z", - "pushed_at": "2022-12-23T14:14:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42322.json b/2022/CVE-2022-42322.json deleted file mode 100644 index cf627f76bf..0000000000 --- a/2022/CVE-2022-42322.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549182, - "name": "CVE-2022-42322", - "full_name": "Live-Hack-CVE\/CVE-2022-42322", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42322", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42322 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:59Z", - "updated_at": "2022-12-23T14:14:59Z", - "pushed_at": "2022-12-23T14:15:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42323.json b/2022/CVE-2022-42323.json deleted file mode 100644 index f3ebed8d04..0000000000 --- a/2022/CVE-2022-42323.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549152, - "name": "CVE-2022-42323", - "full_name": "Live-Hack-CVE\/CVE-2022-42323", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42323", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42323 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:52Z", - "updated_at": "2022-12-23T14:14:52Z", - "pushed_at": "2022-12-23T14:14:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42325.json b/2022/CVE-2022-42325.json deleted file mode 100644 index ec39e442b1..0000000000 --- a/2022/CVE-2022-42325.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549165, - "name": "CVE-2022-42325", - "full_name": "Live-Hack-CVE\/CVE-2022-42325", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42325", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42325 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:14:55Z", - "updated_at": "2022-12-23T14:14:55Z", - "pushed_at": "2022-12-23T14:14:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42326.json b/2022/CVE-2022-42326.json deleted file mode 100644 index 9683feeaec..0000000000 --- a/2022/CVE-2022-42326.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537473, - "name": "CVE-2022-42326", - "full_name": "Live-Hack-CVE\/CVE-2022-42326", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42326", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42326 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:34:17Z", - "updated_at": "2022-12-23T13:34:17Z", - "pushed_at": "2022-12-23T13:34:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42327.json b/2022/CVE-2022-42327.json deleted file mode 100644 index dcd30f8160..0000000000 --- a/2022/CVE-2022-42327.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561274, - "name": "CVE-2022-42327", - "full_name": "Live-Hack-CVE\/CVE-2022-42327", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42327", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42327 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:55:16Z", - "updated_at": "2022-12-23T14:55:16Z", - "pushed_at": "2022-12-23T14:55:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42442.json b/2022/CVE-2022-42442.json new file mode 100644 index 0000000000..051d3d1f5f --- /dev/null +++ b/2022/CVE-2022-42442.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682933, + "name": "CVE-2022-42442", + "full_name": "Live-Hack-CVE\/CVE-2022-42442", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42442", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42442 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:43Z", + "updated_at": "2022-12-23T23:56:43Z", + "pushed_at": "2022-12-23T23:56:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42457.json b/2022/CVE-2022-42457.json new file mode 100644 index 0000000000..f1e57b3a60 --- /dev/null +++ b/2022/CVE-2022-42457.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654990, + "name": "CVE-2022-42457", + "full_name": "Live-Hack-CVE\/CVE-2022-42457", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42457", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42457 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:11:57Z", + "updated_at": "2022-12-23T21:11:57Z", + "pushed_at": "2022-12-23T21:11:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42459.json b/2022/CVE-2022-42459.json deleted file mode 100644 index 58424da218..0000000000 --- a/2022/CVE-2022-42459.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573340, - "name": "CVE-2022-42459", - "full_name": "Live-Hack-CVE\/CVE-2022-42459", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42459", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42459 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:41Z", - "updated_at": "2022-12-23T15:36:41Z", - "pushed_at": "2022-12-23T15:36:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42460.json b/2022/CVE-2022-42460.json new file mode 100644 index 0000000000..9450527d16 --- /dev/null +++ b/2022/CVE-2022-42460.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638024, + "name": "CVE-2022-42460", + "full_name": "Live-Hack-CVE\/CVE-2022-42460", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42460", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42460 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:09Z", + "updated_at": "2022-12-23T19:50:09Z", + "pushed_at": "2022-12-23T19:50:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42461.json b/2022/CVE-2022-42461.json deleted file mode 100644 index fefb1286c8..0000000000 --- a/2022/CVE-2022-42461.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585414, - "name": "CVE-2022-42461", - "full_name": "Live-Hack-CVE\/CVE-2022-42461", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42461", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42461 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:55Z", - "updated_at": "2022-12-23T16:20:55Z", - "pushed_at": "2022-12-23T16:20:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42494.json b/2022/CVE-2022-42494.json new file mode 100644 index 0000000000..1a537fe2af --- /dev/null +++ b/2022/CVE-2022-42494.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663081, + "name": "CVE-2022-42494", + "full_name": "Live-Hack-CVE\/CVE-2022-42494", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42494", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42494 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:37Z", + "updated_at": "2022-12-23T21:54:37Z", + "pushed_at": "2022-12-23T21:54:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42497.json b/2022/CVE-2022-42497.json deleted file mode 100644 index 1f4652b0e7..0000000000 --- a/2022/CVE-2022-42497.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584688, - "name": "CVE-2022-42497", - "full_name": "Live-Hack-CVE\/CVE-2022-42497", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42497", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42497 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:18:12Z", - "updated_at": "2022-12-23T16:18:12Z", - "pushed_at": "2022-12-23T16:18:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42533.json b/2022/CVE-2022-42533.json deleted file mode 100644 index 3885b91749..0000000000 --- a/2022/CVE-2022-42533.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575312, - "name": "CVE-2022-42533", - "full_name": "Live-Hack-CVE\/CVE-2022-42533", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42533", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42533 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:28Z", - "updated_at": "2022-12-23T15:43:28Z", - "pushed_at": "2022-12-23T15:43:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42698.json b/2022/CVE-2022-42698.json deleted file mode 100644 index 84fa68b110..0000000000 --- a/2022/CVE-2022-42698.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584578, - "name": "CVE-2022-42698", - "full_name": "Live-Hack-CVE\/CVE-2022-42698", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42698", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42698 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:49Z", - "updated_at": "2022-12-23T16:17:49Z", - "pushed_at": "2022-12-23T16:17:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42707.json b/2022/CVE-2022-42707.json new file mode 100644 index 0000000000..bb00adaa41 --- /dev/null +++ b/2022/CVE-2022-42707.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669770, + "name": "CVE-2022-42707", + "full_name": "Live-Hack-CVE\/CVE-2022-42707", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42707", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42707 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:50Z", + "updated_at": "2022-12-23T22:32:50Z", + "pushed_at": "2022-12-23T22:32:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42719.json b/2022/CVE-2022-42719.json new file mode 100644 index 0000000000..c87ffe72ca --- /dev/null +++ b/2022/CVE-2022-42719.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682258, + "name": "CVE-2022-42719", + "full_name": "Live-Hack-CVE\/CVE-2022-42719", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42719", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42719 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:31Z", + "updated_at": "2022-12-23T23:52:31Z", + "pushed_at": "2022-12-23T23:52:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42720.json b/2022/CVE-2022-42720.json deleted file mode 100644 index bd199fd746..0000000000 --- a/2022/CVE-2022-42720.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584992, - "name": "CVE-2022-42720", - "full_name": "Live-Hack-CVE\/CVE-2022-42720", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42720", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42720 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:21Z", - "updated_at": "2022-12-23T16:19:21Z", - "pushed_at": "2022-12-23T16:19:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42721.json b/2022/CVE-2022-42721.json deleted file mode 100644 index 2a8f7e5e9f..0000000000 --- a/2022/CVE-2022-42721.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585002, - "name": "CVE-2022-42721", - "full_name": "Live-Hack-CVE\/CVE-2022-42721", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42721", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42721 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:25Z", - "updated_at": "2022-12-23T16:19:25Z", - "pushed_at": "2022-12-23T16:19:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42722.json b/2022/CVE-2022-42722.json deleted file mode 100644 index 922afe19ef..0000000000 --- a/2022/CVE-2022-42722.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585012, - "name": "CVE-2022-42722", - "full_name": "Live-Hack-CVE\/CVE-2022-42722", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42722", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42722 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:28Z", - "updated_at": "2022-12-23T16:19:28Z", - "pushed_at": "2022-12-23T16:19:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42725.json b/2022/CVE-2022-42725.json new file mode 100644 index 0000000000..680d6f1aac --- /dev/null +++ b/2022/CVE-2022-42725.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676582, + "name": "CVE-2022-42725", + "full_name": "Live-Hack-CVE\/CVE-2022-42725", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42725", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42725 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:14:28Z", + "updated_at": "2022-12-23T23:14:28Z", + "pushed_at": "2022-12-23T23:14:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42732.json b/2022/CVE-2022-42732.json deleted file mode 100644 index c421119557..0000000000 --- a/2022/CVE-2022-42732.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583841, - "name": "CVE-2022-42732", - "full_name": "Live-Hack-CVE\/CVE-2022-42732", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42732", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42732 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:08Z", - "updated_at": "2022-12-23T16:15:08Z", - "pushed_at": "2022-12-23T16:15:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42733.json b/2022/CVE-2022-42733.json deleted file mode 100644 index d1428d6e39..0000000000 --- a/2022/CVE-2022-42733.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583960, - "name": "CVE-2022-42733", - "full_name": "Live-Hack-CVE\/CVE-2022-42733", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42733", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42733 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:32Z", - "updated_at": "2022-12-23T16:15:32Z", - "pushed_at": "2022-12-23T16:15:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42734.json b/2022/CVE-2022-42734.json deleted file mode 100644 index f585f89760..0000000000 --- a/2022/CVE-2022-42734.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583901, - "name": "CVE-2022-42734", - "full_name": "Live-Hack-CVE\/CVE-2022-42734", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42734", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42734 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:22Z", - "updated_at": "2022-12-23T16:15:22Z", - "pushed_at": "2022-12-23T16:15:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42743.json b/2022/CVE-2022-42743.json new file mode 100644 index 0000000000..ed1cd7fbbf --- /dev/null +++ b/2022/CVE-2022-42743.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682061, + "name": "CVE-2022-42743", + "full_name": "Live-Hack-CVE\/CVE-2022-42743", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42743", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42743 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:22Z", + "updated_at": "2022-12-23T23:51:22Z", + "pushed_at": "2022-12-23T23:51:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42744.json b/2022/CVE-2022-42744.json new file mode 100644 index 0000000000..903ee2d5b4 --- /dev/null +++ b/2022/CVE-2022-42744.json @@ -0,0 +1,31 @@ +[ + { + "id": 581681980, + "name": "CVE-2022-42744", + "full_name": "Live-Hack-CVE\/CVE-2022-42744", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42744", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42744 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:50:56Z", + "updated_at": "2022-12-23T23:50:56Z", + "pushed_at": "2022-12-23T23:50:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42745.json b/2022/CVE-2022-42745.json new file mode 100644 index 0000000000..a5aad1869f --- /dev/null +++ b/2022/CVE-2022-42745.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682040, + "name": "CVE-2022-42745", + "full_name": "Live-Hack-CVE\/CVE-2022-42745", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42745", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42745 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:51:16Z", + "updated_at": "2022-12-23T23:51:16Z", + "pushed_at": "2022-12-23T23:51:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42750.json b/2022/CVE-2022-42750.json new file mode 100644 index 0000000000..96c36dd074 --- /dev/null +++ b/2022/CVE-2022-42750.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683045, + "name": "CVE-2022-42750", + "full_name": "Live-Hack-CVE\/CVE-2022-42750", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42750", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42750 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:25Z", + "updated_at": "2022-12-23T23:57:25Z", + "pushed_at": "2022-12-23T23:57:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42751.json b/2022/CVE-2022-42751.json new file mode 100644 index 0000000000..26134bd655 --- /dev/null +++ b/2022/CVE-2022-42751.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683021, + "name": "CVE-2022-42751", + "full_name": "Live-Hack-CVE\/CVE-2022-42751", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42751", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42751 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:16Z", + "updated_at": "2022-12-23T23:57:16Z", + "pushed_at": "2022-12-23T23:57:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42753.json b/2022/CVE-2022-42753.json new file mode 100644 index 0000000000..2197f9758b --- /dev/null +++ b/2022/CVE-2022-42753.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682206, + "name": "CVE-2022-42753", + "full_name": "Live-Hack-CVE\/CVE-2022-42753", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42753", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42753 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:52:14Z", + "updated_at": "2022-12-23T23:52:14Z", + "pushed_at": "2022-12-23T23:52:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42785.json b/2022/CVE-2022-42785.json deleted file mode 100644 index 4d8ae21b33..0000000000 --- a/2022/CVE-2022-42785.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585659, - "name": "CVE-2022-42785", - "full_name": "Live-Hack-CVE\/CVE-2022-42785", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42785", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42785 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:21:40Z", - "updated_at": "2022-12-23T16:21:40Z", - "pushed_at": "2022-12-23T16:21:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42786.json b/2022/CVE-2022-42786.json new file mode 100644 index 0000000000..684883cb09 --- /dev/null +++ b/2022/CVE-2022-42786.json @@ -0,0 +1,31 @@ +[ + { + "id": 581636550, + "name": "CVE-2022-42786", + "full_name": "Live-Hack-CVE\/CVE-2022-42786", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42786", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42786 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:44:01Z", + "updated_at": "2022-12-23T19:44:01Z", + "pushed_at": "2022-12-23T19:44:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42883.json b/2022/CVE-2022-42883.json deleted file mode 100644 index a166496e5a..0000000000 --- a/2022/CVE-2022-42883.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573320, - "name": "CVE-2022-42883", - "full_name": "Live-Hack-CVE\/CVE-2022-42883", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42883", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42883 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:37Z", - "updated_at": "2022-12-23T15:36:38Z", - "pushed_at": "2022-12-23T15:36:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json deleted file mode 100644 index f1690614d2..0000000000 --- a/2022/CVE-2022-42889.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581547929, - "name": "CVE-2022-42889", - "full_name": "Live-Hack-CVE\/CVE-2022-42889", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42889", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42889 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:10:45Z", - "updated_at": "2022-12-23T14:10:45Z", - "pushed_at": "2022-12-23T14:10:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42891.json b/2022/CVE-2022-42891.json deleted file mode 100644 index 36a003301a..0000000000 --- a/2022/CVE-2022-42891.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583926, - "name": "CVE-2022-42891", - "full_name": "Live-Hack-CVE\/CVE-2022-42891", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42891", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42891 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:25Z", - "updated_at": "2022-12-23T16:15:25Z", - "pushed_at": "2022-12-23T16:15:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42892.json b/2022/CVE-2022-42892.json deleted file mode 100644 index b1031b7517..0000000000 --- a/2022/CVE-2022-42892.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583948, - "name": "CVE-2022-42892", - "full_name": "Live-Hack-CVE\/CVE-2022-42892", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42892", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42892 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:15:28Z", - "updated_at": "2022-12-23T16:15:29Z", - "pushed_at": "2022-12-23T16:15:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42893.json b/2022/CVE-2022-42893.json deleted file mode 100644 index 5702418d6a..0000000000 --- a/2022/CVE-2022-42893.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584928, - "name": "CVE-2022-42893", - "full_name": "Live-Hack-CVE\/CVE-2022-42893", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42893", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42893 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:04Z", - "updated_at": "2022-12-23T16:19:04Z", - "pushed_at": "2022-12-23T16:19:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42894.json b/2022/CVE-2022-42894.json deleted file mode 100644 index 6ba61270d7..0000000000 --- a/2022/CVE-2022-42894.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585241, - "name": "CVE-2022-42894", - "full_name": "Live-Hack-CVE\/CVE-2022-42894", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42894", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42894 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:17Z", - "updated_at": "2022-12-23T16:20:17Z", - "pushed_at": "2022-12-23T16:20:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42895.json b/2022/CVE-2022-42895.json deleted file mode 100644 index e88c54d002..0000000000 --- a/2022/CVE-2022-42895.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581559983, - "name": "CVE-2022-42895", - "full_name": "Live-Hack-CVE\/CVE-2022-42895", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42895", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42895 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:05Z", - "updated_at": "2022-12-23T14:51:05Z", - "pushed_at": "2022-12-23T14:51:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42903.json b/2022/CVE-2022-42903.json deleted file mode 100644 index 43c6c35352..0000000000 --- a/2022/CVE-2022-42903.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573706, - "name": "CVE-2022-42903", - "full_name": "Live-Hack-CVE\/CVE-2022-42903", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42903", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42903 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:37:56Z", - "updated_at": "2022-12-23T15:37:56Z", - "pushed_at": "2022-12-23T15:37:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42904.json b/2022/CVE-2022-42904.json deleted file mode 100644 index 54d0c99305..0000000000 --- a/2022/CVE-2022-42904.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573928, - "name": "CVE-2022-42904", - "full_name": "Live-Hack-CVE\/CVE-2022-42904", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42904", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42904 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:37Z", - "updated_at": "2022-12-23T15:38:37Z", - "pushed_at": "2022-12-23T15:38:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42905.json b/2022/CVE-2022-42905.json deleted file mode 100644 index d5f3c65f61..0000000000 --- a/2022/CVE-2022-42905.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562573, - "name": "CVE-2022-42905", - "full_name": "Live-Hack-CVE\/CVE-2022-42905", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42905", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42905 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:22Z", - "updated_at": "2022-12-23T14:59:22Z", - "pushed_at": "2022-12-23T14:59:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42955.json b/2022/CVE-2022-42955.json new file mode 100644 index 0000000000..f5b272df03 --- /dev/null +++ b/2022/CVE-2022-42955.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669921, + "name": "CVE-2022-42955", + "full_name": "Live-Hack-CVE\/CVE-2022-42955", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42955", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42955 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:31Z", + "updated_at": "2022-12-23T22:33:32Z", + "pushed_at": "2022-12-23T22:33:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42956.json b/2022/CVE-2022-42956.json new file mode 100644 index 0000000000..62e21fad3b --- /dev/null +++ b/2022/CVE-2022-42956.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669934, + "name": "CVE-2022-42956", + "full_name": "Live-Hack-CVE\/CVE-2022-42956", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42956", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42956 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:35Z", + "updated_at": "2022-12-23T22:33:35Z", + "pushed_at": "2022-12-23T22:33:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42960.json b/2022/CVE-2022-42960.json deleted file mode 100644 index ea7c956c61..0000000000 --- a/2022/CVE-2022-42960.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584941, - "name": "CVE-2022-42960", - "full_name": "Live-Hack-CVE\/CVE-2022-42960", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42960", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42960 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:07Z", - "updated_at": "2022-12-23T16:19:07Z", - "pushed_at": "2022-12-23T16:19:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42964.json b/2022/CVE-2022-42964.json new file mode 100644 index 0000000000..bd13e533b7 --- /dev/null +++ b/2022/CVE-2022-42964.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654440, + "name": "CVE-2022-42964", + "full_name": "Live-Hack-CVE\/CVE-2022-42964", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42964", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42964 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:22Z", + "updated_at": "2022-12-23T21:09:22Z", + "pushed_at": "2022-12-23T21:09:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42966.json b/2022/CVE-2022-42966.json new file mode 100644 index 0000000000..456e2b1b81 --- /dev/null +++ b/2022/CVE-2022-42966.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654453, + "name": "CVE-2022-42966", + "full_name": "Live-Hack-CVE\/CVE-2022-42966", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42966", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42966 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:25Z", + "updated_at": "2022-12-23T21:09:25Z", + "pushed_at": "2022-12-23T21:09:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-42982.json b/2022/CVE-2022-42982.json deleted file mode 100644 index 942ca60f49..0000000000 --- a/2022/CVE-2022-42982.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584391, - "name": "CVE-2022-42982", - "full_name": "Live-Hack-CVE\/CVE-2022-42982", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42982", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42982 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:08Z", - "updated_at": "2022-12-23T16:17:08Z", - "pushed_at": "2022-12-23T16:17:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42989.json b/2022/CVE-2022-42989.json deleted file mode 100644 index 833685e8d0..0000000000 --- a/2022/CVE-2022-42989.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562269, - "name": "CVE-2022-42989", - "full_name": "Live-Hack-CVE\/CVE-2022-42989", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42989", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42989 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:24Z", - "updated_at": "2022-12-23T14:58:24Z", - "pushed_at": "2022-12-23T14:58:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-42990.json b/2022/CVE-2022-42990.json new file mode 100644 index 0000000000..f9e6729b14 --- /dev/null +++ b/2022/CVE-2022-42990.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670369, + "name": "CVE-2022-42990", + "full_name": "Live-Hack-CVE\/CVE-2022-42990", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-42990", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-42990 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:03Z", + "updated_at": "2022-12-23T22:36:03Z", + "pushed_at": "2022-12-23T22:36:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43031.json b/2022/CVE-2022-43031.json new file mode 100644 index 0000000000..1feb75b839 --- /dev/null +++ b/2022/CVE-2022-43031.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654464, + "name": "CVE-2022-43031", + "full_name": "Live-Hack-CVE\/CVE-2022-43031", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43031", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43031 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:29Z", + "updated_at": "2022-12-23T21:09:29Z", + "pushed_at": "2022-12-23T21:09:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43046.json b/2022/CVE-2022-43046.json new file mode 100644 index 0000000000..bd3642527b --- /dev/null +++ b/2022/CVE-2022-43046.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670535, + "name": "CVE-2022-43046", + "full_name": "Live-Hack-CVE\/CVE-2022-43046", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43046", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43046 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:02Z", + "updated_at": "2022-12-23T22:37:02Z", + "pushed_at": "2022-12-23T22:37:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43049.json b/2022/CVE-2022-43049.json new file mode 100644 index 0000000000..37eae20552 --- /dev/null +++ b/2022/CVE-2022-43049.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669959, + "name": "CVE-2022-43049", + "full_name": "Live-Hack-CVE\/CVE-2022-43049", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43049", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43049 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:33:44Z", + "updated_at": "2022-12-23T22:33:44Z", + "pushed_at": "2022-12-23T22:33:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43050.json b/2022/CVE-2022-43050.json new file mode 100644 index 0000000000..6f4ddb947f --- /dev/null +++ b/2022/CVE-2022-43050.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670054, + "name": "CVE-2022-43050", + "full_name": "Live-Hack-CVE\/CVE-2022-43050", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43050", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43050 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:17Z", + "updated_at": "2022-12-23T22:34:17Z", + "pushed_at": "2022-12-23T22:34:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43051.json b/2022/CVE-2022-43051.json new file mode 100644 index 0000000000..35b34fce23 --- /dev/null +++ b/2022/CVE-2022-43051.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670040, + "name": "CVE-2022-43051", + "full_name": "Live-Hack-CVE\/CVE-2022-43051", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43051", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43051 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:10Z", + "updated_at": "2022-12-23T22:34:10Z", + "pushed_at": "2022-12-23T22:34:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43052.json b/2022/CVE-2022-43052.json new file mode 100644 index 0000000000..2695b231e1 --- /dev/null +++ b/2022/CVE-2022-43052.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670045, + "name": "CVE-2022-43052", + "full_name": "Live-Hack-CVE\/CVE-2022-43052", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43052", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43052 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:14Z", + "updated_at": "2022-12-23T22:34:14Z", + "pushed_at": "2022-12-23T22:34:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43058.json b/2022/CVE-2022-43058.json new file mode 100644 index 0000000000..13ba132666 --- /dev/null +++ b/2022/CVE-2022-43058.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654474, + "name": "CVE-2022-43058", + "full_name": "Live-Hack-CVE\/CVE-2022-43058", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43058", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43058 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:32Z", + "updated_at": "2022-12-23T21:09:32Z", + "pushed_at": "2022-12-23T21:09:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43061.json b/2022/CVE-2022-43061.json new file mode 100644 index 0000000000..624528a1cd --- /dev/null +++ b/2022/CVE-2022-43061.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683095, + "name": "CVE-2022-43061", + "full_name": "Live-Hack-CVE\/CVE-2022-43061", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43061", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43061 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:46Z", + "updated_at": "2022-12-23T23:57:46Z", + "pushed_at": "2022-12-23T23:57:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43062.json b/2022/CVE-2022-43062.json new file mode 100644 index 0000000000..77666b6665 --- /dev/null +++ b/2022/CVE-2022-43062.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683103, + "name": "CVE-2022-43062", + "full_name": "Live-Hack-CVE\/CVE-2022-43062", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43062", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43062 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:49Z", + "updated_at": "2022-12-23T23:57:49Z", + "pushed_at": "2022-12-23T23:57:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43063.json b/2022/CVE-2022-43063.json new file mode 100644 index 0000000000..e57a76c4a7 --- /dev/null +++ b/2022/CVE-2022-43063.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683090, + "name": "CVE-2022-43063", + "full_name": "Live-Hack-CVE\/CVE-2022-43063", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43063", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43063 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:43Z", + "updated_at": "2022-12-23T23:57:43Z", + "pushed_at": "2022-12-23T23:57:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43071.json b/2022/CVE-2022-43071.json deleted file mode 100644 index 5454c23f91..0000000000 --- a/2022/CVE-2022-43071.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574387, - "name": "CVE-2022-43071", - "full_name": "Live-Hack-CVE\/CVE-2022-43071", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43071", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43071 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:09Z", - "updated_at": "2022-12-23T15:40:09Z", - "pushed_at": "2022-12-23T15:40:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43074.json b/2022/CVE-2022-43074.json new file mode 100644 index 0000000000..c18a8d5efa --- /dev/null +++ b/2022/CVE-2022-43074.json @@ -0,0 +1,31 @@ +[ + { + "id": 581637857, + "name": "CVE-2022-43074", + "full_name": "Live-Hack-CVE\/CVE-2022-43074", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43074", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43074 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:49:23Z", + "updated_at": "2022-12-23T19:49:23Z", + "pushed_at": "2022-12-23T19:49:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43096.json b/2022/CVE-2022-43096.json deleted file mode 100644 index fbeb2344e2..0000000000 --- a/2022/CVE-2022-43096.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581575328, - "name": "CVE-2022-43096", - "full_name": "Live-Hack-CVE\/CVE-2022-43096", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43096", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43096 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:43:32Z", - "updated_at": "2022-12-23T15:43:32Z", - "pushed_at": "2022-12-23T15:43:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43109.json b/2022/CVE-2022-43109.json new file mode 100644 index 0000000000..083823e560 --- /dev/null +++ b/2022/CVE-2022-43109.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682861, + "name": "CVE-2022-43109", + "full_name": "Live-Hack-CVE\/CVE-2022-43109", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43109", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43109 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:56:17Z", + "updated_at": "2022-12-23T23:56:17Z", + "pushed_at": "2022-12-23T23:56:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43117.json b/2022/CVE-2022-43117.json deleted file mode 100644 index d6edd95917..0000000000 --- a/2022/CVE-2022-43117.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572101, - "name": "CVE-2022-43117", - "full_name": "Live-Hack-CVE\/CVE-2022-43117", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43117", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43117 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:32:33Z", - "updated_at": "2022-12-23T15:32:33Z", - "pushed_at": "2022-12-23T15:32:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43118.json b/2022/CVE-2022-43118.json new file mode 100644 index 0000000000..666ac326ec --- /dev/null +++ b/2022/CVE-2022-43118.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662098, + "name": "CVE-2022-43118", + "full_name": "Live-Hack-CVE\/CVE-2022-43118", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43118", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43118 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:23Z", + "updated_at": "2022-12-23T21:49:23Z", + "pushed_at": "2022-12-23T21:49:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43119.json b/2022/CVE-2022-43119.json new file mode 100644 index 0000000000..4d09a32496 --- /dev/null +++ b/2022/CVE-2022-43119.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662088, + "name": "CVE-2022-43119", + "full_name": "Live-Hack-CVE\/CVE-2022-43119", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43119", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43119 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:49:20Z", + "updated_at": "2022-12-23T21:49:20Z", + "pushed_at": "2022-12-23T21:49:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43120.json b/2022/CVE-2022-43120.json new file mode 100644 index 0000000000..1e3637ac7c --- /dev/null +++ b/2022/CVE-2022-43120.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661907, + "name": "CVE-2022-43120", + "full_name": "Live-Hack-CVE\/CVE-2022-43120", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43120", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43120 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:48:23Z", + "updated_at": "2022-12-23T21:48:23Z", + "pushed_at": "2022-12-23T21:48:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43121.json b/2022/CVE-2022-43121.json new file mode 100644 index 0000000000..b87aad4262 --- /dev/null +++ b/2022/CVE-2022-43121.json @@ -0,0 +1,31 @@ +[ + { + "id": 581661765, + "name": "CVE-2022-43121", + "full_name": "Live-Hack-CVE\/CVE-2022-43121", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43121", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43121 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:47:47Z", + "updated_at": "2022-12-23T21:47:47Z", + "pushed_at": "2022-12-23T21:47:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43138.json b/2022/CVE-2022-43138.json deleted file mode 100644 index 38ce7472be..0000000000 --- a/2022/CVE-2022-43138.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595804, - "name": "CVE-2022-43138", - "full_name": "Live-Hack-CVE\/CVE-2022-43138", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43138", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43138 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:39Z", - "updated_at": "2022-12-23T16:59:39Z", - "pushed_at": "2022-12-23T16:59:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43140.json b/2022/CVE-2022-43140.json deleted file mode 100644 index d09304f76d..0000000000 --- a/2022/CVE-2022-43140.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595769, - "name": "CVE-2022-43140", - "full_name": "Live-Hack-CVE\/CVE-2022-43140", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43140", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43140 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:32Z", - "updated_at": "2022-12-23T16:59:32Z", - "pushed_at": "2022-12-23T16:59:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43142.json b/2022/CVE-2022-43142.json deleted file mode 100644 index 8117496303..0000000000 --- a/2022/CVE-2022-43142.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596202, - "name": "CVE-2022-43142", - "full_name": "Live-Hack-CVE\/CVE-2022-43142", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43142", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43142 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:02Z", - "updated_at": "2022-12-23T17:01:02Z", - "pushed_at": "2022-12-23T17:01:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43143.json b/2022/CVE-2022-43143.json deleted file mode 100644 index d0074d2979..0000000000 --- a/2022/CVE-2022-43143.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574021, - "name": "CVE-2022-43143", - "full_name": "Live-Hack-CVE\/CVE-2022-43143", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43143", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43143 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:54Z", - "updated_at": "2022-12-23T15:38:54Z", - "pushed_at": "2022-12-23T15:38:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43144.json b/2022/CVE-2022-43144.json new file mode 100644 index 0000000000..65836a6fdc --- /dev/null +++ b/2022/CVE-2022-43144.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662386, + "name": "CVE-2022-43144", + "full_name": "Live-Hack-CVE\/CVE-2022-43144", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43144", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43144 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:50:50Z", + "updated_at": "2022-12-23T21:50:50Z", + "pushed_at": "2022-12-23T21:50:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43162.json b/2022/CVE-2022-43162.json deleted file mode 100644 index ce91bdd867..0000000000 --- a/2022/CVE-2022-43162.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596159, - "name": "CVE-2022-43162", - "full_name": "Live-Hack-CVE\/CVE-2022-43162", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43162", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43162 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:51Z", - "updated_at": "2022-12-23T17:00:52Z", - "pushed_at": "2022-12-23T17:00:54Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43163.json b/2022/CVE-2022-43163.json deleted file mode 100644 index 028ea44977..0000000000 --- a/2022/CVE-2022-43163.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596175, - "name": "CVE-2022-43163", - "full_name": "Live-Hack-CVE\/CVE-2022-43163", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43163", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43163 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:55Z", - "updated_at": "2022-12-23T17:00:55Z", - "pushed_at": "2022-12-23T17:00:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43171.json b/2022/CVE-2022-43171.json deleted file mode 100644 index 2d602a2cc4..0000000000 --- a/2022/CVE-2022-43171.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583490, - "name": "CVE-2022-43171", - "full_name": "Live-Hack-CVE\/CVE-2022-43171", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43171", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43171 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:13:50Z", - "updated_at": "2022-12-23T16:13:50Z", - "pushed_at": "2022-12-23T16:13:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43179.json b/2022/CVE-2022-43179.json deleted file mode 100644 index e81d732390..0000000000 --- a/2022/CVE-2022-43179.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596190, - "name": "CVE-2022-43179", - "full_name": "Live-Hack-CVE\/CVE-2022-43179", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43179", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43179 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:58Z", - "updated_at": "2022-12-23T17:00:59Z", - "pushed_at": "2022-12-23T17:01:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43183.json b/2022/CVE-2022-43183.json deleted file mode 100644 index 5206704b64..0000000000 --- a/2022/CVE-2022-43183.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586272, - "name": "CVE-2022-43183", - "full_name": "Live-Hack-CVE\/CVE-2022-43183", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43183", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43183 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:50Z", - "updated_at": "2022-12-23T16:23:50Z", - "pushed_at": "2022-12-23T16:23:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43192.json b/2022/CVE-2022-43192.json deleted file mode 100644 index 14139b8c7a..0000000000 --- a/2022/CVE-2022-43192.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573785, - "name": "CVE-2022-43192", - "full_name": "Live-Hack-CVE\/CVE-2022-43192", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43192", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43192 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:10Z", - "updated_at": "2022-12-23T15:38:10Z", - "pushed_at": "2022-12-23T15:38:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43196.json b/2022/CVE-2022-43196.json deleted file mode 100644 index 441182afa2..0000000000 --- a/2022/CVE-2022-43196.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549669, - "name": "CVE-2022-43196", - "full_name": "Live-Hack-CVE\/CVE-2022-43196", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43196", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43196 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:30Z", - "updated_at": "2022-12-23T14:16:30Z", - "pushed_at": "2022-12-23T14:16:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43212.json b/2022/CVE-2022-43212.json deleted file mode 100644 index 0bc4b99c09..0000000000 --- a/2022/CVE-2022-43212.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550698, - "name": "CVE-2022-43212", - "full_name": "Live-Hack-CVE\/CVE-2022-43212", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43212", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43212 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:44Z", - "updated_at": "2022-12-23T14:19:44Z", - "pushed_at": "2022-12-23T14:19:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43213.json b/2022/CVE-2022-43213.json deleted file mode 100644 index ddb8f1fb49..0000000000 --- a/2022/CVE-2022-43213.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549503, - "name": "CVE-2022-43213", - "full_name": "Live-Hack-CVE\/CVE-2022-43213", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43213", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43213 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:59Z", - "updated_at": "2022-12-23T14:15:59Z", - "pushed_at": "2022-12-23T14:16:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43214.json b/2022/CVE-2022-43214.json deleted file mode 100644 index a74afe0538..0000000000 --- a/2022/CVE-2022-43214.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572459, - "name": "CVE-2022-43214", - "full_name": "Live-Hack-CVE\/CVE-2022-43214", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43214", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43214 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:44Z", - "updated_at": "2022-12-23T15:33:44Z", - "pushed_at": "2022-12-23T15:33:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43215.json b/2022/CVE-2022-43215.json deleted file mode 100644 index e39f557b5e..0000000000 --- a/2022/CVE-2022-43215.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572445, - "name": "CVE-2022-43215", - "full_name": "Live-Hack-CVE\/CVE-2022-43215", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43215", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43215 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:41Z", - "updated_at": "2022-12-23T15:33:41Z", - "pushed_at": "2022-12-23T15:33:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43256.json b/2022/CVE-2022-43256.json new file mode 100644 index 0000000000..994a03cf15 --- /dev/null +++ b/2022/CVE-2022-43256.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627241, + "name": "CVE-2022-43256", + "full_name": "Live-Hack-CVE\/CVE-2022-43256", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43256", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43256 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:25Z", + "updated_at": "2022-12-23T19:02:25Z", + "pushed_at": "2022-12-23T19:02:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43262.json b/2022/CVE-2022-43262.json new file mode 100644 index 0000000000..f68e22770e --- /dev/null +++ b/2022/CVE-2022-43262.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627255, + "name": "CVE-2022-43262", + "full_name": "Live-Hack-CVE\/CVE-2022-43262", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43262", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43262 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:29Z", + "updated_at": "2022-12-23T19:02:29Z", + "pushed_at": "2022-12-23T19:02:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43263.json b/2022/CVE-2022-43263.json new file mode 100644 index 0000000000..6b78bc97a3 --- /dev/null +++ b/2022/CVE-2022-43263.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627219, + "name": "CVE-2022-43263", + "full_name": "Live-Hack-CVE\/CVE-2022-43263", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43263", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43263 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:21Z", + "updated_at": "2022-12-23T19:02:21Z", + "pushed_at": "2022-12-23T19:02:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43277.json b/2022/CVE-2022-43277.json new file mode 100644 index 0000000000..ad0741fc88 --- /dev/null +++ b/2022/CVE-2022-43277.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662458, + "name": "CVE-2022-43277", + "full_name": "Live-Hack-CVE\/CVE-2022-43277", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43277", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43277 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:13Z", + "updated_at": "2022-12-23T21:51:13Z", + "pushed_at": "2022-12-23T21:51:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43278.json b/2022/CVE-2022-43278.json new file mode 100644 index 0000000000..341f6b9b1f --- /dev/null +++ b/2022/CVE-2022-43278.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662444, + "name": "CVE-2022-43278", + "full_name": "Live-Hack-CVE\/CVE-2022-43278", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43278", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43278 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:10Z", + "updated_at": "2022-12-23T21:51:10Z", + "pushed_at": "2022-12-23T21:51:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43288.json b/2022/CVE-2022-43288.json new file mode 100644 index 0000000000..d564a590d7 --- /dev/null +++ b/2022/CVE-2022-43288.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626498, + "name": "CVE-2022-43288", + "full_name": "Live-Hack-CVE\/CVE-2022-43288", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43288", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43288 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:28Z", + "updated_at": "2022-12-23T18:59:28Z", + "pushed_at": "2022-12-23T18:59:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43290.json b/2022/CVE-2022-43290.json new file mode 100644 index 0000000000..505cd694b5 --- /dev/null +++ b/2022/CVE-2022-43290.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654242, + "name": "CVE-2022-43290", + "full_name": "Live-Hack-CVE\/CVE-2022-43290", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43290", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43290 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:25Z", + "updated_at": "2022-12-23T21:08:25Z", + "pushed_at": "2022-12-23T21:08:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43291.json b/2022/CVE-2022-43291.json new file mode 100644 index 0000000000..3b26e86b19 --- /dev/null +++ b/2022/CVE-2022-43291.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654252, + "name": "CVE-2022-43291", + "full_name": "Live-Hack-CVE\/CVE-2022-43291", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43291", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43291 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:28Z", + "updated_at": "2022-12-23T21:08:28Z", + "pushed_at": "2022-12-23T21:08:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43292.json b/2022/CVE-2022-43292.json new file mode 100644 index 0000000000..aceab63883 --- /dev/null +++ b/2022/CVE-2022-43292.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654266, + "name": "CVE-2022-43292", + "full_name": "Live-Hack-CVE\/CVE-2022-43292", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43292", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43292 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:32Z", + "updated_at": "2022-12-23T21:08:32Z", + "pushed_at": "2022-12-23T21:08:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43303.json b/2022/CVE-2022-43303.json new file mode 100644 index 0000000000..f7c9b77f63 --- /dev/null +++ b/2022/CVE-2022-43303.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669605, + "name": "CVE-2022-43303", + "full_name": "Live-Hack-CVE\/CVE-2022-43303", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43303", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43303 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:52Z", + "updated_at": "2022-12-23T22:31:52Z", + "pushed_at": "2022-12-23T22:31:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43304.json b/2022/CVE-2022-43304.json new file mode 100644 index 0000000000..7b8fb2392b --- /dev/null +++ b/2022/CVE-2022-43304.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669520, + "name": "CVE-2022-43304", + "full_name": "Live-Hack-CVE\/CVE-2022-43304", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43304", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43304 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:24Z", + "updated_at": "2022-12-23T22:31:24Z", + "pushed_at": "2022-12-23T22:31:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43305.json b/2022/CVE-2022-43305.json new file mode 100644 index 0000000000..258cbf97cd --- /dev/null +++ b/2022/CVE-2022-43305.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669497, + "name": "CVE-2022-43305", + "full_name": "Live-Hack-CVE\/CVE-2022-43305", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43305", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43305 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:17Z", + "updated_at": "2022-12-23T22:31:17Z", + "pushed_at": "2022-12-23T22:31:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43306.json b/2022/CVE-2022-43306.json new file mode 100644 index 0000000000..1a5380cc42 --- /dev/null +++ b/2022/CVE-2022-43306.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669483, + "name": "CVE-2022-43306", + "full_name": "Live-Hack-CVE\/CVE-2022-43306", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43306", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43306 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:14Z", + "updated_at": "2022-12-23T22:31:14Z", + "pushed_at": "2022-12-23T22:31:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43308.json b/2022/CVE-2022-43308.json deleted file mode 100644 index c28ae9a04f..0000000000 --- a/2022/CVE-2022-43308.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562611, - "name": "CVE-2022-43308", - "full_name": "Live-Hack-CVE\/CVE-2022-43308", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43308", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43308 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:32Z", - "updated_at": "2022-12-23T14:59:32Z", - "pushed_at": "2022-12-23T14:59:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43310.json b/2022/CVE-2022-43310.json new file mode 100644 index 0000000000..4cfc7bfccc --- /dev/null +++ b/2022/CVE-2022-43310.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645171, + "name": "CVE-2022-43310", + "full_name": "Live-Hack-CVE\/CVE-2022-43310", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43310", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43310 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:23:28Z", + "updated_at": "2022-12-23T20:23:28Z", + "pushed_at": "2022-12-23T20:23:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43317.json b/2022/CVE-2022-43317.json new file mode 100644 index 0000000000..53a9500c9c --- /dev/null +++ b/2022/CVE-2022-43317.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669620, + "name": "CVE-2022-43317", + "full_name": "Live-Hack-CVE\/CVE-2022-43317", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43317", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43317 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:59Z", + "updated_at": "2022-12-23T22:31:59Z", + "pushed_at": "2022-12-23T22:32:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43318.json b/2022/CVE-2022-43318.json new file mode 100644 index 0000000000..513ec77c48 --- /dev/null +++ b/2022/CVE-2022-43318.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669624, + "name": "CVE-2022-43318", + "full_name": "Live-Hack-CVE\/CVE-2022-43318", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43318", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43318 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:02Z", + "updated_at": "2022-12-23T22:32:02Z", + "pushed_at": "2022-12-23T22:32:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43319.json b/2022/CVE-2022-43319.json new file mode 100644 index 0000000000..2805f50b46 --- /dev/null +++ b/2022/CVE-2022-43319.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669736, + "name": "CVE-2022-43319", + "full_name": "Live-Hack-CVE\/CVE-2022-43319", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43319", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43319 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:40Z", + "updated_at": "2022-12-23T22:32:40Z", + "pushed_at": "2022-12-23T22:32:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43320.json b/2022/CVE-2022-43320.json new file mode 100644 index 0000000000..705c7bcf28 --- /dev/null +++ b/2022/CVE-2022-43320.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654163, + "name": "CVE-2022-43320", + "full_name": "Live-Hack-CVE\/CVE-2022-43320", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43320", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43320 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:02Z", + "updated_at": "2022-12-23T21:08:02Z", + "pushed_at": "2022-12-23T21:08:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43321.json b/2022/CVE-2022-43321.json new file mode 100644 index 0000000000..40a31c9e9e --- /dev/null +++ b/2022/CVE-2022-43321.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654219, + "name": "CVE-2022-43321", + "full_name": "Live-Hack-CVE\/CVE-2022-43321", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43321", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43321 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:08:18Z", + "updated_at": "2022-12-23T21:08:18Z", + "pushed_at": "2022-12-23T21:08:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43332.json b/2022/CVE-2022-43332.json deleted file mode 100644 index 8462d10455..0000000000 --- a/2022/CVE-2022-43332.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596127, - "name": "CVE-2022-43332", - "full_name": "Live-Hack-CVE\/CVE-2022-43332", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43332", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43332 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:45Z", - "updated_at": "2022-12-23T17:00:45Z", - "pushed_at": "2022-12-23T17:00:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43342.json b/2022/CVE-2022-43342.json new file mode 100644 index 0000000000..ab246ee6a8 --- /dev/null +++ b/2022/CVE-2022-43342.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626484, + "name": "CVE-2022-43342", + "full_name": "Live-Hack-CVE\/CVE-2022-43342", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43342", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43342 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T18:59:24Z", + "updated_at": "2022-12-23T18:59:24Z", + "pushed_at": "2022-12-23T18:59:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43343.json b/2022/CVE-2022-43343.json new file mode 100644 index 0000000000..989ab0a0df --- /dev/null +++ b/2022/CVE-2022-43343.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669414, + "name": "CVE-2022-43343", + "full_name": "Live-Hack-CVE\/CVE-2022-43343", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43343", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43343 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:47Z", + "updated_at": "2022-12-23T22:30:47Z", + "pushed_at": "2022-12-23T22:30:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43350.json b/2022/CVE-2022-43350.json new file mode 100644 index 0000000000..ede96d0fd8 --- /dev/null +++ b/2022/CVE-2022-43350.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670511, + "name": "CVE-2022-43350", + "full_name": "Live-Hack-CVE\/CVE-2022-43350", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43350", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43350 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:55Z", + "updated_at": "2022-12-23T22:36:55Z", + "pushed_at": "2022-12-23T22:36:57Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43351.json b/2022/CVE-2022-43351.json new file mode 100644 index 0000000000..bcd2ffcb6e --- /dev/null +++ b/2022/CVE-2022-43351.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670527, + "name": "CVE-2022-43351", + "full_name": "Live-Hack-CVE\/CVE-2022-43351", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43351", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43351 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:59Z", + "updated_at": "2022-12-23T22:36:59Z", + "pushed_at": "2022-12-23T22:37:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43352.json b/2022/CVE-2022-43352.json new file mode 100644 index 0000000000..45cafa842a --- /dev/null +++ b/2022/CVE-2022-43352.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670539, + "name": "CVE-2022-43352", + "full_name": "Live-Hack-CVE\/CVE-2022-43352", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43352", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43352 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:37:05Z", + "updated_at": "2022-12-23T22:37:05Z", + "pushed_at": "2022-12-23T22:37:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43359.json b/2022/CVE-2022-43359.json new file mode 100644 index 0000000000..b33ffa7d48 --- /dev/null +++ b/2022/CVE-2022-43359.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669116, + "name": "CVE-2022-43359", + "full_name": "Live-Hack-CVE\/CVE-2022-43359", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43359", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43359 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:16Z", + "updated_at": "2022-12-23T22:29:16Z", + "pushed_at": "2022-12-23T22:29:18Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43372.json b/2022/CVE-2022-43372.json new file mode 100644 index 0000000000..ac853e618a --- /dev/null +++ b/2022/CVE-2022-43372.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683038, + "name": "CVE-2022-43372", + "full_name": "Live-Hack-CVE\/CVE-2022-43372", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43372", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43372 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:22Z", + "updated_at": "2022-12-23T23:57:22Z", + "pushed_at": "2022-12-23T23:57:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43397.json b/2022/CVE-2022-43397.json new file mode 100644 index 0000000000..beb7675352 --- /dev/null +++ b/2022/CVE-2022-43397.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669661, + "name": "CVE-2022-43397", + "full_name": "Live-Hack-CVE\/CVE-2022-43397", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43397", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43397 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:12Z", + "updated_at": "2022-12-23T22:32:12Z", + "pushed_at": "2022-12-23T22:32:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43398.json b/2022/CVE-2022-43398.json new file mode 100644 index 0000000000..034e379186 --- /dev/null +++ b/2022/CVE-2022-43398.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662558, + "name": "CVE-2022-43398", + "full_name": "Live-Hack-CVE\/CVE-2022-43398", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43398", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43398 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:39Z", + "updated_at": "2022-12-23T21:51:39Z", + "pushed_at": "2022-12-23T21:51:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43439.json b/2022/CVE-2022-43439.json new file mode 100644 index 0000000000..e9df9f6d37 --- /dev/null +++ b/2022/CVE-2022-43439.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662517, + "name": "CVE-2022-43439", + "full_name": "Live-Hack-CVE\/CVE-2022-43439", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43439", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43439 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:30Z", + "updated_at": "2022-12-23T21:51:30Z", + "pushed_at": "2022-12-23T21:51:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43447.json b/2022/CVE-2022-43447.json deleted file mode 100644 index 9007d68121..0000000000 --- a/2022/CVE-2022-43447.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596001, - "name": "CVE-2022-43447", - "full_name": "Live-Hack-CVE\/CVE-2022-43447", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43447", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43447 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:22Z", - "updated_at": "2022-12-23T17:00:23Z", - "pushed_at": "2022-12-23T17:00:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43449.json b/2022/CVE-2022-43449.json new file mode 100644 index 0000000000..352bbd7431 --- /dev/null +++ b/2022/CVE-2022-43449.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677123, + "name": "CVE-2022-43449", + "full_name": "Live-Hack-CVE\/CVE-2022-43449", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43449", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43449 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:54Z", + "updated_at": "2022-12-23T23:17:54Z", + "pushed_at": "2022-12-23T23:17:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43451.json b/2022/CVE-2022-43451.json new file mode 100644 index 0000000000..ae5d0e6e6d --- /dev/null +++ b/2022/CVE-2022-43451.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677129, + "name": "CVE-2022-43451", + "full_name": "Live-Hack-CVE\/CVE-2022-43451", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43451", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43451 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:17:57Z", + "updated_at": "2022-12-23T23:17:57Z", + "pushed_at": "2022-12-23T23:18:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43452.json b/2022/CVE-2022-43452.json deleted file mode 100644 index 6c48a21e6a..0000000000 --- a/2022/CVE-2022-43452.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596093, - "name": "CVE-2022-43452", - "full_name": "Live-Hack-CVE\/CVE-2022-43452", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43452", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43452 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:38Z", - "updated_at": "2022-12-23T17:00:38Z", - "pushed_at": "2022-12-23T17:00:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43457.json b/2022/CVE-2022-43457.json deleted file mode 100644 index b851bcc2c4..0000000000 --- a/2022/CVE-2022-43457.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596072, - "name": "CVE-2022-43457", - "full_name": "Live-Hack-CVE\/CVE-2022-43457", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43457", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43457 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:34Z", - "updated_at": "2022-12-23T17:00:34Z", - "pushed_at": "2022-12-23T17:00:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43463.json b/2022/CVE-2022-43463.json deleted file mode 100644 index 1c739eefac..0000000000 --- a/2022/CVE-2022-43463.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586330, - "name": "CVE-2022-43463", - "full_name": "Live-Hack-CVE\/CVE-2022-43463", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43463", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43463 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:03Z", - "updated_at": "2022-12-23T16:24:03Z", - "pushed_at": "2022-12-23T16:24:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43481.json b/2022/CVE-2022-43481.json new file mode 100644 index 0000000000..4a034f6fb8 --- /dev/null +++ b/2022/CVE-2022-43481.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663070, + "name": "CVE-2022-43481", + "full_name": "Live-Hack-CVE\/CVE-2022-43481", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43481", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43481 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:34Z", + "updated_at": "2022-12-23T21:54:34Z", + "pushed_at": "2022-12-23T21:54:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43482.json b/2022/CVE-2022-43482.json deleted file mode 100644 index cba31692e1..0000000000 --- a/2022/CVE-2022-43482.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585428, - "name": "CVE-2022-43482", - "full_name": "Live-Hack-CVE\/CVE-2022-43482", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43482", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43482 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:59Z", - "updated_at": "2022-12-23T16:20:59Z", - "pushed_at": "2022-12-23T16:21:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43488.json b/2022/CVE-2022-43488.json new file mode 100644 index 0000000000..eb0f96f6bd --- /dev/null +++ b/2022/CVE-2022-43488.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662490, + "name": "CVE-2022-43488", + "full_name": "Live-Hack-CVE\/CVE-2022-43488", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43488", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43488 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:22Z", + "updated_at": "2022-12-23T21:51:22Z", + "pushed_at": "2022-12-23T21:51:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43491.json b/2022/CVE-2022-43491.json new file mode 100644 index 0000000000..cf63638099 --- /dev/null +++ b/2022/CVE-2022-43491.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663062, + "name": "CVE-2022-43491", + "full_name": "Live-Hack-CVE\/CVE-2022-43491", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43491", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43491 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:31Z", + "updated_at": "2022-12-23T21:54:31Z", + "pushed_at": "2022-12-23T21:54:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43492.json b/2022/CVE-2022-43492.json deleted file mode 100644 index 615644b1ee..0000000000 --- a/2022/CVE-2022-43492.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573284, - "name": "CVE-2022-43492", - "full_name": "Live-Hack-CVE\/CVE-2022-43492", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43492", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43492 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:31Z", - "updated_at": "2022-12-23T15:36:31Z", - "pushed_at": "2022-12-23T15:36:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43495.json b/2022/CVE-2022-43495.json new file mode 100644 index 0000000000..91ba510400 --- /dev/null +++ b/2022/CVE-2022-43495.json @@ -0,0 +1,31 @@ +[ + { + "id": 581677142, + "name": "CVE-2022-43495", + "full_name": "Live-Hack-CVE\/CVE-2022-43495", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43495", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43495 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:18:01Z", + "updated_at": "2022-12-23T23:18:01Z", + "pushed_at": "2022-12-23T23:18:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43506.json b/2022/CVE-2022-43506.json deleted file mode 100644 index 0f88ab8ad3..0000000000 --- a/2022/CVE-2022-43506.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595661, - "name": "CVE-2022-43506", - "full_name": "Live-Hack-CVE\/CVE-2022-43506", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43506", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43506 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:12Z", - "updated_at": "2022-12-23T16:59:12Z", - "pushed_at": "2022-12-23T16:59:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43545.json b/2022/CVE-2022-43545.json new file mode 100644 index 0000000000..f5d722092f --- /dev/null +++ b/2022/CVE-2022-43545.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662532, + "name": "CVE-2022-43545", + "full_name": "Live-Hack-CVE\/CVE-2022-43545", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43545", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43545 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:33Z", + "updated_at": "2022-12-23T21:51:33Z", + "pushed_at": "2022-12-23T21:51:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43546.json b/2022/CVE-2022-43546.json new file mode 100644 index 0000000000..8a3702ab3c --- /dev/null +++ b/2022/CVE-2022-43546.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662506, + "name": "CVE-2022-43546", + "full_name": "Live-Hack-CVE\/CVE-2022-43546", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43546", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43546 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:26Z", + "updated_at": "2022-12-23T21:51:26Z", + "pushed_at": "2022-12-23T21:51:28Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43561.json b/2022/CVE-2022-43561.json new file mode 100644 index 0000000000..8017dda484 --- /dev/null +++ b/2022/CVE-2022-43561.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676784, + "name": "CVE-2022-43561", + "full_name": "Live-Hack-CVE\/CVE-2022-43561", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43561", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43561 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:44Z", + "updated_at": "2022-12-23T23:15:44Z", + "pushed_at": "2022-12-23T23:15:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43562.json b/2022/CVE-2022-43562.json new file mode 100644 index 0000000000..968d8ad744 --- /dev/null +++ b/2022/CVE-2022-43562.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662429, + "name": "CVE-2022-43562", + "full_name": "Live-Hack-CVE\/CVE-2022-43562", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43562", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43562 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:03Z", + "updated_at": "2022-12-23T21:51:03Z", + "pushed_at": "2022-12-23T21:51:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43563.json b/2022/CVE-2022-43563.json new file mode 100644 index 0000000000..7c7282e9f0 --- /dev/null +++ b/2022/CVE-2022-43563.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670082, + "name": "CVE-2022-43563", + "full_name": "Live-Hack-CVE\/CVE-2022-43563", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43563", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43563 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:28Z", + "updated_at": "2022-12-23T22:34:28Z", + "pushed_at": "2022-12-23T22:34:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43564.json b/2022/CVE-2022-43564.json new file mode 100644 index 0000000000..3a229d2096 --- /dev/null +++ b/2022/CVE-2022-43564.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670097, + "name": "CVE-2022-43564", + "full_name": "Live-Hack-CVE\/CVE-2022-43564", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43564", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43564 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:34Z", + "updated_at": "2022-12-23T22:34:34Z", + "pushed_at": "2022-12-23T22:34:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43565.json b/2022/CVE-2022-43565.json new file mode 100644 index 0000000000..7a3632c211 --- /dev/null +++ b/2022/CVE-2022-43565.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670235, + "name": "CVE-2022-43565", + "full_name": "Live-Hack-CVE\/CVE-2022-43565", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43565", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43565 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:20Z", + "updated_at": "2022-12-23T22:35:20Z", + "pushed_at": "2022-12-23T22:35:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43566.json b/2022/CVE-2022-43566.json new file mode 100644 index 0000000000..cbec3b43f3 --- /dev/null +++ b/2022/CVE-2022-43566.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670258, + "name": "CVE-2022-43566", + "full_name": "Live-Hack-CVE\/CVE-2022-43566", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43566", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43566 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:35:27Z", + "updated_at": "2022-12-23T22:35:27Z", + "pushed_at": "2022-12-23T22:35:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43567.json b/2022/CVE-2022-43567.json new file mode 100644 index 0000000000..4f07ba8ef7 --- /dev/null +++ b/2022/CVE-2022-43567.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669147, + "name": "CVE-2022-43567", + "full_name": "Live-Hack-CVE\/CVE-2022-43567", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43567", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43567 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:26Z", + "updated_at": "2022-12-23T22:29:27Z", + "pushed_at": "2022-12-23T22:29:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43568.json b/2022/CVE-2022-43568.json new file mode 100644 index 0000000000..46338548ba --- /dev/null +++ b/2022/CVE-2022-43568.json @@ -0,0 +1,31 @@ +[ + { + "id": 581675830, + "name": "CVE-2022-43568", + "full_name": "Live-Hack-CVE\/CVE-2022-43568", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43568", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43568 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:09:37Z", + "updated_at": "2022-12-23T23:09:38Z", + "pushed_at": "2022-12-23T23:09:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43569.json b/2022/CVE-2022-43569.json new file mode 100644 index 0000000000..e7cfc03bff --- /dev/null +++ b/2022/CVE-2022-43569.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669245, + "name": "CVE-2022-43569", + "full_name": "Live-Hack-CVE\/CVE-2022-43569", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43569", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43569 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:58Z", + "updated_at": "2022-12-23T22:29:58Z", + "pushed_at": "2022-12-23T22:30:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43570.json b/2022/CVE-2022-43570.json new file mode 100644 index 0000000000..b86e9d2c6e --- /dev/null +++ b/2022/CVE-2022-43570.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669328, + "name": "CVE-2022-43570", + "full_name": "Live-Hack-CVE\/CVE-2022-43570", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43570", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43570 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:24Z", + "updated_at": "2022-12-23T22:30:24Z", + "pushed_at": "2022-12-23T22:30:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43571.json b/2022/CVE-2022-43571.json new file mode 100644 index 0000000000..99578a039c --- /dev/null +++ b/2022/CVE-2022-43571.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676776, + "name": "CVE-2022-43571", + "full_name": "Live-Hack-CVE\/CVE-2022-43571", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43571", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43571 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:15:41Z", + "updated_at": "2022-12-23T23:15:41Z", + "pushed_at": "2022-12-23T23:15:43Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43572.json b/2022/CVE-2022-43572.json new file mode 100644 index 0000000000..537abe8dee --- /dev/null +++ b/2022/CVE-2022-43572.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669339, + "name": "CVE-2022-43572", + "full_name": "Live-Hack-CVE\/CVE-2022-43572", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43572", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43572 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:27Z", + "updated_at": "2022-12-23T22:30:27Z", + "pushed_at": "2022-12-23T22:30:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43574.json b/2022/CVE-2022-43574.json new file mode 100644 index 0000000000..8a2f42d7c7 --- /dev/null +++ b/2022/CVE-2022-43574.json @@ -0,0 +1,31 @@ +[ + { + "id": 581682718, + "name": "CVE-2022-43574", + "full_name": "Live-Hack-CVE\/CVE-2022-43574", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43574", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43574 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:55:24Z", + "updated_at": "2022-12-23T23:55:24Z", + "pushed_at": "2022-12-23T23:55:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43588.json b/2022/CVE-2022-43588.json deleted file mode 100644 index d154c1437c..0000000000 --- a/2022/CVE-2022-43588.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524205, - "name": "CVE-2022-43588", - "full_name": "Live-Hack-CVE\/CVE-2022-43588", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43588", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43588 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:36Z", - "updated_at": "2022-12-23T12:47:36Z", - "pushed_at": "2022-12-23T12:47:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43589.json b/2022/CVE-2022-43589.json deleted file mode 100644 index 3761d20883..0000000000 --- a/2022/CVE-2022-43589.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524171, - "name": "CVE-2022-43589", - "full_name": "Live-Hack-CVE\/CVE-2022-43589", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43589", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43589 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:29Z", - "updated_at": "2022-12-23T12:47:29Z", - "pushed_at": "2022-12-23T12:47:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43590.json b/2022/CVE-2022-43590.json deleted file mode 100644 index 3bba7a27fe..0000000000 --- a/2022/CVE-2022-43590.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524188, - "name": "CVE-2022-43590", - "full_name": "Live-Hack-CVE\/CVE-2022-43590", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43590", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43590 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:32Z", - "updated_at": "2022-12-23T12:47:32Z", - "pushed_at": "2022-12-23T12:47:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43671.json b/2022/CVE-2022-43671.json new file mode 100644 index 0000000000..7f2d76009e --- /dev/null +++ b/2022/CVE-2022-43671.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628338, + "name": "CVE-2022-43671", + "full_name": "Live-Hack-CVE\/CVE-2022-43671", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43671", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43671 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:57Z", + "updated_at": "2022-12-23T19:06:57Z", + "pushed_at": "2022-12-23T19:06:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43673.json b/2022/CVE-2022-43673.json deleted file mode 100644 index 3d1885c3e2..0000000000 --- a/2022/CVE-2022-43673.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562557, - "name": "CVE-2022-43673", - "full_name": "Live-Hack-CVE\/CVE-2022-43673", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43673", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43673 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:19Z", - "updated_at": "2022-12-23T14:59:19Z", - "pushed_at": "2022-12-23T14:59:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43679.json b/2022/CVE-2022-43679.json new file mode 100644 index 0000000000..ea61f1136c --- /dev/null +++ b/2022/CVE-2022-43679.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638087, + "name": "CVE-2022-43679", + "full_name": "Live-Hack-CVE\/CVE-2022-43679", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43679", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43679 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:25Z", + "updated_at": "2022-12-23T19:50:25Z", + "pushed_at": "2022-12-23T19:50:27Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43685.json b/2022/CVE-2022-43685.json deleted file mode 100644 index 9bde28c994..0000000000 --- a/2022/CVE-2022-43685.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561925, - "name": "CVE-2022-43685", - "full_name": "Live-Hack-CVE\/CVE-2022-43685", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43685", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43685 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:23Z", - "updated_at": "2022-12-23T14:57:23Z", - "pushed_at": "2022-12-23T14:57:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43705.json b/2022/CVE-2022-43705.json deleted file mode 100644 index bf316bf350..0000000000 --- a/2022/CVE-2022-43705.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524531, - "name": "CVE-2022-43705", - "full_name": "Live-Hack-CVE\/CVE-2022-43705", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43705", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43705 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:29Z", - "updated_at": "2022-12-23T12:48:29Z", - "pushed_at": "2022-12-23T12:48:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43707.json b/2022/CVE-2022-43707.json deleted file mode 100644 index 02ceb2aa43..0000000000 --- a/2022/CVE-2022-43707.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574056, - "name": "CVE-2022-43707", - "full_name": "Live-Hack-CVE\/CVE-2022-43707", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43707", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43707 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:04Z", - "updated_at": "2022-12-23T15:39:04Z", - "pushed_at": "2022-12-23T15:39:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43708.json b/2022/CVE-2022-43708.json deleted file mode 100644 index fea75e9e6c..0000000000 --- a/2022/CVE-2022-43708.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574041, - "name": "CVE-2022-43708", - "full_name": "Live-Hack-CVE\/CVE-2022-43708", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43708", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43708 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:00Z", - "updated_at": "2022-12-23T15:39:01Z", - "pushed_at": "2022-12-23T15:39:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43709.json b/2022/CVE-2022-43709.json deleted file mode 100644 index 21213dc507..0000000000 --- a/2022/CVE-2022-43709.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574034, - "name": "CVE-2022-43709", - "full_name": "Live-Hack-CVE\/CVE-2022-43709", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43709", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43709 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:57Z", - "updated_at": "2022-12-23T15:38:57Z", - "pushed_at": "2022-12-23T15:38:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43751.json b/2022/CVE-2022-43751.json deleted file mode 100644 index f4aa267e16..0000000000 --- a/2022/CVE-2022-43751.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550579, - "name": "CVE-2022-43751", - "full_name": "Live-Hack-CVE\/CVE-2022-43751", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43751", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43751 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:24Z", - "updated_at": "2022-12-23T14:19:24Z", - "pushed_at": "2022-12-23T14:19:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43752.json b/2022/CVE-2022-43752.json new file mode 100644 index 0000000000..63533880bb --- /dev/null +++ b/2022/CVE-2022-43752.json @@ -0,0 +1,31 @@ +[ + { + "id": 581676877, + "name": "CVE-2022-43752", + "full_name": "Live-Hack-CVE\/CVE-2022-43752", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43752", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43752 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:16:23Z", + "updated_at": "2022-12-23T23:16:23Z", + "pushed_at": "2022-12-23T23:16:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43753.json b/2022/CVE-2022-43753.json new file mode 100644 index 0000000000..77a9308d90 --- /dev/null +++ b/2022/CVE-2022-43753.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628435, + "name": "CVE-2022-43753", + "full_name": "Live-Hack-CVE\/CVE-2022-43753", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43753", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43753 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:22Z", + "updated_at": "2022-12-23T19:07:22Z", + "pushed_at": "2022-12-23T19:07:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43754.json b/2022/CVE-2022-43754.json new file mode 100644 index 0000000000..7fac720c3c --- /dev/null +++ b/2022/CVE-2022-43754.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628499, + "name": "CVE-2022-43754", + "full_name": "Live-Hack-CVE\/CVE-2022-43754", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43754", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43754 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:07:39Z", + "updated_at": "2022-12-23T19:07:39Z", + "pushed_at": "2022-12-23T19:07:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43781.json b/2022/CVE-2022-43781.json deleted file mode 100644 index 1b8e30db23..0000000000 --- a/2022/CVE-2022-43781.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595841, - "name": "CVE-2022-43781", - "full_name": "Live-Hack-CVE\/CVE-2022-43781", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43781", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43781 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:49Z", - "updated_at": "2022-12-23T16:59:49Z", - "pushed_at": "2022-12-23T16:59:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43782.json b/2022/CVE-2022-43782.json deleted file mode 100644 index f91586eaf6..0000000000 --- a/2022/CVE-2022-43782.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595960, - "name": "CVE-2022-43782", - "full_name": "Live-Hack-CVE\/CVE-2022-43782", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43782", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43782 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:15Z", - "updated_at": "2022-12-23T17:00:15Z", - "pushed_at": "2022-12-23T17:00:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43958.json b/2022/CVE-2022-43958.json new file mode 100644 index 0000000000..afc5e26cf8 --- /dev/null +++ b/2022/CVE-2022-43958.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662419, + "name": "CVE-2022-43958", + "full_name": "Live-Hack-CVE\/CVE-2022-43958", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43958", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43958 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:00Z", + "updated_at": "2022-12-23T21:51:00Z", + "pushed_at": "2022-12-23T21:51:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-43983.json b/2022/CVE-2022-43983.json deleted file mode 100644 index f2c4e4a2e3..0000000000 --- a/2022/CVE-2022-43983.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536932, - "name": "CVE-2022-43983", - "full_name": "Live-Hack-CVE\/CVE-2022-43983", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43983", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43983 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:31Z", - "updated_at": "2022-12-23T13:32:32Z", - "pushed_at": "2022-12-23T13:32:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43984.json b/2022/CVE-2022-43984.json deleted file mode 100644 index 83c7a83f6a..0000000000 --- a/2022/CVE-2022-43984.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536915, - "name": "CVE-2022-43984", - "full_name": "Live-Hack-CVE\/CVE-2022-43984", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43984", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43984 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:28Z", - "updated_at": "2022-12-23T13:32:28Z", - "pushed_at": "2022-12-23T13:32:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-43999.json b/2022/CVE-2022-43999.json deleted file mode 100644 index 4db1fc8d99..0000000000 --- a/2022/CVE-2022-43999.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585295, - "name": "CVE-2022-43999", - "full_name": "Live-Hack-CVE\/CVE-2022-43999", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-43999", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-43999 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:28Z", - "updated_at": "2022-12-23T16:20:28Z", - "pushed_at": "2022-12-23T16:20:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44000.json b/2022/CVE-2022-44000.json deleted file mode 100644 index 1d0de802a7..0000000000 --- a/2022/CVE-2022-44000.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585276, - "name": "CVE-2022-44000", - "full_name": "Live-Hack-CVE\/CVE-2022-44000", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44000", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44000 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:25Z", - "updated_at": "2022-12-23T16:20:25Z", - "pushed_at": "2022-12-23T16:20:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44001.json b/2022/CVE-2022-44001.json deleted file mode 100644 index cd8adede7b..0000000000 --- a/2022/CVE-2022-44001.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596020, - "name": "CVE-2022-44001", - "full_name": "Live-Hack-CVE\/CVE-2022-44001", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44001", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44001 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:00:26Z", - "updated_at": "2022-12-23T17:00:26Z", - "pushed_at": "2022-12-23T17:00:28Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44002.json b/2022/CVE-2022-44002.json deleted file mode 100644 index ee7a74a364..0000000000 --- a/2022/CVE-2022-44002.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594840, - "name": "CVE-2022-44002", - "full_name": "Live-Hack-CVE\/CVE-2022-44002", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44002", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44002 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:56:05Z", - "updated_at": "2022-12-23T16:56:05Z", - "pushed_at": "2022-12-23T16:56:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44003.json b/2022/CVE-2022-44003.json deleted file mode 100644 index a80a251b46..0000000000 --- a/2022/CVE-2022-44003.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586570, - "name": "CVE-2022-44003", - "full_name": "Live-Hack-CVE\/CVE-2022-44003", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44003", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44003 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:54Z", - "updated_at": "2022-12-23T16:24:54Z", - "pushed_at": "2022-12-23T16:24:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44004.json b/2022/CVE-2022-44004.json deleted file mode 100644 index e65ac3fa76..0000000000 --- a/2022/CVE-2022-44004.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586584, - "name": "CVE-2022-44004", - "full_name": "Live-Hack-CVE\/CVE-2022-44004", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44004", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44004 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:57Z", - "updated_at": "2022-12-23T16:24:57Z", - "pushed_at": "2022-12-23T16:24:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44005.json b/2022/CVE-2022-44005.json deleted file mode 100644 index dcc436c68d..0000000000 --- a/2022/CVE-2022-44005.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585254, - "name": "CVE-2022-44005", - "full_name": "Live-Hack-CVE\/CVE-2022-44005", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44005", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44005 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:20Z", - "updated_at": "2022-12-23T16:20:20Z", - "pushed_at": "2022-12-23T16:20:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44006.json b/2022/CVE-2022-44006.json deleted file mode 100644 index 62bae17005..0000000000 --- a/2022/CVE-2022-44006.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586551, - "name": "CVE-2022-44006", - "full_name": "Live-Hack-CVE\/CVE-2022-44006", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44006", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44006 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:50Z", - "updated_at": "2022-12-23T16:24:50Z", - "pushed_at": "2022-12-23T16:24:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44007.json b/2022/CVE-2022-44007.json deleted file mode 100644 index f82bf634c3..0000000000 --- a/2022/CVE-2022-44007.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584912, - "name": "CVE-2022-44007", - "full_name": "Live-Hack-CVE\/CVE-2022-44007", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44007", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44007 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:19:01Z", - "updated_at": "2022-12-23T16:19:01Z", - "pushed_at": "2022-12-23T16:19:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44008.json b/2022/CVE-2022-44008.json deleted file mode 100644 index a604ec08b0..0000000000 --- a/2022/CVE-2022-44008.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585229, - "name": "CVE-2022-44008", - "full_name": "Live-Hack-CVE\/CVE-2022-44008", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44008", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44008 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:20:13Z", - "updated_at": "2022-12-23T16:20:13Z", - "pushed_at": "2022-12-23T16:20:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44020.json b/2022/CVE-2022-44020.json deleted file mode 100644 index 43e6e30f28..0000000000 --- a/2022/CVE-2022-44020.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538860, - "name": "CVE-2022-44020", - "full_name": "Live-Hack-CVE\/CVE-2022-44020", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44020", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44020 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:38:56Z", - "updated_at": "2022-12-23T13:38:56Z", - "pushed_at": "2022-12-23T13:38:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44048.json b/2022/CVE-2022-44048.json new file mode 100644 index 0000000000..20f61fee1c --- /dev/null +++ b/2022/CVE-2022-44048.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669464, + "name": "CVE-2022-44048", + "full_name": "Live-Hack-CVE\/CVE-2022-44048", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44048", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44048 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:07Z", + "updated_at": "2022-12-23T22:31:07Z", + "pushed_at": "2022-12-23T22:31:09Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44049.json b/2022/CVE-2022-44049.json new file mode 100644 index 0000000000..db4fb5d72f --- /dev/null +++ b/2022/CVE-2022-44049.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669471, + "name": "CVE-2022-44049", + "full_name": "Live-Hack-CVE\/CVE-2022-44049", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44049", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44049 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:11Z", + "updated_at": "2022-12-23T22:31:11Z", + "pushed_at": "2022-12-23T22:31:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44050.json b/2022/CVE-2022-44050.json new file mode 100644 index 0000000000..28cebc9850 --- /dev/null +++ b/2022/CVE-2022-44050.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669611, + "name": "CVE-2022-44050", + "full_name": "Live-Hack-CVE\/CVE-2022-44050", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44050", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44050 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:56Z", + "updated_at": "2022-12-23T22:31:56Z", + "pushed_at": "2022-12-23T22:31:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44051.json b/2022/CVE-2022-44051.json new file mode 100644 index 0000000000..6bad558d5f --- /dev/null +++ b/2022/CVE-2022-44051.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669680, + "name": "CVE-2022-44051", + "full_name": "Live-Hack-CVE\/CVE-2022-44051", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44051", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44051 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:19Z", + "updated_at": "2022-12-23T22:32:19Z", + "pushed_at": "2022-12-23T22:32:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44052.json b/2022/CVE-2022-44052.json new file mode 100644 index 0000000000..a24c537080 --- /dev/null +++ b/2022/CVE-2022-44052.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669730, + "name": "CVE-2022-44052", + "full_name": "Live-Hack-CVE\/CVE-2022-44052", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44052", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44052 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:36Z", + "updated_at": "2022-12-23T22:32:37Z", + "pushed_at": "2022-12-23T22:32:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44053.json b/2022/CVE-2022-44053.json new file mode 100644 index 0000000000..d0cad1c853 --- /dev/null +++ b/2022/CVE-2022-44053.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669667, + "name": "CVE-2022-44053", + "full_name": "Live-Hack-CVE\/CVE-2022-44053", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44053", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44053 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:16Z", + "updated_at": "2022-12-23T22:32:16Z", + "pushed_at": "2022-12-23T22:32:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44054.json b/2022/CVE-2022-44054.json new file mode 100644 index 0000000000..ed79c5a384 --- /dev/null +++ b/2022/CVE-2022-44054.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669691, + "name": "CVE-2022-44054", + "full_name": "Live-Hack-CVE\/CVE-2022-44054", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44054", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44054 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:32:23Z", + "updated_at": "2022-12-23T22:32:23Z", + "pushed_at": "2022-12-23T22:32:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44069.json b/2022/CVE-2022-44069.json new file mode 100644 index 0000000000..0c3915896f --- /dev/null +++ b/2022/CVE-2022-44069.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627333, + "name": "CVE-2022-44069", + "full_name": "Live-Hack-CVE\/CVE-2022-44069", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44069", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44069 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:50Z", + "updated_at": "2022-12-23T19:02:50Z", + "pushed_at": "2022-12-23T19:02:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44070.json b/2022/CVE-2022-44070.json new file mode 100644 index 0000000000..5cea7de98e --- /dev/null +++ b/2022/CVE-2022-44070.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627295, + "name": "CVE-2022-44070", + "full_name": "Live-Hack-CVE\/CVE-2022-44070", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44070", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44070 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:39Z", + "updated_at": "2022-12-23T19:02:39Z", + "pushed_at": "2022-12-23T19:02:42Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44071.json b/2022/CVE-2022-44071.json new file mode 100644 index 0000000000..b71bd17640 --- /dev/null +++ b/2022/CVE-2022-44071.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627273, + "name": "CVE-2022-44071", + "full_name": "Live-Hack-CVE\/CVE-2022-44071", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44071", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44071 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:32Z", + "updated_at": "2022-12-23T19:02:32Z", + "pushed_at": "2022-12-23T19:02:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44073.json b/2022/CVE-2022-44073.json new file mode 100644 index 0000000000..66e0a973bd --- /dev/null +++ b/2022/CVE-2022-44073.json @@ -0,0 +1,31 @@ +[ + { + "id": 581627308, + "name": "CVE-2022-44073", + "full_name": "Live-Hack-CVE\/CVE-2022-44073", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44073", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44073 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:02:43Z", + "updated_at": "2022-12-23T19:02:43Z", + "pushed_at": "2022-12-23T19:02:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44087.json b/2022/CVE-2022-44087.json new file mode 100644 index 0000000000..f1ea1c3786 --- /dev/null +++ b/2022/CVE-2022-44087.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638038, + "name": "CVE-2022-44087", + "full_name": "Live-Hack-CVE\/CVE-2022-44087", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44087", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44087 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:12Z", + "updated_at": "2022-12-23T19:50:12Z", + "pushed_at": "2022-12-23T19:50:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44088.json b/2022/CVE-2022-44088.json new file mode 100644 index 0000000000..f9ff31a311 --- /dev/null +++ b/2022/CVE-2022-44088.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638328, + "name": "CVE-2022-44088", + "full_name": "Live-Hack-CVE\/CVE-2022-44088", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44088", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44088 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:28Z", + "updated_at": "2022-12-23T19:51:28Z", + "pushed_at": "2022-12-23T19:51:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44089.json b/2022/CVE-2022-44089.json new file mode 100644 index 0000000000..55e7cf0b96 --- /dev/null +++ b/2022/CVE-2022-44089.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638051, + "name": "CVE-2022-44089", + "full_name": "Live-Hack-CVE\/CVE-2022-44089", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44089", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44089 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:15Z", + "updated_at": "2022-12-23T19:50:15Z", + "pushed_at": "2022-12-23T19:50:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44117.json b/2022/CVE-2022-44117.json deleted file mode 100644 index 20252e7f53..0000000000 --- a/2022/CVE-2022-44117.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549747, - "name": "CVE-2022-44117", - "full_name": "Live-Hack-CVE\/CVE-2022-44117", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44117", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44117 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:44Z", - "updated_at": "2022-12-23T14:16:44Z", - "pushed_at": "2022-12-23T14:16:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44118.json b/2022/CVE-2022-44118.json deleted file mode 100644 index 23c87d712b..0000000000 --- a/2022/CVE-2022-44118.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549492, - "name": "CVE-2022-44118", - "full_name": "Live-Hack-CVE\/CVE-2022-44118", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44118", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44118 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:56Z", - "updated_at": "2022-12-23T14:15:56Z", - "pushed_at": "2022-12-23T14:15:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44120.json b/2022/CVE-2022-44120.json deleted file mode 100644 index 44d846bbf7..0000000000 --- a/2022/CVE-2022-44120.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549645, - "name": "CVE-2022-44120", - "full_name": "Live-Hack-CVE\/CVE-2022-44120", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44120", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44120 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:27Z", - "updated_at": "2022-12-23T14:16:27Z", - "pushed_at": "2022-12-23T14:16:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44139.json b/2022/CVE-2022-44139.json deleted file mode 100644 index 1c2ce28852..0000000000 --- a/2022/CVE-2022-44139.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560464, - "name": "CVE-2022-44139", - "full_name": "Live-Hack-CVE\/CVE-2022-44139", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44139", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44139 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:33Z", - "updated_at": "2022-12-23T14:52:33Z", - "pushed_at": "2022-12-23T14:52:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44140.json b/2022/CVE-2022-44140.json deleted file mode 100644 index ffad91dc0e..0000000000 --- a/2022/CVE-2022-44140.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549606, - "name": "CVE-2022-44140", - "full_name": "Live-Hack-CVE\/CVE-2022-44140", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44140", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44140 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:20Z", - "updated_at": "2022-12-23T14:16:20Z", - "pushed_at": "2022-12-23T14:16:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44151.json b/2022/CVE-2022-44151.json deleted file mode 100644 index 1c57340997..0000000000 --- a/2022/CVE-2022-44151.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525218, - "name": "CVE-2022-44151", - "full_name": "Live-Hack-CVE\/CVE-2022-44151", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44151", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44151 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:02Z", - "updated_at": "2022-12-23T12:51:02Z", - "pushed_at": "2022-12-23T12:51:04Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44156.json b/2022/CVE-2022-44156.json deleted file mode 100644 index 8ba95eb806..0000000000 --- a/2022/CVE-2022-44156.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574933, - "name": "CVE-2022-44156", - "full_name": "Live-Hack-CVE\/CVE-2022-44156", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44156", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44156 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:42:04Z", - "updated_at": "2022-12-23T15:42:04Z", - "pushed_at": "2022-12-23T15:42:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44158.json b/2022/CVE-2022-44158.json deleted file mode 100644 index 54baa5c964..0000000000 --- a/2022/CVE-2022-44158.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574877, - "name": "CVE-2022-44158", - "full_name": "Live-Hack-CVE\/CVE-2022-44158", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44158", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44158 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:54Z", - "updated_at": "2022-12-23T15:41:54Z", - "pushed_at": "2022-12-23T15:41:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44163.json b/2022/CVE-2022-44163.json deleted file mode 100644 index 5dabd9a8fd..0000000000 --- a/2022/CVE-2022-44163.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574859, - "name": "CVE-2022-44163", - "full_name": "Live-Hack-CVE\/CVE-2022-44163", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44163", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44163 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:41:51Z", - "updated_at": "2022-12-23T15:41:51Z", - "pushed_at": "2022-12-23T15:41:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44167.json b/2022/CVE-2022-44167.json deleted file mode 100644 index 6db808b884..0000000000 --- a/2022/CVE-2022-44167.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583528, - "name": "CVE-2022-44167", - "full_name": "Live-Hack-CVE\/CVE-2022-44167", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44167", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44167 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:13:57Z", - "updated_at": "2022-12-23T16:13:57Z", - "pushed_at": "2022-12-23T16:13:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44168.json b/2022/CVE-2022-44168.json deleted file mode 100644 index 7251d0e8d2..0000000000 --- a/2022/CVE-2022-44168.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583561, - "name": "CVE-2022-44168", - "full_name": "Live-Hack-CVE\/CVE-2022-44168", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44168", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44168 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:04Z", - "updated_at": "2022-12-23T16:14:04Z", - "pushed_at": "2022-12-23T16:14:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44169.json b/2022/CVE-2022-44169.json deleted file mode 100644 index aa0dcb37f7..0000000000 --- a/2022/CVE-2022-44169.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583595, - "name": "CVE-2022-44169", - "full_name": "Live-Hack-CVE\/CVE-2022-44169", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44169", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44169 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:10Z", - "updated_at": "2022-12-23T16:14:10Z", - "pushed_at": "2022-12-23T16:14:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44171.json b/2022/CVE-2022-44171.json deleted file mode 100644 index 92772e16da..0000000000 --- a/2022/CVE-2022-44171.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581551055, - "name": "CVE-2022-44171", - "full_name": "Live-Hack-CVE\/CVE-2022-44171", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44171", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44171 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:54Z", - "updated_at": "2022-12-23T14:20:54Z", - "pushed_at": "2022-12-23T14:20:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44172.json b/2022/CVE-2022-44172.json deleted file mode 100644 index 23e09bc960..0000000000 --- a/2022/CVE-2022-44172.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581551040, - "name": "CVE-2022-44172", - "full_name": "Live-Hack-CVE\/CVE-2022-44172", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44172", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44172 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:51Z", - "updated_at": "2022-12-23T14:20:51Z", - "pushed_at": "2022-12-23T14:20:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44174.json b/2022/CVE-2022-44174.json deleted file mode 100644 index 304ccebb42..0000000000 --- a/2022/CVE-2022-44174.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581551025, - "name": "CVE-2022-44174", - "full_name": "Live-Hack-CVE\/CVE-2022-44174", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44174", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44174 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:48Z", - "updated_at": "2022-12-23T14:20:48Z", - "pushed_at": "2022-12-23T14:20:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44175.json b/2022/CVE-2022-44175.json deleted file mode 100644 index 2a23697710..0000000000 --- a/2022/CVE-2022-44175.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550990, - "name": "CVE-2022-44175", - "full_name": "Live-Hack-CVE\/CVE-2022-44175", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44175", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44175 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:40Z", - "updated_at": "2022-12-23T14:20:40Z", - "pushed_at": "2022-12-23T14:20:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44176.json b/2022/CVE-2022-44176.json deleted file mode 100644 index 671dc5bfb8..0000000000 --- a/2022/CVE-2022-44176.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581551000, - "name": "CVE-2022-44176", - "full_name": "Live-Hack-CVE\/CVE-2022-44176", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44176", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44176 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:44Z", - "updated_at": "2022-12-23T14:20:44Z", - "pushed_at": "2022-12-23T14:20:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44177.json b/2022/CVE-2022-44177.json deleted file mode 100644 index 8f87d1adb9..0000000000 --- a/2022/CVE-2022-44177.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550894, - "name": "CVE-2022-44177", - "full_name": "Live-Hack-CVE\/CVE-2022-44177", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44177", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44177 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:17Z", - "updated_at": "2022-12-23T14:20:18Z", - "pushed_at": "2022-12-23T14:20:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44178.json b/2022/CVE-2022-44178.json deleted file mode 100644 index cc56aaf23b..0000000000 --- a/2022/CVE-2022-44178.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550872, - "name": "CVE-2022-44178", - "full_name": "Live-Hack-CVE\/CVE-2022-44178", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44178", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44178 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:14Z", - "updated_at": "2022-12-23T14:20:14Z", - "pushed_at": "2022-12-23T14:20:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44180.json b/2022/CVE-2022-44180.json deleted file mode 100644 index a13ed8a8c3..0000000000 --- a/2022/CVE-2022-44180.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550852, - "name": "CVE-2022-44180", - "full_name": "Live-Hack-CVE\/CVE-2022-44180", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44180", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44180 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:20:11Z", - "updated_at": "2022-12-23T14:20:11Z", - "pushed_at": "2022-12-23T14:20:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44183.json b/2022/CVE-2022-44183.json deleted file mode 100644 index f74cf1d125..0000000000 --- a/2022/CVE-2022-44183.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581551089, - "name": "CVE-2022-44183", - "full_name": "Live-Hack-CVE\/CVE-2022-44183", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44183", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44183 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:21:01Z", - "updated_at": "2022-12-23T14:21:01Z", - "pushed_at": "2022-12-23T14:21:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44184.json b/2022/CVE-2022-44184.json deleted file mode 100644 index c57d38de43..0000000000 --- a/2022/CVE-2022-44184.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562312, - "name": "CVE-2022-44184", - "full_name": "Live-Hack-CVE\/CVE-2022-44184", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44184", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44184 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:31Z", - "updated_at": "2022-12-23T14:58:31Z", - "pushed_at": "2022-12-23T14:58:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44186.json b/2022/CVE-2022-44186.json deleted file mode 100644 index cfeba0f1ef..0000000000 --- a/2022/CVE-2022-44186.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562177, - "name": "CVE-2022-44186", - "full_name": "Live-Hack-CVE\/CVE-2022-44186", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44186", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44186 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:07Z", - "updated_at": "2022-12-23T14:58:07Z", - "pushed_at": "2022-12-23T14:58:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44187.json b/2022/CVE-2022-44187.json deleted file mode 100644 index b9a4b308c9..0000000000 --- a/2022/CVE-2022-44187.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562194, - "name": "CVE-2022-44187", - "full_name": "Live-Hack-CVE\/CVE-2022-44187", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44187", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44187 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:10Z", - "updated_at": "2022-12-23T14:58:10Z", - "pushed_at": "2022-12-23T14:58:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44188.json b/2022/CVE-2022-44188.json deleted file mode 100644 index 84fd4cc9a2..0000000000 --- a/2022/CVE-2022-44188.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562099, - "name": "CVE-2022-44188", - "full_name": "Live-Hack-CVE\/CVE-2022-44188", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44188", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44188 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:53Z", - "updated_at": "2022-12-23T14:57:53Z", - "pushed_at": "2022-12-23T14:57:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44190.json b/2022/CVE-2022-44190.json deleted file mode 100644 index b241994ee3..0000000000 --- a/2022/CVE-2022-44190.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562079, - "name": "CVE-2022-44190", - "full_name": "Live-Hack-CVE\/CVE-2022-44190", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44190", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44190 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:50Z", - "updated_at": "2022-12-23T14:57:50Z", - "pushed_at": "2022-12-23T14:57:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44191.json b/2022/CVE-2022-44191.json deleted file mode 100644 index b43da593f4..0000000000 --- a/2022/CVE-2022-44191.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561956, - "name": "CVE-2022-44191", - "full_name": "Live-Hack-CVE\/CVE-2022-44191", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44191", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44191 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:29Z", - "updated_at": "2022-12-23T14:57:29Z", - "pushed_at": "2022-12-23T14:57:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44193.json b/2022/CVE-2022-44193.json deleted file mode 100644 index 114eef84df..0000000000 --- a/2022/CVE-2022-44193.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562285, - "name": "CVE-2022-44193", - "full_name": "Live-Hack-CVE\/CVE-2022-44193", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44193", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44193 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:27Z", - "updated_at": "2022-12-23T14:58:27Z", - "pushed_at": "2022-12-23T14:58:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44194.json b/2022/CVE-2022-44194.json deleted file mode 100644 index 908b64d98b..0000000000 --- a/2022/CVE-2022-44194.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562244, - "name": "CVE-2022-44194", - "full_name": "Live-Hack-CVE\/CVE-2022-44194", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44194", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44194 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:20Z", - "updated_at": "2022-12-23T14:58:20Z", - "pushed_at": "2022-12-23T14:58:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44196.json b/2022/CVE-2022-44196.json deleted file mode 100644 index c0b09fcaff..0000000000 --- a/2022/CVE-2022-44196.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562230, - "name": "CVE-2022-44196", - "full_name": "Live-Hack-CVE\/CVE-2022-44196", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44196", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44196 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:17Z", - "updated_at": "2022-12-23T14:58:17Z", - "pushed_at": "2022-12-23T14:58:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44197.json b/2022/CVE-2022-44197.json deleted file mode 100644 index e887fa7c31..0000000000 --- a/2022/CVE-2022-44197.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562216, - "name": "CVE-2022-44197", - "full_name": "Live-Hack-CVE\/CVE-2022-44197", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44197", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44197 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:13Z", - "updated_at": "2022-12-23T14:58:13Z", - "pushed_at": "2022-12-23T14:58:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44198.json b/2022/CVE-2022-44198.json deleted file mode 100644 index 9fdea3abe6..0000000000 --- a/2022/CVE-2022-44198.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562516, - "name": "CVE-2022-44198", - "full_name": "Live-Hack-CVE\/CVE-2022-44198", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44198", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44198 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:09Z", - "updated_at": "2022-12-23T14:59:09Z", - "pushed_at": "2022-12-23T14:59:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44199.json b/2022/CVE-2022-44199.json deleted file mode 100644 index cc9d353d47..0000000000 --- a/2022/CVE-2022-44199.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562327, - "name": "CVE-2022-44199", - "full_name": "Live-Hack-CVE\/CVE-2022-44199", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44199", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44199 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:58:35Z", - "updated_at": "2022-12-23T14:58:35Z", - "pushed_at": "2022-12-23T14:58:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44200.json b/2022/CVE-2022-44200.json deleted file mode 100644 index 703dccf1ba..0000000000 --- a/2022/CVE-2022-44200.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562492, - "name": "CVE-2022-44200", - "full_name": "Live-Hack-CVE\/CVE-2022-44200", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44200", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44200 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:05Z", - "updated_at": "2022-12-23T14:59:06Z", - "pushed_at": "2022-12-23T14:59:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44201.json b/2022/CVE-2022-44201.json deleted file mode 100644 index aa9210fd66..0000000000 --- a/2022/CVE-2022-44201.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561860, - "name": "CVE-2022-44201", - "full_name": "Live-Hack-CVE\/CVE-2022-44201", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44201", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44201 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:12Z", - "updated_at": "2022-12-23T14:57:12Z", - "pushed_at": "2022-12-23T14:57:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44202.json b/2022/CVE-2022-44202.json deleted file mode 100644 index 45ad9b5e83..0000000000 --- a/2022/CVE-2022-44202.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561675, - "name": "CVE-2022-44202", - "full_name": "Live-Hack-CVE\/CVE-2022-44202", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44202", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44202 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:56:35Z", - "updated_at": "2022-12-23T14:56:36Z", - "pushed_at": "2022-12-23T14:56:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44204.json b/2022/CVE-2022-44204.json deleted file mode 100644 index 554aa647a1..0000000000 --- a/2022/CVE-2022-44204.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583452, - "name": "CVE-2022-44204", - "full_name": "Live-Hack-CVE\/CVE-2022-44204", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44204", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44204 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:13:43Z", - "updated_at": "2022-12-23T16:13:43Z", - "pushed_at": "2022-12-23T16:13:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44249.json b/2022/CVE-2022-44249.json deleted file mode 100644 index ef3ee4c548..0000000000 --- a/2022/CVE-2022-44249.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560295, - "name": "CVE-2022-44249", - "full_name": "Live-Hack-CVE\/CVE-2022-44249", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44249", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44249 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:03Z", - "updated_at": "2022-12-23T14:52:03Z", - "pushed_at": "2022-12-23T14:52:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44250.json b/2022/CVE-2022-44250.json deleted file mode 100644 index e20b8eabd2..0000000000 --- a/2022/CVE-2022-44250.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560226, - "name": "CVE-2022-44250", - "full_name": "Live-Hack-CVE\/CVE-2022-44250", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44250", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44250 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:53Z", - "updated_at": "2022-12-23T14:51:53Z", - "pushed_at": "2022-12-23T14:51:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44251.json b/2022/CVE-2022-44251.json deleted file mode 100644 index 9dc6a0327c..0000000000 --- a/2022/CVE-2022-44251.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560246, - "name": "CVE-2022-44251", - "full_name": "Live-Hack-CVE\/CVE-2022-44251", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44251", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44251 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:56Z", - "updated_at": "2022-12-23T14:51:56Z", - "pushed_at": "2022-12-23T14:51:58Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44252.json b/2022/CVE-2022-44252.json deleted file mode 100644 index 13127167d1..0000000000 --- a/2022/CVE-2022-44252.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560272, - "name": "CVE-2022-44252", - "full_name": "Live-Hack-CVE\/CVE-2022-44252", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44252", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44252 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:00Z", - "updated_at": "2022-12-23T14:52:00Z", - "pushed_at": "2022-12-23T14:52:02Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44253.json b/2022/CVE-2022-44253.json deleted file mode 100644 index 6c932dc58b..0000000000 --- a/2022/CVE-2022-44253.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560182, - "name": "CVE-2022-44253", - "full_name": "Live-Hack-CVE\/CVE-2022-44253", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44253", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44253 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:43Z", - "updated_at": "2022-12-23T14:51:43Z", - "pushed_at": "2022-12-23T14:51:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44254.json b/2022/CVE-2022-44254.json deleted file mode 100644 index 077ead293b..0000000000 --- a/2022/CVE-2022-44254.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560197, - "name": "CVE-2022-44254", - "full_name": "Live-Hack-CVE\/CVE-2022-44254", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44254", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44254 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:47Z", - "updated_at": "2022-12-23T14:51:47Z", - "pushed_at": "2022-12-23T14:51:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44255.json b/2022/CVE-2022-44255.json deleted file mode 100644 index 3a2e0ce2f0..0000000000 --- a/2022/CVE-2022-44255.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560209, - "name": "CVE-2022-44255", - "full_name": "Live-Hack-CVE\/CVE-2022-44255", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44255", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44255 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:50Z", - "updated_at": "2022-12-23T14:51:50Z", - "pushed_at": "2022-12-23T14:51:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44256.json b/2022/CVE-2022-44256.json deleted file mode 100644 index b66e978acf..0000000000 --- a/2022/CVE-2022-44256.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560085, - "name": "CVE-2022-44256", - "full_name": "Live-Hack-CVE\/CVE-2022-44256", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44256", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44256 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:25Z", - "updated_at": "2022-12-23T14:51:25Z", - "pushed_at": "2022-12-23T14:51:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44257.json b/2022/CVE-2022-44257.json deleted file mode 100644 index 160d76da6c..0000000000 --- a/2022/CVE-2022-44257.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560107, - "name": "CVE-2022-44257", - "full_name": "Live-Hack-CVE\/CVE-2022-44257", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44257", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44257 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:29Z", - "updated_at": "2022-12-23T14:51:29Z", - "pushed_at": "2022-12-23T14:51:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44258.json b/2022/CVE-2022-44258.json deleted file mode 100644 index be59fc5b79..0000000000 --- a/2022/CVE-2022-44258.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560121, - "name": "CVE-2022-44258", - "full_name": "Live-Hack-CVE\/CVE-2022-44258", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44258", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44258 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:32Z", - "updated_at": "2022-12-23T14:51:32Z", - "pushed_at": "2022-12-23T14:51:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44259.json b/2022/CVE-2022-44259.json deleted file mode 100644 index 7c8aa8b5e2..0000000000 --- a/2022/CVE-2022-44259.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560139, - "name": "CVE-2022-44259", - "full_name": "Live-Hack-CVE\/CVE-2022-44259", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44259", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44259 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:36Z", - "updated_at": "2022-12-23T14:51:36Z", - "pushed_at": "2022-12-23T14:51:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44260.json b/2022/CVE-2022-44260.json deleted file mode 100644 index ede2b7e258..0000000000 --- a/2022/CVE-2022-44260.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560164, - "name": "CVE-2022-44260", - "full_name": "Live-Hack-CVE\/CVE-2022-44260", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44260", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44260 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:51:39Z", - "updated_at": "2022-12-23T14:51:39Z", - "pushed_at": "2022-12-23T14:51:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44278.json b/2022/CVE-2022-44278.json deleted file mode 100644 index c5c435eda6..0000000000 --- a/2022/CVE-2022-44278.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550276, - "name": "CVE-2022-44278", - "full_name": "Live-Hack-CVE\/CVE-2022-44278", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44278", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44278 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:23Z", - "updated_at": "2022-12-23T14:18:23Z", - "pushed_at": "2022-12-23T14:18:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44279.json b/2022/CVE-2022-44279.json deleted file mode 100644 index da6b419ab0..0000000000 --- a/2022/CVE-2022-44279.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524274, - "name": "CVE-2022-44279", - "full_name": "Live-Hack-CVE\/CVE-2022-44279", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44279", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44279 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:46Z", - "updated_at": "2022-12-23T12:47:46Z", - "pushed_at": "2022-12-23T12:47:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44280.json b/2022/CVE-2022-44280.json deleted file mode 100644 index 612c4d1c45..0000000000 --- a/2022/CVE-2022-44280.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550261, - "name": "CVE-2022-44280", - "full_name": "Live-Hack-CVE\/CVE-2022-44280", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44280", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44280 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:18:20Z", - "updated_at": "2022-12-23T14:18:20Z", - "pushed_at": "2022-12-23T14:18:21Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44294.json b/2022/CVE-2022-44294.json deleted file mode 100644 index 44b47445ba..0000000000 --- a/2022/CVE-2022-44294.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525661, - "name": "CVE-2022-44294", - "full_name": "Live-Hack-CVE\/CVE-2022-44294", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44294", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44294 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:24Z", - "updated_at": "2022-12-23T12:52:24Z", - "pushed_at": "2022-12-23T12:52:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44295.json b/2022/CVE-2022-44295.json deleted file mode 100644 index 593da95386..0000000000 --- a/2022/CVE-2022-44295.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525675, - "name": "CVE-2022-44295", - "full_name": "Live-Hack-CVE\/CVE-2022-44295", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44295", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44295 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:27Z", - "updated_at": "2022-12-23T12:52:28Z", - "pushed_at": "2022-12-23T12:52:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44296.json b/2022/CVE-2022-44296.json deleted file mode 100644 index 88fcd36f93..0000000000 --- a/2022/CVE-2022-44296.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525689, - "name": "CVE-2022-44296", - "full_name": "Live-Hack-CVE\/CVE-2022-44296", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44296", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44296 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:52:31Z", - "updated_at": "2022-12-23T12:52:31Z", - "pushed_at": "2022-12-23T12:52:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44311.json b/2022/CVE-2022-44311.json new file mode 100644 index 0000000000..b95e611b05 --- /dev/null +++ b/2022/CVE-2022-44311.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662433, + "name": "CVE-2022-44311", + "full_name": "Live-Hack-CVE\/CVE-2022-44311", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44311", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44311 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:51:06Z", + "updated_at": "2022-12-23T21:51:06Z", + "pushed_at": "2022-12-23T21:51:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44312.json b/2022/CVE-2022-44312.json new file mode 100644 index 0000000000..ddaa82b7d0 --- /dev/null +++ b/2022/CVE-2022-44312.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669094, + "name": "CVE-2022-44312", + "full_name": "Live-Hack-CVE\/CVE-2022-44312", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44312", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44312 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:10Z", + "updated_at": "2022-12-23T22:29:10Z", + "pushed_at": "2022-12-23T22:29:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44313.json b/2022/CVE-2022-44313.json new file mode 100644 index 0000000000..fd9f875e59 --- /dev/null +++ b/2022/CVE-2022-44313.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668990, + "name": "CVE-2022-44313", + "full_name": "Live-Hack-CVE\/CVE-2022-44313", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44313", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44313 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:27Z", + "updated_at": "2022-12-23T22:28:27Z", + "pushed_at": "2022-12-23T22:28:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44314.json b/2022/CVE-2022-44314.json new file mode 100644 index 0000000000..5cc111098d --- /dev/null +++ b/2022/CVE-2022-44314.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668997, + "name": "CVE-2022-44314", + "full_name": "Live-Hack-CVE\/CVE-2022-44314", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44314", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44314 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:31Z", + "updated_at": "2022-12-23T22:28:31Z", + "pushed_at": "2022-12-23T22:28:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44315.json b/2022/CVE-2022-44315.json new file mode 100644 index 0000000000..ca36d4f238 --- /dev/null +++ b/2022/CVE-2022-44315.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669057, + "name": "CVE-2022-44315", + "full_name": "Live-Hack-CVE\/CVE-2022-44315", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44315", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44315 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:53Z", + "updated_at": "2022-12-23T22:28:53Z", + "pushed_at": "2022-12-23T22:28:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44316.json b/2022/CVE-2022-44316.json new file mode 100644 index 0000000000..3aaa17dc0f --- /dev/null +++ b/2022/CVE-2022-44316.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669063, + "name": "CVE-2022-44316", + "full_name": "Live-Hack-CVE\/CVE-2022-44316", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44316", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44316 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:56Z", + "updated_at": "2022-12-23T22:28:56Z", + "pushed_at": "2022-12-23T22:28:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44317.json b/2022/CVE-2022-44317.json new file mode 100644 index 0000000000..aca67ac2c1 --- /dev/null +++ b/2022/CVE-2022-44317.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669068, + "name": "CVE-2022-44317", + "full_name": "Live-Hack-CVE\/CVE-2022-44317", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44317", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44317 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:59Z", + "updated_at": "2022-12-23T22:29:00Z", + "pushed_at": "2022-12-23T22:29:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44318.json b/2022/CVE-2022-44318.json new file mode 100644 index 0000000000..35ab4f7816 --- /dev/null +++ b/2022/CVE-2022-44318.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669077, + "name": "CVE-2022-44318", + "full_name": "Live-Hack-CVE\/CVE-2022-44318", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44318", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44318 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:03Z", + "updated_at": "2022-12-23T22:29:03Z", + "pushed_at": "2022-12-23T22:29:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44319.json b/2022/CVE-2022-44319.json new file mode 100644 index 0000000000..0bc5ca6fc8 --- /dev/null +++ b/2022/CVE-2022-44319.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669084, + "name": "CVE-2022-44319", + "full_name": "Live-Hack-CVE\/CVE-2022-44319", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44319", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44319 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:06Z", + "updated_at": "2022-12-23T22:29:06Z", + "pushed_at": "2022-12-23T22:29:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44320.json b/2022/CVE-2022-44320.json new file mode 100644 index 0000000000..249b8b5cd9 --- /dev/null +++ b/2022/CVE-2022-44320.json @@ -0,0 +1,31 @@ +[ + { + "id": 581668983, + "name": "CVE-2022-44320", + "full_name": "Live-Hack-CVE\/CVE-2022-44320", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44320", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44320 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:28:24Z", + "updated_at": "2022-12-23T22:28:24Z", + "pushed_at": "2022-12-23T22:28:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44321.json b/2022/CVE-2022-44321.json new file mode 100644 index 0000000000..1657d5b8ef --- /dev/null +++ b/2022/CVE-2022-44321.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669103, + "name": "CVE-2022-44321", + "full_name": "Live-Hack-CVE\/CVE-2022-44321", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44321", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44321 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:13Z", + "updated_at": "2022-12-23T22:29:13Z", + "pushed_at": "2022-12-23T22:29:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44354.json b/2022/CVE-2022-44354.json deleted file mode 100644 index 618df6afa5..0000000000 --- a/2022/CVE-2022-44354.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524298, - "name": "CVE-2022-44354", - "full_name": "Live-Hack-CVE\/CVE-2022-44354", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44354", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44354 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:49Z", - "updated_at": "2022-12-23T12:47:49Z", - "pushed_at": "2022-12-23T12:47:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44355.json b/2022/CVE-2022-44355.json deleted file mode 100644 index 3f08db4a6d..0000000000 --- a/2022/CVE-2022-44355.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524247, - "name": "CVE-2022-44355", - "full_name": "Live-Hack-CVE\/CVE-2022-44355", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44355", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44355 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:42Z", - "updated_at": "2022-12-23T12:47:42Z", - "pushed_at": "2022-12-23T12:47:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44378.json b/2022/CVE-2022-44378.json deleted file mode 100644 index 485a5081d7..0000000000 --- a/2022/CVE-2022-44378.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586287, - "name": "CVE-2022-44378", - "full_name": "Live-Hack-CVE\/CVE-2022-44378", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44378", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44378 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:23:53Z", - "updated_at": "2022-12-23T16:23:53Z", - "pushed_at": "2022-12-23T16:23:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44379.json b/2022/CVE-2022-44379.json deleted file mode 100644 index 50243d3c08..0000000000 --- a/2022/CVE-2022-44379.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581586347, - "name": "CVE-2022-44379", - "full_name": "Live-Hack-CVE\/CVE-2022-44379", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44379", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44379 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:24:07Z", - "updated_at": "2022-12-23T16:24:07Z", - "pushed_at": "2022-12-23T16:24:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44384.json b/2022/CVE-2022-44384.json deleted file mode 100644 index 63389a7982..0000000000 --- a/2022/CVE-2022-44384.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595788, - "name": "CVE-2022-44384", - "full_name": "Live-Hack-CVE\/CVE-2022-44384", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44384", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44384 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:36Z", - "updated_at": "2022-12-23T16:59:36Z", - "pushed_at": "2022-12-23T16:59:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44390.json b/2022/CVE-2022-44390.json new file mode 100644 index 0000000000..b7c0947ffb --- /dev/null +++ b/2022/CVE-2022-44390.json @@ -0,0 +1,31 @@ +[ + { + "id": 581626965, + "name": "CVE-2022-44390", + "full_name": "Live-Hack-CVE\/CVE-2022-44390", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44390", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44390 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:01:11Z", + "updated_at": "2022-12-23T19:01:12Z", + "pushed_at": "2022-12-23T19:01:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44400.json b/2022/CVE-2022-44400.json deleted file mode 100644 index 6a2630b2b0..0000000000 --- a/2022/CVE-2022-44400.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550002, - "name": "CVE-2022-44400", - "full_name": "Live-Hack-CVE\/CVE-2022-44400", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44400", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44400 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:35Z", - "updated_at": "2022-12-23T14:17:35Z", - "pushed_at": "2022-12-23T14:17:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44401.json b/2022/CVE-2022-44401.json deleted file mode 100644 index f1e2c400ca..0000000000 --- a/2022/CVE-2022-44401.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549945, - "name": "CVE-2022-44401", - "full_name": "Live-Hack-CVE\/CVE-2022-44401", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44401", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44401 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:17:25Z", - "updated_at": "2022-12-23T14:17:25Z", - "pushed_at": "2022-12-23T14:17:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44402.json b/2022/CVE-2022-44402.json deleted file mode 100644 index 75f115ddae..0000000000 --- a/2022/CVE-2022-44402.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596215, - "name": "CVE-2022-44402", - "full_name": "Live-Hack-CVE\/CVE-2022-44402", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44402", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44402 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:05Z", - "updated_at": "2022-12-23T17:01:05Z", - "pushed_at": "2022-12-23T17:01:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44403.json b/2022/CVE-2022-44403.json deleted file mode 100644 index a707fbb603..0000000000 --- a/2022/CVE-2022-44403.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596232, - "name": "CVE-2022-44403", - "full_name": "Live-Hack-CVE\/CVE-2022-44403", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44403", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44403 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:01:09Z", - "updated_at": "2022-12-23T17:01:09Z", - "pushed_at": "2022-12-23T17:01:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44411.json b/2022/CVE-2022-44411.json deleted file mode 100644 index 6ad6a15146..0000000000 --- a/2022/CVE-2022-44411.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536969, - "name": "CVE-2022-44411", - "full_name": "Live-Hack-CVE\/CVE-2022-44411", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44411", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44411 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:38Z", - "updated_at": "2022-12-23T13:32:38Z", - "pushed_at": "2022-12-23T13:32:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44414.json b/2022/CVE-2022-44414.json deleted file mode 100644 index 53e689b341..0000000000 --- a/2022/CVE-2022-44414.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594578, - "name": "CVE-2022-44414", - "full_name": "Live-Hack-CVE\/CVE-2022-44414", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44414", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44414 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:08Z", - "updated_at": "2022-12-23T16:55:08Z", - "pushed_at": "2022-12-23T16:55:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44415.json b/2022/CVE-2022-44415.json deleted file mode 100644 index 4324216c24..0000000000 --- a/2022/CVE-2022-44415.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594592, - "name": "CVE-2022-44415", - "full_name": "Live-Hack-CVE\/CVE-2022-44415", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44415", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44415 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:12Z", - "updated_at": "2022-12-23T16:55:12Z", - "pushed_at": "2022-12-23T16:55:14Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44544.json b/2022/CVE-2022-44544.json new file mode 100644 index 0000000000..36ef8b863e --- /dev/null +++ b/2022/CVE-2022-44544.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654798, + "name": "CVE-2022-44544", + "full_name": "Live-Hack-CVE\/CVE-2022-44544", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44544", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44544 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:59Z", + "updated_at": "2022-12-23T21:10:59Z", + "pushed_at": "2022-12-23T21:11:01Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44546.json b/2022/CVE-2022-44546.json new file mode 100644 index 0000000000..72ee6d99e1 --- /dev/null +++ b/2022/CVE-2022-44546.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654587, + "name": "CVE-2022-44546", + "full_name": "Live-Hack-CVE\/CVE-2022-44546", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44546", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44546 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:58Z", + "updated_at": "2022-12-23T21:09:58Z", + "pushed_at": "2022-12-23T21:10:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44547.json b/2022/CVE-2022-44547.json new file mode 100644 index 0000000000..a9f8378d2b --- /dev/null +++ b/2022/CVE-2022-44547.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654602, + "name": "CVE-2022-44547", + "full_name": "Live-Hack-CVE\/CVE-2022-44547", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44547", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44547 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:10:02Z", + "updated_at": "2022-12-23T21:10:02Z", + "pushed_at": "2022-12-23T21:10:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44548.json b/2022/CVE-2022-44548.json new file mode 100644 index 0000000000..136f4f6880 --- /dev/null +++ b/2022/CVE-2022-44548.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654523, + "name": "CVE-2022-44548", + "full_name": "Live-Hack-CVE\/CVE-2022-44548", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44548", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44548 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:46Z", + "updated_at": "2022-12-23T21:09:46Z", + "pushed_at": "2022-12-23T21:09:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44549.json b/2022/CVE-2022-44549.json new file mode 100644 index 0000000000..8396b72bcb --- /dev/null +++ b/2022/CVE-2022-44549.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653491, + "name": "CVE-2022-44549", + "full_name": "Live-Hack-CVE\/CVE-2022-44549", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44549", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44549 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:47Z", + "updated_at": "2022-12-23T21:04:47Z", + "pushed_at": "2022-12-23T21:04:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44550.json b/2022/CVE-2022-44550.json new file mode 100644 index 0000000000..4296c0132e --- /dev/null +++ b/2022/CVE-2022-44550.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653561, + "name": "CVE-2022-44550", + "full_name": "Live-Hack-CVE\/CVE-2022-44550", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44550", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44550 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:06Z", + "updated_at": "2022-12-23T21:05:06Z", + "pushed_at": "2022-12-23T21:05:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44551.json b/2022/CVE-2022-44551.json new file mode 100644 index 0000000000..e5e2571969 --- /dev/null +++ b/2022/CVE-2022-44551.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645559, + "name": "CVE-2022-44551", + "full_name": "Live-Hack-CVE\/CVE-2022-44551", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44551", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44551 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:14Z", + "updated_at": "2022-12-23T20:25:14Z", + "pushed_at": "2022-12-23T20:25:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44552.json b/2022/CVE-2022-44552.json new file mode 100644 index 0000000000..2f54b1bc23 --- /dev/null +++ b/2022/CVE-2022-44552.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645548, + "name": "CVE-2022-44552", + "full_name": "Live-Hack-CVE\/CVE-2022-44552", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44552", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44552 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:11Z", + "updated_at": "2022-12-23T20:25:11Z", + "pushed_at": "2022-12-23T20:25:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44553.json b/2022/CVE-2022-44553.json new file mode 100644 index 0000000000..bcea22137a --- /dev/null +++ b/2022/CVE-2022-44553.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645591, + "name": "CVE-2022-44553", + "full_name": "Live-Hack-CVE\/CVE-2022-44553", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44553", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44553 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:24Z", + "updated_at": "2022-12-23T20:25:24Z", + "pushed_at": "2022-12-23T20:25:26Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44554.json b/2022/CVE-2022-44554.json new file mode 100644 index 0000000000..fad5c34f54 --- /dev/null +++ b/2022/CVE-2022-44554.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645601, + "name": "CVE-2022-44554", + "full_name": "Live-Hack-CVE\/CVE-2022-44554", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44554", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44554 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:27Z", + "updated_at": "2022-12-23T20:25:27Z", + "pushed_at": "2022-12-23T20:25:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44555.json b/2022/CVE-2022-44555.json new file mode 100644 index 0000000000..e08a4bd2c7 --- /dev/null +++ b/2022/CVE-2022-44555.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645612, + "name": "CVE-2022-44555", + "full_name": "Live-Hack-CVE\/CVE-2022-44555", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44555", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44555 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:30Z", + "updated_at": "2022-12-23T20:25:30Z", + "pushed_at": "2022-12-23T20:25:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44556.json b/2022/CVE-2022-44556.json new file mode 100644 index 0000000000..132293d74f --- /dev/null +++ b/2022/CVE-2022-44556.json @@ -0,0 +1,31 @@ +[ + { + "id": 581662982, + "name": "CVE-2022-44556", + "full_name": "Live-Hack-CVE\/CVE-2022-44556", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44556", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44556 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:02Z", + "updated_at": "2022-12-23T21:54:02Z", + "pushed_at": "2022-12-23T21:54:04Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44557.json b/2022/CVE-2022-44557.json new file mode 100644 index 0000000000..268a68436b --- /dev/null +++ b/2022/CVE-2022-44557.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645623, + "name": "CVE-2022-44557", + "full_name": "Live-Hack-CVE\/CVE-2022-44557", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44557", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44557 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:25:34Z", + "updated_at": "2022-12-23T20:25:34Z", + "pushed_at": "2022-12-23T20:25:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44558.json b/2022/CVE-2022-44558.json new file mode 100644 index 0000000000..8224fcd4d0 --- /dev/null +++ b/2022/CVE-2022-44558.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645720, + "name": "CVE-2022-44558", + "full_name": "Live-Hack-CVE\/CVE-2022-44558", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44558", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44558 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:03Z", + "updated_at": "2022-12-23T20:26:03Z", + "pushed_at": "2022-12-23T20:26:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44559.json b/2022/CVE-2022-44559.json new file mode 100644 index 0000000000..cdeda676bc --- /dev/null +++ b/2022/CVE-2022-44559.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645712, + "name": "CVE-2022-44559", + "full_name": "Live-Hack-CVE\/CVE-2022-44559", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44559", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44559 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:00Z", + "updated_at": "2022-12-23T20:26:00Z", + "pushed_at": "2022-12-23T20:26:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44562.json b/2022/CVE-2022-44562.json new file mode 100644 index 0000000000..aabdec65a5 --- /dev/null +++ b/2022/CVE-2022-44562.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653576, + "name": "CVE-2022-44562", + "full_name": "Live-Hack-CVE\/CVE-2022-44562", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44562", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44562 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:05:09Z", + "updated_at": "2022-12-23T21:05:09Z", + "pushed_at": "2022-12-23T21:05:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44563.json b/2022/CVE-2022-44563.json new file mode 100644 index 0000000000..092f474a15 --- /dev/null +++ b/2022/CVE-2022-44563.json @@ -0,0 +1,31 @@ +[ + { + "id": 581654506, + "name": "CVE-2022-44563", + "full_name": "Live-Hack-CVE\/CVE-2022-44563", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44563", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44563 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:09:39Z", + "updated_at": "2022-12-23T21:09:39Z", + "pushed_at": "2022-12-23T21:09:41Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44583.json b/2022/CVE-2022-44583.json deleted file mode 100644 index 25c896a665..0000000000 --- a/2022/CVE-2022-44583.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584566, - "name": "CVE-2022-44583", - "full_name": "Live-Hack-CVE\/CVE-2022-44583", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44583", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44583 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:45Z", - "updated_at": "2022-12-23T16:17:45Z", - "pushed_at": "2022-12-23T16:17:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44584.json b/2022/CVE-2022-44584.json deleted file mode 100644 index 4bd417f65a..0000000000 --- a/2022/CVE-2022-44584.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584546, - "name": "CVE-2022-44584", - "full_name": "Live-Hack-CVE\/CVE-2022-44584", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44584", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44584 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:42Z", - "updated_at": "2022-12-23T16:17:42Z", - "pushed_at": "2022-12-23T16:17:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44590.json b/2022/CVE-2022-44590.json new file mode 100644 index 0000000000..6f4164e217 --- /dev/null +++ b/2022/CVE-2022-44590.json @@ -0,0 +1,31 @@ +[ + { + "id": 581653482, + "name": "CVE-2022-44590", + "full_name": "Live-Hack-CVE\/CVE-2022-44590", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44590", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44590 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:04:43Z", + "updated_at": "2022-12-23T21:04:43Z", + "pushed_at": "2022-12-23T21:04:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44591.json b/2022/CVE-2022-44591.json deleted file mode 100644 index f6d6b3eefd..0000000000 --- a/2022/CVE-2022-44591.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595626, - "name": "CVE-2022-44591", - "full_name": "Live-Hack-CVE\/CVE-2022-44591", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44591", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44591 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:04Z", - "updated_at": "2022-12-23T16:59:04Z", - "pushed_at": "2022-12-23T16:59:06Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44627.json b/2022/CVE-2022-44627.json new file mode 100644 index 0000000000..ed046a9f9c --- /dev/null +++ b/2022/CVE-2022-44627.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683336, + "name": "CVE-2022-44627", + "full_name": "Live-Hack-CVE\/CVE-2022-44627", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44627", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44627 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:59:31Z", + "updated_at": "2022-12-23T23:59:31Z", + "pushed_at": "2022-12-23T23:59:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44628.json b/2022/CVE-2022-44628.json new file mode 100644 index 0000000000..497bb75ef3 --- /dev/null +++ b/2022/CVE-2022-44628.json @@ -0,0 +1,31 @@ +[ + { + "id": 581683030, + "name": "CVE-2022-44628", + "full_name": "Live-Hack-CVE\/CVE-2022-44628", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44628", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44628 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T23:57:19Z", + "updated_at": "2022-12-23T23:57:19Z", + "pushed_at": "2022-12-23T23:57:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44634.json b/2022/CVE-2022-44634.json deleted file mode 100644 index 0854c26984..0000000000 --- a/2022/CVE-2022-44634.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573240, - "name": "CVE-2022-44634", - "full_name": "Live-Hack-CVE\/CVE-2022-44634", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44634", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44634 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:24Z", - "updated_at": "2022-12-23T15:36:24Z", - "pushed_at": "2022-12-23T15:36:26Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44635.json b/2022/CVE-2022-44635.json deleted file mode 100644 index 5540563fcd..0000000000 --- a/2022/CVE-2022-44635.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515665, - "name": "CVE-2022-44635", - "full_name": "Live-Hack-CVE\/CVE-2022-44635", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44635", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44635 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:49Z", - "updated_at": "2022-12-23T12:15:49Z", - "pushed_at": "2022-12-23T12:15:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44641.json b/2022/CVE-2022-44641.json deleted file mode 100644 index 634eee5aea..0000000000 --- a/2022/CVE-2022-44641.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573404, - "name": "CVE-2022-44641", - "full_name": "Live-Hack-CVE\/CVE-2022-44641", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44641", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44641 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:54Z", - "updated_at": "2022-12-23T15:36:54Z", - "pushed_at": "2022-12-23T15:36:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44725.json b/2022/CVE-2022-44725.json deleted file mode 100644 index 48ac1278be..0000000000 --- a/2022/CVE-2022-44725.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573809, - "name": "CVE-2022-44725", - "full_name": "Live-Hack-CVE\/CVE-2022-44725", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44725", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44725 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:38:14Z", - "updated_at": "2022-12-23T15:38:14Z", - "pushed_at": "2022-12-23T15:38:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44727.json b/2022/CVE-2022-44727.json new file mode 100644 index 0000000000..9eb4f5f3ea --- /dev/null +++ b/2022/CVE-2022-44727.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638219, + "name": "CVE-2022-44727", + "full_name": "Live-Hack-CVE\/CVE-2022-44727", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44727", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44727 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:04Z", + "updated_at": "2022-12-23T19:51:04Z", + "pushed_at": "2022-12-23T19:51:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44732.json b/2022/CVE-2022-44732.json new file mode 100644 index 0000000000..2b7652f2f0 --- /dev/null +++ b/2022/CVE-2022-44732.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670125, + "name": "CVE-2022-44732", + "full_name": "Live-Hack-CVE\/CVE-2022-44732", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44732", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44732 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:34:44Z", + "updated_at": "2022-12-23T22:34:44Z", + "pushed_at": "2022-12-23T22:34:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44733.json b/2022/CVE-2022-44733.json new file mode 100644 index 0000000000..8d6df21228 --- /dev/null +++ b/2022/CVE-2022-44733.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669460, + "name": "CVE-2022-44733", + "full_name": "Live-Hack-CVE\/CVE-2022-44733", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44733", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44733 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:04Z", + "updated_at": "2022-12-23T22:31:04Z", + "pushed_at": "2022-12-23T22:31:06Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44736.json b/2022/CVE-2022-44736.json deleted file mode 100644 index da528a8553..0000000000 --- a/2022/CVE-2022-44736.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595592, - "name": "CVE-2022-44736", - "full_name": "Live-Hack-CVE\/CVE-2022-44736", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44736", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44736 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:58:57Z", - "updated_at": "2022-12-23T16:58:57Z", - "pushed_at": "2022-12-23T16:58:59Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44737.json b/2022/CVE-2022-44737.json deleted file mode 100644 index 39797013b1..0000000000 --- a/2022/CVE-2022-44737.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550678, - "name": "CVE-2022-44737", - "full_name": "Live-Hack-CVE\/CVE-2022-44737", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44737", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44737 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:41Z", - "updated_at": "2022-12-23T14:19:41Z", - "pushed_at": "2022-12-23T14:19:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44740.json b/2022/CVE-2022-44740.json deleted file mode 100644 index 0c7ef50084..0000000000 --- a/2022/CVE-2022-44740.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562981, - "name": "CVE-2022-44740", - "full_name": "Live-Hack-CVE\/CVE-2022-44740", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44740", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44740 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:00:44Z", - "updated_at": "2022-12-23T15:00:44Z", - "pushed_at": "2022-12-23T15:00:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44741.json b/2022/CVE-2022-44741.json new file mode 100644 index 0000000000..d96c71ca3c --- /dev/null +++ b/2022/CVE-2022-44741.json @@ -0,0 +1,31 @@ +[ + { + "id": 581663116, + "name": "CVE-2022-44741", + "full_name": "Live-Hack-CVE\/CVE-2022-44741", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44741", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44741 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T21:54:51Z", + "updated_at": "2022-12-23T21:54:51Z", + "pushed_at": "2022-12-23T21:54:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44744.json b/2022/CVE-2022-44744.json new file mode 100644 index 0000000000..fffb73d112 --- /dev/null +++ b/2022/CVE-2022-44744.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669445, + "name": "CVE-2022-44744", + "full_name": "Live-Hack-CVE\/CVE-2022-44744", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44744", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44744 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:31:01Z", + "updated_at": "2022-12-23T22:31:01Z", + "pushed_at": "2022-12-23T22:31:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44745.json b/2022/CVE-2022-44745.json new file mode 100644 index 0000000000..018824ba59 --- /dev/null +++ b/2022/CVE-2022-44745.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669436, + "name": "CVE-2022-44745", + "full_name": "Live-Hack-CVE\/CVE-2022-44745", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44745", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44745 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:57Z", + "updated_at": "2022-12-23T22:30:57Z", + "pushed_at": "2022-12-23T22:30:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44746.json b/2022/CVE-2022-44746.json new file mode 100644 index 0000000000..57d4ea25d2 --- /dev/null +++ b/2022/CVE-2022-44746.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669419, + "name": "CVE-2022-44746", + "full_name": "Live-Hack-CVE\/CVE-2022-44746", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44746", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44746 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:30:50Z", + "updated_at": "2022-12-23T22:30:50Z", + "pushed_at": "2022-12-23T22:30:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44747.json b/2022/CVE-2022-44747.json new file mode 100644 index 0000000000..f5e86d76d7 --- /dev/null +++ b/2022/CVE-2022-44747.json @@ -0,0 +1,31 @@ +[ + { + "id": 581669128, + "name": "CVE-2022-44747", + "full_name": "Live-Hack-CVE\/CVE-2022-44747", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44747", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44747 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:29:20Z", + "updated_at": "2022-12-23T22:29:20Z", + "pushed_at": "2022-12-23T22:29:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44748.json b/2022/CVE-2022-44748.json deleted file mode 100644 index 87606aeca0..0000000000 --- a/2022/CVE-2022-44748.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526713, - "name": "CVE-2022-44748", - "full_name": "Live-Hack-CVE\/CVE-2022-44748", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44748", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44748 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:26Z", - "updated_at": "2022-12-23T12:57:12Z", - "pushed_at": "2022-12-23T12:56:28Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44749.json b/2022/CVE-2022-44749.json deleted file mode 100644 index 2fb8213bc3..0000000000 --- a/2022/CVE-2022-44749.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526699, - "name": "CVE-2022-44749", - "full_name": "Live-Hack-CVE\/CVE-2022-44749", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44749", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44749 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:56:22Z", - "updated_at": "2022-12-23T12:57:47Z", - "pushed_at": "2022-12-23T12:56:24Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44784.json b/2022/CVE-2022-44784.json deleted file mode 100644 index ded4e03f7c..0000000000 --- a/2022/CVE-2022-44784.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561658, - "name": "CVE-2022-44784", - "full_name": "Live-Hack-CVE\/CVE-2022-44784", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44784", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44784 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:56:32Z", - "updated_at": "2022-12-23T14:56:32Z", - "pushed_at": "2022-12-23T14:56:34Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44785.json b/2022/CVE-2022-44785.json deleted file mode 100644 index f9aca14184..0000000000 --- a/2022/CVE-2022-44785.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563312, - "name": "CVE-2022-44785", - "full_name": "Live-Hack-CVE\/CVE-2022-44785", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44785", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44785 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:48Z", - "updated_at": "2022-12-23T15:01:48Z", - "pushed_at": "2022-12-23T15:01:50Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44786.json b/2022/CVE-2022-44786.json deleted file mode 100644 index d12d77d54c..0000000000 --- a/2022/CVE-2022-44786.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563255, - "name": "CVE-2022-44786", - "full_name": "Live-Hack-CVE\/CVE-2022-44786", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44786", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44786 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:37Z", - "updated_at": "2022-12-23T15:01:37Z", - "pushed_at": "2022-12-23T15:01:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44787.json b/2022/CVE-2022-44787.json deleted file mode 100644 index 84a9905d99..0000000000 --- a/2022/CVE-2022-44787.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563272, - "name": "CVE-2022-44787", - "full_name": "Live-Hack-CVE\/CVE-2022-44787", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44787", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44787 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:40Z", - "updated_at": "2022-12-23T15:01:40Z", - "pushed_at": "2022-12-23T15:01:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44788.json b/2022/CVE-2022-44788.json deleted file mode 100644 index b4acfac4d7..0000000000 --- a/2022/CVE-2022-44788.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563225, - "name": "CVE-2022-44788", - "full_name": "Live-Hack-CVE\/CVE-2022-44788", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44788", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44788 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:30Z", - "updated_at": "2022-12-23T15:01:30Z", - "pushed_at": "2022-12-23T15:01:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44792.json b/2022/CVE-2022-44792.json new file mode 100644 index 0000000000..7f5557f00f --- /dev/null +++ b/2022/CVE-2022-44792.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670397, + "name": "CVE-2022-44792", + "full_name": "Live-Hack-CVE\/CVE-2022-44792", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44792", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44792 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:13Z", + "updated_at": "2022-12-23T22:36:13Z", + "pushed_at": "2022-12-23T22:36:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44793.json b/2022/CVE-2022-44793.json new file mode 100644 index 0000000000..bb1c623213 --- /dev/null +++ b/2022/CVE-2022-44793.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670407, + "name": "CVE-2022-44793", + "full_name": "Live-Hack-CVE\/CVE-2022-44793", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44793", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44793 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:17Z", + "updated_at": "2022-12-23T22:36:17Z", + "pushed_at": "2022-12-23T22:36:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44794.json b/2022/CVE-2022-44794.json new file mode 100644 index 0000000000..1ecb452cc1 --- /dev/null +++ b/2022/CVE-2022-44794.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670472, + "name": "CVE-2022-44794", + "full_name": "Live-Hack-CVE\/CVE-2022-44794", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44794", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44794 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:42Z", + "updated_at": "2022-12-23T22:36:42Z", + "pushed_at": "2022-12-23T22:36:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44795.json b/2022/CVE-2022-44795.json new file mode 100644 index 0000000000..2c809735d0 --- /dev/null +++ b/2022/CVE-2022-44795.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670479, + "name": "CVE-2022-44795", + "full_name": "Live-Hack-CVE\/CVE-2022-44795", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44795", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44795 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:45Z", + "updated_at": "2022-12-23T22:36:45Z", + "pushed_at": "2022-12-23T22:36:47Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44796.json b/2022/CVE-2022-44796.json new file mode 100644 index 0000000000..e4bbb4d007 --- /dev/null +++ b/2022/CVE-2022-44796.json @@ -0,0 +1,31 @@ +[ + { + "id": 581670487, + "name": "CVE-2022-44796", + "full_name": "Live-Hack-CVE\/CVE-2022-44796", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44796", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44796 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T22:36:48Z", + "updated_at": "2022-12-23T22:36:49Z", + "pushed_at": "2022-12-23T22:36:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44797.json b/2022/CVE-2022-44797.json new file mode 100644 index 0000000000..47d795d9bb --- /dev/null +++ b/2022/CVE-2022-44797.json @@ -0,0 +1,31 @@ +[ + { + "id": 581645789, + "name": "CVE-2022-44797", + "full_name": "Live-Hack-CVE\/CVE-2022-44797", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44797", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44797 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T20:26:22Z", + "updated_at": "2022-12-23T20:26:22Z", + "pushed_at": "2022-12-23T20:26:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-44801.json b/2022/CVE-2022-44801.json deleted file mode 100644 index 579ec99ce2..0000000000 --- a/2022/CVE-2022-44801.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561695, - "name": "CVE-2022-44801", - "full_name": "Live-Hack-CVE\/CVE-2022-44801", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44801", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44801 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:56:39Z", - "updated_at": "2022-12-23T14:56:39Z", - "pushed_at": "2022-12-23T14:56:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44804.json b/2022/CVE-2022-44804.json deleted file mode 100644 index e3ca78d746..0000000000 --- a/2022/CVE-2022-44804.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561719, - "name": "CVE-2022-44804", - "full_name": "Live-Hack-CVE\/CVE-2022-44804", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44804", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44804 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:56:42Z", - "updated_at": "2022-12-23T14:56:42Z", - "pushed_at": "2022-12-23T14:56:44Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44806.json b/2022/CVE-2022-44806.json deleted file mode 100644 index ec6678709f..0000000000 --- a/2022/CVE-2022-44806.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561734, - "name": "CVE-2022-44806", - "full_name": "Live-Hack-CVE\/CVE-2022-44806", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44806", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44806 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:56:46Z", - "updated_at": "2022-12-23T14:56:46Z", - "pushed_at": "2022-12-23T14:56:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44807.json b/2022/CVE-2022-44807.json deleted file mode 100644 index 395e504267..0000000000 --- a/2022/CVE-2022-44807.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561843, - "name": "CVE-2022-44807", - "full_name": "Live-Hack-CVE\/CVE-2022-44807", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44807", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44807 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:09Z", - "updated_at": "2022-12-23T14:57:09Z", - "pushed_at": "2022-12-23T14:57:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44808.json b/2022/CVE-2022-44808.json deleted file mode 100644 index e91cb075e7..0000000000 --- a/2022/CVE-2022-44808.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581561888, - "name": "CVE-2022-44808", - "full_name": "Live-Hack-CVE\/CVE-2022-44808", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44808", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44808 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:57:15Z", - "updated_at": "2022-12-23T14:57:15Z", - "pushed_at": "2022-12-23T14:57:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44820.json b/2022/CVE-2022-44820.json deleted file mode 100644 index d62272f8bf..0000000000 --- a/2022/CVE-2022-44820.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594614, - "name": "CVE-2022-44820", - "full_name": "Live-Hack-CVE\/CVE-2022-44820", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44820", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44820 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:15Z", - "updated_at": "2022-12-23T16:55:15Z", - "pushed_at": "2022-12-23T16:55:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44830.json b/2022/CVE-2022-44830.json deleted file mode 100644 index 329d93ce8c..0000000000 --- a/2022/CVE-2022-44830.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572415, - "name": "CVE-2022-44830", - "full_name": "Live-Hack-CVE\/CVE-2022-44830", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44830", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44830 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:36Z", - "updated_at": "2022-12-23T15:33:36Z", - "pushed_at": "2022-12-23T15:33:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44843.json b/2022/CVE-2022-44843.json deleted file mode 100644 index 80a42a0033..0000000000 --- a/2022/CVE-2022-44843.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524833, - "name": "CVE-2022-44843", - "full_name": "Live-Hack-CVE\/CVE-2022-44843", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44843", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44843 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:36Z", - "updated_at": "2022-12-23T12:49:36Z", - "pushed_at": "2022-12-23T12:49:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44844.json b/2022/CVE-2022-44844.json deleted file mode 100644 index b7300e1483..0000000000 --- a/2022/CVE-2022-44844.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524822, - "name": "CVE-2022-44844", - "full_name": "Live-Hack-CVE\/CVE-2022-44844", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44844", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44844 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:33Z", - "updated_at": "2022-12-23T12:49:33Z", - "pushed_at": "2022-12-23T12:49:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44858.json b/2022/CVE-2022-44858.json deleted file mode 100644 index 8fbe0f3b6e..0000000000 --- a/2022/CVE-2022-44858.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549294, - "name": "CVE-2022-44858", - "full_name": "Live-Hack-CVE\/CVE-2022-44858", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44858", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44858 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:19Z", - "updated_at": "2022-12-23T14:15:20Z", - "pushed_at": "2022-12-23T14:15:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44859.json b/2022/CVE-2022-44859.json deleted file mode 100644 index a5b1352b98..0000000000 --- a/2022/CVE-2022-44859.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549473, - "name": "CVE-2022-44859", - "full_name": "Live-Hack-CVE\/CVE-2022-44859", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44859", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44859 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:53Z", - "updated_at": "2022-12-23T14:15:53Z", - "pushed_at": "2022-12-23T14:15:55Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-44860.json b/2022/CVE-2022-44860.json deleted file mode 100644 index 1d56f6d6d4..0000000000 --- a/2022/CVE-2022-44860.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549451, - "name": "CVE-2022-44860", - "full_name": "Live-Hack-CVE\/CVE-2022-44860", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44860", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-44860 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:50Z", - "updated_at": "2022-12-23T14:15:50Z", - "pushed_at": "2022-12-23T14:15:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45012.json b/2022/CVE-2022-45012.json deleted file mode 100644 index 9caf7b5f71..0000000000 --- a/2022/CVE-2022-45012.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583608, - "name": "CVE-2022-45012", - "full_name": "Live-Hack-CVE\/CVE-2022-45012", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45012", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45012 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:14Z", - "updated_at": "2022-12-23T16:14:14Z", - "pushed_at": "2022-12-23T16:14:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45013.json b/2022/CVE-2022-45013.json deleted file mode 100644 index 04f6b20f3e..0000000000 --- a/2022/CVE-2022-45013.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583625, - "name": "CVE-2022-45013", - "full_name": "Live-Hack-CVE\/CVE-2022-45013", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45013", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45013 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:17Z", - "updated_at": "2022-12-23T16:14:17Z", - "pushed_at": "2022-12-23T16:14:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45014.json b/2022/CVE-2022-45014.json deleted file mode 100644 index 010ede5382..0000000000 --- a/2022/CVE-2022-45014.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583637, - "name": "CVE-2022-45014", - "full_name": "Live-Hack-CVE\/CVE-2022-45014", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45014", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45014 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:20Z", - "updated_at": "2022-12-23T16:14:20Z", - "pushed_at": "2022-12-23T16:14:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45015.json b/2022/CVE-2022-45015.json deleted file mode 100644 index 6b3645b980..0000000000 --- a/2022/CVE-2022-45015.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583656, - "name": "CVE-2022-45015", - "full_name": "Live-Hack-CVE\/CVE-2022-45015", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45015", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45015 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:24Z", - "updated_at": "2022-12-23T16:14:24Z", - "pushed_at": "2022-12-23T16:14:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45016.json b/2022/CVE-2022-45016.json deleted file mode 100644 index 98d7857af2..0000000000 --- a/2022/CVE-2022-45016.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583756, - "name": "CVE-2022-45016", - "full_name": "Live-Hack-CVE\/CVE-2022-45016", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45016", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45016 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:51Z", - "updated_at": "2022-12-23T16:14:51Z", - "pushed_at": "2022-12-23T16:14:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45017.json b/2022/CVE-2022-45017.json deleted file mode 100644 index df355fbcb5..0000000000 --- a/2022/CVE-2022-45017.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583772, - "name": "CVE-2022-45017", - "full_name": "Live-Hack-CVE\/CVE-2022-45017", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45017", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45017 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:14:55Z", - "updated_at": "2022-12-23T16:14:55Z", - "pushed_at": "2022-12-23T16:14:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45036.json b/2022/CVE-2022-45036.json deleted file mode 100644 index a5908067e2..0000000000 --- a/2022/CVE-2022-45036.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548616, - "name": "CVE-2022-45036", - "full_name": "Live-Hack-CVE\/CVE-2022-45036", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45036", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45036 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:07Z", - "updated_at": "2022-12-23T14:13:07Z", - "pushed_at": "2022-12-23T14:13:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45037.json b/2022/CVE-2022-45037.json deleted file mode 100644 index ac3de91e21..0000000000 --- a/2022/CVE-2022-45037.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548626, - "name": "CVE-2022-45037", - "full_name": "Live-Hack-CVE\/CVE-2022-45037", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45037", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45037 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:10Z", - "updated_at": "2022-12-23T14:13:10Z", - "pushed_at": "2022-12-23T14:13:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45038.json b/2022/CVE-2022-45038.json deleted file mode 100644 index 8e8cdef890..0000000000 --- a/2022/CVE-2022-45038.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548643, - "name": "CVE-2022-45038", - "full_name": "Live-Hack-CVE\/CVE-2022-45038", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45038", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45038 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:14Z", - "updated_at": "2022-12-23T14:13:14Z", - "pushed_at": "2022-12-23T14:13:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45039.json b/2022/CVE-2022-45039.json deleted file mode 100644 index de67612bce..0000000000 --- a/2022/CVE-2022-45039.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548657, - "name": "CVE-2022-45039", - "full_name": "Live-Hack-CVE\/CVE-2022-45039", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45039", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45039 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:17Z", - "updated_at": "2022-12-23T14:13:17Z", - "pushed_at": "2022-12-23T14:13:19Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45040.json b/2022/CVE-2022-45040.json deleted file mode 100644 index 4ed3230a12..0000000000 --- a/2022/CVE-2022-45040.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548672, - "name": "CVE-2022-45040", - "full_name": "Live-Hack-CVE\/CVE-2022-45040", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45040", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45040 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:13:20Z", - "updated_at": "2022-12-23T14:13:20Z", - "pushed_at": "2022-12-23T14:13:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45047.json b/2022/CVE-2022-45047.json deleted file mode 100644 index 7ba9a31539..0000000000 --- a/2022/CVE-2022-45047.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581596578, - "name": "CVE-2022-45047", - "full_name": "Live-Hack-CVE\/CVE-2022-45047", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45047", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45047 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:02:31Z", - "updated_at": "2022-12-23T17:02:31Z", - "pushed_at": "2022-12-23T17:02:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45066.json b/2022/CVE-2022-45066.json deleted file mode 100644 index 4dfc931c19..0000000000 --- a/2022/CVE-2022-45066.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595582, - "name": "CVE-2022-45066", - "full_name": "Live-Hack-CVE\/CVE-2022-45066", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45066", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45066 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:58:54Z", - "updated_at": "2022-12-23T16:58:54Z", - "pushed_at": "2022-12-23T16:58:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45069.json b/2022/CVE-2022-45069.json deleted file mode 100644 index 3d589c2ac7..0000000000 --- a/2022/CVE-2022-45069.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595609, - "name": "CVE-2022-45069", - "full_name": "Live-Hack-CVE\/CVE-2022-45069", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45069", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45069 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:59:01Z", - "updated_at": "2022-12-23T16:59:01Z", - "pushed_at": "2022-12-23T16:59:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45071.json b/2022/CVE-2022-45071.json deleted file mode 100644 index 36532e7da3..0000000000 --- a/2022/CVE-2022-45071.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574075, - "name": "CVE-2022-45071", - "full_name": "Live-Hack-CVE\/CVE-2022-45071", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45071", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45071 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:08Z", - "updated_at": "2022-12-23T15:39:08Z", - "pushed_at": "2022-12-23T15:39:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45072.json b/2022/CVE-2022-45072.json deleted file mode 100644 index ccef9d7e16..0000000000 --- a/2022/CVE-2022-45072.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574192, - "name": "CVE-2022-45072", - "full_name": "Live-Hack-CVE\/CVE-2022-45072", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45072", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45072 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:39:30Z", - "updated_at": "2022-12-23T15:39:30Z", - "pushed_at": "2022-12-23T15:39:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45073.json b/2022/CVE-2022-45073.json deleted file mode 100644 index a6bc5c4334..0000000000 --- a/2022/CVE-2022-45073.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581573161, - "name": "CVE-2022-45073", - "full_name": "Live-Hack-CVE\/CVE-2022-45073", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45073", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45073 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:36:09Z", - "updated_at": "2022-12-23T15:36:09Z", - "pushed_at": "2022-12-23T15:36:11Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45077.json b/2022/CVE-2022-45077.json deleted file mode 100644 index ea32c9a286..0000000000 --- a/2022/CVE-2022-45077.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595549, - "name": "CVE-2022-45077", - "full_name": "Live-Hack-CVE\/CVE-2022-45077", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45077", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45077 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:58:47Z", - "updated_at": "2022-12-23T16:58:47Z", - "pushed_at": "2022-12-23T16:58:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45082.json b/2022/CVE-2022-45082.json deleted file mode 100644 index b17f8bf751..0000000000 --- a/2022/CVE-2022-45082.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572770, - "name": "CVE-2022-45082", - "full_name": "Live-Hack-CVE\/CVE-2022-45082", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45082", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45082 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:51Z", - "updated_at": "2022-12-23T15:34:51Z", - "pushed_at": "2022-12-23T15:34:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45129.json b/2022/CVE-2022-45129.json new file mode 100644 index 0000000000..c59f799595 --- /dev/null +++ b/2022/CVE-2022-45129.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638182, + "name": "CVE-2022-45129", + "full_name": "Live-Hack-CVE\/CVE-2022-45129", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45129", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45129 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:50:53Z", + "updated_at": "2022-12-23T19:50:53Z", + "pushed_at": "2022-12-23T19:50:55Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45130.json b/2022/CVE-2022-45130.json new file mode 100644 index 0000000000..3c7c745054 --- /dev/null +++ b/2022/CVE-2022-45130.json @@ -0,0 +1,31 @@ +[ + { + "id": 581638358, + "name": "CVE-2022-45130", + "full_name": "Live-Hack-CVE\/CVE-2022-45130", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45130", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45130 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:51:35Z", + "updated_at": "2022-12-23T19:51:35Z", + "pushed_at": "2022-12-23T19:51:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45132.json b/2022/CVE-2022-45132.json deleted file mode 100644 index c23d43fc2d..0000000000 --- a/2022/CVE-2022-45132.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572745, - "name": "CVE-2022-45132", - "full_name": "Live-Hack-CVE\/CVE-2022-45132", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45132", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45132 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:47Z", - "updated_at": "2022-12-23T15:34:47Z", - "pushed_at": "2022-12-23T15:34:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45146.json b/2022/CVE-2022-45146.json deleted file mode 100644 index 25939cf98b..0000000000 --- a/2022/CVE-2022-45146.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581535862, - "name": "CVE-2022-45146", - "full_name": "Live-Hack-CVE\/CVE-2022-45146", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45146", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45146 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:28:49Z", - "updated_at": "2022-12-23T13:28:49Z", - "pushed_at": "2022-12-23T13:28:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45163.json b/2022/CVE-2022-45163.json deleted file mode 100644 index d43f5528d5..0000000000 --- a/2022/CVE-2022-45163.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581550645, - "name": "CVE-2022-45163", - "full_name": "Live-Hack-CVE\/CVE-2022-45163", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45163", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45163 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:19:34Z", - "updated_at": "2022-12-23T14:19:34Z", - "pushed_at": "2022-12-23T14:19:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45182.json b/2022/CVE-2022-45182.json new file mode 100644 index 0000000000..b386f0dbf0 --- /dev/null +++ b/2022/CVE-2022-45182.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628277, + "name": "CVE-2022-45182", + "full_name": "Live-Hack-CVE\/CVE-2022-45182", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45182", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45182 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:43Z", + "updated_at": "2022-12-23T19:06:43Z", + "pushed_at": "2022-12-23T19:06:45Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45183.json b/2022/CVE-2022-45183.json new file mode 100644 index 0000000000..4f99b642cf --- /dev/null +++ b/2022/CVE-2022-45183.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628131, + "name": "CVE-2022-45183", + "full_name": "Live-Hack-CVE\/CVE-2022-45183", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45183", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45183 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:06Z", + "updated_at": "2022-12-23T19:06:06Z", + "pushed_at": "2022-12-23T19:06:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45184.json b/2022/CVE-2022-45184.json new file mode 100644 index 0000000000..2537dced15 --- /dev/null +++ b/2022/CVE-2022-45184.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628066, + "name": "CVE-2022-45184", + "full_name": "Live-Hack-CVE\/CVE-2022-45184", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45184", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45184 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:05:52Z", + "updated_at": "2022-12-23T19:05:52Z", + "pushed_at": "2022-12-23T19:05:54Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45193.json b/2022/CVE-2022-45193.json new file mode 100644 index 0000000000..59e43d6311 --- /dev/null +++ b/2022/CVE-2022-45193.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628246, + "name": "CVE-2022-45193", + "full_name": "Live-Hack-CVE\/CVE-2022-45193", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45193", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45193 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:36Z", + "updated_at": "2022-12-23T19:06:36Z", + "pushed_at": "2022-12-23T19:06:39Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45194.json b/2022/CVE-2022-45194.json new file mode 100644 index 0000000000..972ef18738 --- /dev/null +++ b/2022/CVE-2022-45194.json @@ -0,0 +1,31 @@ +[ + { + "id": 581628164, + "name": "CVE-2022-45194", + "full_name": "Live-Hack-CVE\/CVE-2022-45194", + "owner": { + "login": "Live-Hack-CVE", + "id": 121191732, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", + "html_url": "https:\/\/github.com\/Live-Hack-CVE" + }, + "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45194", + "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45194 Made by Sn0wAlice. ❤️", + "fork": false, + "created_at": "2022-12-23T19:06:13Z", + "updated_at": "2022-12-23T19:06:13Z", + "pushed_at": "2022-12-23T19:06:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 + } +] \ No newline at end of file diff --git a/2022/CVE-2022-45198.json b/2022/CVE-2022-45198.json deleted file mode 100644 index b20ea2a110..0000000000 --- a/2022/CVE-2022-45198.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574474, - "name": "CVE-2022-45198", - "full_name": "Live-Hack-CVE\/CVE-2022-45198", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45198", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45198 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:26Z", - "updated_at": "2022-12-23T15:40:26Z", - "pushed_at": "2022-12-23T15:40:29Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45199.json b/2022/CVE-2022-45199.json deleted file mode 100644 index 742c496b50..0000000000 --- a/2022/CVE-2022-45199.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581574491, - "name": "CVE-2022-45199", - "full_name": "Live-Hack-CVE\/CVE-2022-45199", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45199", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45199 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:40:30Z", - "updated_at": "2022-12-23T15:40:30Z", - "pushed_at": "2022-12-23T15:40:32Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45202.json b/2022/CVE-2022-45202.json deleted file mode 100644 index 0c32184607..0000000000 --- a/2022/CVE-2022-45202.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515782, - "name": "CVE-2022-45202", - "full_name": "Live-Hack-CVE\/CVE-2022-45202", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45202", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45202 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:18Z", - "updated_at": "2022-12-23T12:16:18Z", - "pushed_at": "2022-12-23T12:16:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45204.json b/2022/CVE-2022-45204.json deleted file mode 100644 index 7678cf7358..0000000000 --- a/2022/CVE-2022-45204.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515746, - "name": "CVE-2022-45204", - "full_name": "Live-Hack-CVE\/CVE-2022-45204", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45204", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45204 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:08Z", - "updated_at": "2022-12-23T12:16:08Z", - "pushed_at": "2022-12-23T12:16:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45205.json b/2022/CVE-2022-45205.json deleted file mode 100644 index 0aca8c4cc8..0000000000 --- a/2022/CVE-2022-45205.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549522, - "name": "CVE-2022-45205", - "full_name": "Live-Hack-CVE\/CVE-2022-45205", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45205", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45205 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:03Z", - "updated_at": "2022-12-23T14:16:03Z", - "pushed_at": "2022-12-23T14:16:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45206.json b/2022/CVE-2022-45206.json deleted file mode 100644 index 6dc6959b3a..0000000000 --- a/2022/CVE-2022-45206.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549540, - "name": "CVE-2022-45206", - "full_name": "Live-Hack-CVE\/CVE-2022-45206", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45206", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45206 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:06Z", - "updated_at": "2022-12-23T14:16:06Z", - "pushed_at": "2022-12-23T14:16:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45207.json b/2022/CVE-2022-45207.json deleted file mode 100644 index 5fa3e67f76..0000000000 --- a/2022/CVE-2022-45207.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549557, - "name": "CVE-2022-45207", - "full_name": "Live-Hack-CVE\/CVE-2022-45207", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45207", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45207 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:10Z", - "updated_at": "2022-12-23T14:16:10Z", - "pushed_at": "2022-12-23T14:16:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45208.json b/2022/CVE-2022-45208.json deleted file mode 100644 index 3bd092c977..0000000000 --- a/2022/CVE-2022-45208.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549591, - "name": "CVE-2022-45208", - "full_name": "Live-Hack-CVE\/CVE-2022-45208", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45208", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45208 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:16Z", - "updated_at": "2022-12-23T14:16:16Z", - "pushed_at": "2022-12-23T14:16:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45210.json b/2022/CVE-2022-45210.json deleted file mode 100644 index 5ca4b49d43..0000000000 --- a/2022/CVE-2022-45210.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549575, - "name": "CVE-2022-45210", - "full_name": "Live-Hack-CVE\/CVE-2022-45210", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45210", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45210 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:13Z", - "updated_at": "2022-12-23T14:16:13Z", - "pushed_at": "2022-12-23T14:16:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45214.json b/2022/CVE-2022-45214.json deleted file mode 100644 index c0333bee9a..0000000000 --- a/2022/CVE-2022-45214.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536081, - "name": "CVE-2022-45214", - "full_name": "Live-Hack-CVE\/CVE-2022-45214", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45214", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45214 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:37Z", - "updated_at": "2022-12-23T13:29:37Z", - "pushed_at": "2022-12-23T13:29:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45218.json b/2022/CVE-2022-45218.json deleted file mode 100644 index 19b14f1cff..0000000000 --- a/2022/CVE-2022-45218.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536872, - "name": "CVE-2022-45218", - "full_name": "Live-Hack-CVE\/CVE-2022-45218", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45218", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45218 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:20Z", - "updated_at": "2022-12-23T13:32:20Z", - "pushed_at": "2022-12-23T13:32:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45221.json b/2022/CVE-2022-45221.json deleted file mode 100644 index c4d807ea9a..0000000000 --- a/2022/CVE-2022-45221.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536101, - "name": "CVE-2022-45221", - "full_name": "Live-Hack-CVE\/CVE-2022-45221", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45221", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45221 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:29:41Z", - "updated_at": "2022-12-23T13:29:41Z", - "pushed_at": "2022-12-23T13:29:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45223.json b/2022/CVE-2022-45223.json deleted file mode 100644 index 01b639cdfb..0000000000 --- a/2022/CVE-2022-45223.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536330, - "name": "CVE-2022-45223", - "full_name": "Live-Hack-CVE\/CVE-2022-45223", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45223", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45223 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:28Z", - "updated_at": "2022-12-23T13:30:28Z", - "pushed_at": "2022-12-23T13:30:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45224.json b/2022/CVE-2022-45224.json deleted file mode 100644 index 679a5d7b60..0000000000 --- a/2022/CVE-2022-45224.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536391, - "name": "CVE-2022-45224", - "full_name": "Live-Hack-CVE\/CVE-2022-45224", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45224", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45224 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:40Z", - "updated_at": "2022-12-23T13:30:40Z", - "pushed_at": "2022-12-23T13:30:42Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45225.json b/2022/CVE-2022-45225.json deleted file mode 100644 index 7467918d0c..0000000000 --- a/2022/CVE-2022-45225.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524729, - "name": "CVE-2022-45225", - "full_name": "Live-Hack-CVE\/CVE-2022-45225", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45225", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45225 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:11Z", - "updated_at": "2022-12-23T12:49:11Z", - "pushed_at": "2022-12-23T12:49:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45276.json b/2022/CVE-2022-45276.json deleted file mode 100644 index 4a8f7b0c3c..0000000000 --- a/2022/CVE-2022-45276.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549689, - "name": "CVE-2022-45276", - "full_name": "Live-Hack-CVE\/CVE-2022-45276", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45276", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45276 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:34Z", - "updated_at": "2022-12-23T14:16:34Z", - "pushed_at": "2022-12-23T14:16:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45278.json b/2022/CVE-2022-45278.json deleted file mode 100644 index ca91921333..0000000000 --- a/2022/CVE-2022-45278.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549711, - "name": "CVE-2022-45278", - "full_name": "Live-Hack-CVE\/CVE-2022-45278", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45278", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45278 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:37Z", - "updated_at": "2022-12-23T14:16:37Z", - "pushed_at": "2022-12-23T14:16:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45280.json b/2022/CVE-2022-45280.json deleted file mode 100644 index 78d55c4d5a..0000000000 --- a/2022/CVE-2022-45280.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549733, - "name": "CVE-2022-45280", - "full_name": "Live-Hack-CVE\/CVE-2022-45280", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45280", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45280 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:41Z", - "updated_at": "2022-12-23T14:16:41Z", - "pushed_at": "2022-12-23T14:16:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45301.json b/2022/CVE-2022-45301.json deleted file mode 100644 index 865b805993..0000000000 --- a/2022/CVE-2022-45301.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525097, - "name": "CVE-2022-45301", - "full_name": "Live-Hack-CVE\/CVE-2022-45301", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45301", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45301 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:34Z", - "updated_at": "2022-12-23T12:50:34Z", - "pushed_at": "2022-12-23T12:50:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45304.json b/2022/CVE-2022-45304.json deleted file mode 100644 index 76d18c8ae3..0000000000 --- a/2022/CVE-2022-45304.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525111, - "name": "CVE-2022-45304", - "full_name": "Live-Hack-CVE\/CVE-2022-45304", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45304", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45304 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:37Z", - "updated_at": "2022-12-23T12:50:37Z", - "pushed_at": "2022-12-23T12:50:40Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45305.json b/2022/CVE-2022-45305.json deleted file mode 100644 index 71a2c0f7c3..0000000000 --- a/2022/CVE-2022-45305.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525138, - "name": "CVE-2022-45305", - "full_name": "Live-Hack-CVE\/CVE-2022-45305", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45305", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45305 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:44Z", - "updated_at": "2022-12-23T12:50:44Z", - "pushed_at": "2022-12-23T12:50:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45306.json b/2022/CVE-2022-45306.json deleted file mode 100644 index 8c0b775f0b..0000000000 --- a/2022/CVE-2022-45306.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525169, - "name": "CVE-2022-45306", - "full_name": "Live-Hack-CVE\/CVE-2022-45306", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45306", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45306 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:51Z", - "updated_at": "2022-12-23T12:50:51Z", - "pushed_at": "2022-12-23T12:50:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45307.json b/2022/CVE-2022-45307.json deleted file mode 100644 index 835b3d1c27..0000000000 --- a/2022/CVE-2022-45307.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525156, - "name": "CVE-2022-45307", - "full_name": "Live-Hack-CVE\/CVE-2022-45307", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45307", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45307 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:50:48Z", - "updated_at": "2022-12-23T12:50:48Z", - "pushed_at": "2022-12-23T12:50:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45329.json b/2022/CVE-2022-45329.json deleted file mode 100644 index 0c4dffd6d6..0000000000 --- a/2022/CVE-2022-45329.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581536285, - "name": "CVE-2022-45329", - "full_name": "Live-Hack-CVE\/CVE-2022-45329", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45329", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45329 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:30:18Z", - "updated_at": "2022-12-23T13:30:18Z", - "pushed_at": "2022-12-23T13:30:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45330.json b/2022/CVE-2022-45330.json deleted file mode 100644 index d8741238a5..0000000000 --- a/2022/CVE-2022-45330.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563167, - "name": "CVE-2022-45330", - "full_name": "Live-Hack-CVE\/CVE-2022-45330", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45330", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45330 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:20Z", - "updated_at": "2022-12-23T15:01:20Z", - "pushed_at": "2022-12-23T15:01:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45331.json b/2022/CVE-2022-45331.json deleted file mode 100644 index 604d1cddef..0000000000 --- a/2022/CVE-2022-45331.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563179, - "name": "CVE-2022-45331", - "full_name": "Live-Hack-CVE\/CVE-2022-45331", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45331", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45331 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:23Z", - "updated_at": "2022-12-23T15:01:23Z", - "pushed_at": "2022-12-23T15:01:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45343.json b/2022/CVE-2022-45343.json deleted file mode 100644 index 420a6dd60c..0000000000 --- a/2022/CVE-2022-45343.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515766, - "name": "CVE-2022-45343", - "full_name": "Live-Hack-CVE\/CVE-2022-45343", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45343", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45343 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:16:15Z", - "updated_at": "2022-12-23T12:16:15Z", - "pushed_at": "2022-12-23T12:16:17Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45363.json b/2022/CVE-2022-45363.json deleted file mode 100644 index 34e39c13bb..0000000000 --- a/2022/CVE-2022-45363.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549278, - "name": "CVE-2022-45363", - "full_name": "Live-Hack-CVE\/CVE-2022-45363", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45363", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45363 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:15:16Z", - "updated_at": "2022-12-23T14:15:16Z", - "pushed_at": "2022-12-23T14:15:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45369.json b/2022/CVE-2022-45369.json deleted file mode 100644 index 21e9fdf475..0000000000 --- a/2022/CVE-2022-45369.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572733, - "name": "CVE-2022-45369", - "full_name": "Live-Hack-CVE\/CVE-2022-45369", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45369", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45369 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:34:44Z", - "updated_at": "2022-12-23T15:34:44Z", - "pushed_at": "2022-12-23T15:34:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45375.json b/2022/CVE-2022-45375.json deleted file mode 100644 index 3fbf0b2c45..0000000000 --- a/2022/CVE-2022-45375.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595570, - "name": "CVE-2022-45375", - "full_name": "Live-Hack-CVE\/CVE-2022-45375", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45375", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45375 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:58:50Z", - "updated_at": "2022-12-23T16:58:50Z", - "pushed_at": "2022-12-23T16:58:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45379.json b/2022/CVE-2022-45379.json deleted file mode 100644 index 2dbe55d1cb..0000000000 --- a/2022/CVE-2022-45379.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595169, - "name": "CVE-2022-45379", - "full_name": "Live-Hack-CVE\/CVE-2022-45379", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45379", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45379 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:18Z", - "updated_at": "2022-12-23T16:57:18Z", - "pushed_at": "2022-12-23T16:57:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45380.json b/2022/CVE-2022-45380.json deleted file mode 100644 index 5e72bd9c2e..0000000000 --- a/2022/CVE-2022-45380.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595209, - "name": "CVE-2022-45380", - "full_name": "Live-Hack-CVE\/CVE-2022-45380", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45380", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45380 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:57:28Z", - "updated_at": "2022-12-23T16:57:28Z", - "pushed_at": "2022-12-23T16:57:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45381.json b/2022/CVE-2022-45381.json deleted file mode 100644 index d83ad2f873..0000000000 --- a/2022/CVE-2022-45381.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581538570, - "name": "CVE-2022-45381", - "full_name": "Live-Hack-CVE\/CVE-2022-45381", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45381", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45381 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:37:58Z", - "updated_at": "2022-12-23T13:37:58Z", - "pushed_at": "2022-12-23T13:38:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45382.json b/2022/CVE-2022-45382.json deleted file mode 100644 index 414134df85..0000000000 --- a/2022/CVE-2022-45382.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581595399, - "name": "CVE-2022-45382", - "full_name": "Live-Hack-CVE\/CVE-2022-45382", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45382", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45382 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:58:10Z", - "updated_at": "2022-12-23T16:58:10Z", - "pushed_at": "2022-12-23T16:58:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45383.json b/2022/CVE-2022-45383.json deleted file mode 100644 index 405b2b57af..0000000000 --- a/2022/CVE-2022-45383.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581585865, - "name": "CVE-2022-45383", - "full_name": "Live-Hack-CVE\/CVE-2022-45383", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45383", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45383 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:22:20Z", - "updated_at": "2022-12-23T16:22:20Z", - "pushed_at": "2022-12-23T16:22:22Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45384.json b/2022/CVE-2022-45384.json deleted file mode 100644 index b5aafa5242..0000000000 --- a/2022/CVE-2022-45384.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581597031, - "name": "CVE-2022-45384", - "full_name": "Live-Hack-CVE\/CVE-2022-45384", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45384", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45384 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T17:04:14Z", - "updated_at": "2022-12-23T17:04:14Z", - "pushed_at": "2022-12-23T17:04:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45395.json b/2022/CVE-2022-45395.json deleted file mode 100644 index 88e9dc5109..0000000000 --- a/2022/CVE-2022-45395.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594664, - "name": "CVE-2022-45395", - "full_name": "Live-Hack-CVE\/CVE-2022-45395", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45395", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45395 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:28Z", - "updated_at": "2022-12-23T16:55:28Z", - "pushed_at": "2022-12-23T16:55:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45396.json b/2022/CVE-2022-45396.json deleted file mode 100644 index 5de94553c3..0000000000 --- a/2022/CVE-2022-45396.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594622, - "name": "CVE-2022-45396", - "full_name": "Live-Hack-CVE\/CVE-2022-45396", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45396", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45396 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:18Z", - "updated_at": "2022-12-23T16:55:18Z", - "pushed_at": "2022-12-23T16:55:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45397.json b/2022/CVE-2022-45397.json deleted file mode 100644 index 3e22e7f8f3..0000000000 --- a/2022/CVE-2022-45397.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594633, - "name": "CVE-2022-45397", - "full_name": "Live-Hack-CVE\/CVE-2022-45397", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45397", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45397 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:22Z", - "updated_at": "2022-12-23T16:55:22Z", - "pushed_at": "2022-12-23T16:55:24Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45400.json b/2022/CVE-2022-45400.json deleted file mode 100644 index 25130ac121..0000000000 --- a/2022/CVE-2022-45400.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581594652, - "name": "CVE-2022-45400", - "full_name": "Live-Hack-CVE\/CVE-2022-45400", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45400", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45400 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:55:25Z", - "updated_at": "2022-12-23T16:55:25Z", - "pushed_at": "2022-12-23T16:55:27Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45461.json b/2022/CVE-2022-45461.json deleted file mode 100644 index 87d40a0518..0000000000 --- a/2022/CVE-2022-45461.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581584368, - "name": "CVE-2022-45461", - "full_name": "Live-Hack-CVE\/CVE-2022-45461", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45461", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45461 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:17:04Z", - "updated_at": "2022-12-23T16:17:04Z", - "pushed_at": "2022-12-23T16:17:07Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45462.json b/2022/CVE-2022-45462.json deleted file mode 100644 index 48c66fd039..0000000000 --- a/2022/CVE-2022-45462.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560516, - "name": "CVE-2022-45462", - "full_name": "Live-Hack-CVE\/CVE-2022-45462", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45462", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45462 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:43Z", - "updated_at": "2022-12-23T14:52:43Z", - "pushed_at": "2022-12-23T14:52:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45470.json b/2022/CVE-2022-45470.json deleted file mode 100644 index ccd983a0a9..0000000000 --- a/2022/CVE-2022-45470.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581562672, - "name": "CVE-2022-45470", - "full_name": "Live-Hack-CVE\/CVE-2022-45470", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45470", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45470 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:59:46Z", - "updated_at": "2022-12-23T14:59:46Z", - "pushed_at": "2022-12-23T14:59:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45471.json b/2022/CVE-2022-45471.json deleted file mode 100644 index 6b7e1c7f47..0000000000 --- a/2022/CVE-2022-45471.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581583471, - "name": "CVE-2022-45471", - "full_name": "Live-Hack-CVE\/CVE-2022-45471", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45471", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45471 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T16:13:46Z", - "updated_at": "2022-12-23T16:13:46Z", - "pushed_at": "2022-12-23T16:13:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45472.json b/2022/CVE-2022-45472.json deleted file mode 100644 index bb21ac1718..0000000000 --- a/2022/CVE-2022-45472.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581560536, - "name": "CVE-2022-45472", - "full_name": "Live-Hack-CVE\/CVE-2022-45472", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45472", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45472 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:52:47Z", - "updated_at": "2022-12-23T14:52:47Z", - "pushed_at": "2022-12-23T14:52:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45473.json b/2022/CVE-2022-45473.json deleted file mode 100644 index 4a37898eaf..0000000000 --- a/2022/CVE-2022-45473.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548044, - "name": "CVE-2022-45473", - "full_name": "Live-Hack-CVE\/CVE-2022-45473", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45473", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45473 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:11:10Z", - "updated_at": "2022-12-23T14:11:10Z", - "pushed_at": "2022-12-23T14:11:12Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45474.json b/2022/CVE-2022-45474.json deleted file mode 100644 index 4aab24fd30..0000000000 --- a/2022/CVE-2022-45474.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581548067, - "name": "CVE-2022-45474", - "full_name": "Live-Hack-CVE\/CVE-2022-45474", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45474", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45474 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:11:13Z", - "updated_at": "2022-12-23T14:11:13Z", - "pushed_at": "2022-12-23T14:11:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45529.json b/2022/CVE-2022-45529.json deleted file mode 100644 index 85d50e6093..0000000000 --- a/2022/CVE-2022-45529.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581572255, - "name": "CVE-2022-45529", - "full_name": "Live-Hack-CVE\/CVE-2022-45529", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45529", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45529 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:33:03Z", - "updated_at": "2022-12-23T15:33:03Z", - "pushed_at": "2022-12-23T15:33:05Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45535.json b/2022/CVE-2022-45535.json deleted file mode 100644 index e9ceb55948..0000000000 --- a/2022/CVE-2022-45535.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563288, - "name": "CVE-2022-45535", - "full_name": "Live-Hack-CVE\/CVE-2022-45535", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45535", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45535 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:43Z", - "updated_at": "2022-12-23T15:01:43Z", - "pushed_at": "2022-12-23T15:01:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45536.json b/2022/CVE-2022-45536.json deleted file mode 100644 index 22be0ea409..0000000000 --- a/2022/CVE-2022-45536.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581563239, - "name": "CVE-2022-45536", - "full_name": "Live-Hack-CVE\/CVE-2022-45536", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45536", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45536 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T15:01:34Z", - "updated_at": "2022-12-23T15:01:34Z", - "pushed_at": "2022-12-23T15:01:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45868.json b/2022/CVE-2022-45868.json deleted file mode 100644 index 940a52d810..0000000000 --- a/2022/CVE-2022-45868.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526516, - "name": "CVE-2022-45868", - "full_name": "Live-Hack-CVE\/CVE-2022-45868", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45868", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45868 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:41Z", - "updated_at": "2022-12-23T12:55:41Z", - "pushed_at": "2022-12-23T12:55:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45872.json b/2022/CVE-2022-45872.json deleted file mode 100644 index 2eb2bc5397..0000000000 --- a/2022/CVE-2022-45872.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526552, - "name": "CVE-2022-45872", - "full_name": "Live-Hack-CVE\/CVE-2022-45872", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45872", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45872 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:47Z", - "updated_at": "2022-12-23T12:55:47Z", - "pushed_at": "2022-12-23T12:55:49Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45873.json b/2022/CVE-2022-45873.json deleted file mode 100644 index 3844295db1..0000000000 --- a/2022/CVE-2022-45873.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581525511, - "name": "CVE-2022-45873", - "full_name": "Live-Hack-CVE\/CVE-2022-45873", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45873", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45873 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:51:50Z", - "updated_at": "2022-12-23T12:51:51Z", - "pushed_at": "2022-12-23T12:51:52Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45884.json b/2022/CVE-2022-45884.json deleted file mode 100644 index 1696dbf8d3..0000000000 --- a/2022/CVE-2022-45884.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537008, - "name": "CVE-2022-45884", - "full_name": "Live-Hack-CVE\/CVE-2022-45884", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45884", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45884 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:45Z", - "updated_at": "2022-12-23T13:32:45Z", - "pushed_at": "2022-12-23T13:32:47Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45885.json b/2022/CVE-2022-45885.json deleted file mode 100644 index 513c3f0fa8..0000000000 --- a/2022/CVE-2022-45885.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537037, - "name": "CVE-2022-45885", - "full_name": "Live-Hack-CVE\/CVE-2022-45885", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45885", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45885 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:48Z", - "updated_at": "2022-12-23T13:32:48Z", - "pushed_at": "2022-12-23T13:32:51Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45886.json b/2022/CVE-2022-45886.json deleted file mode 100644 index bf666022f1..0000000000 --- a/2022/CVE-2022-45886.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537055, - "name": "CVE-2022-45886", - "full_name": "Live-Hack-CVE\/CVE-2022-45886", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45886", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45886 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:52Z", - "updated_at": "2022-12-23T13:32:52Z", - "pushed_at": "2022-12-23T13:32:56Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45887.json b/2022/CVE-2022-45887.json deleted file mode 100644 index 3637532e8a..0000000000 --- a/2022/CVE-2022-45887.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537077, - "name": "CVE-2022-45887", - "full_name": "Live-Hack-CVE\/CVE-2022-45887", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45887", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45887 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:32:57Z", - "updated_at": "2022-12-23T13:32:57Z", - "pushed_at": "2022-12-23T13:33:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45888.json b/2022/CVE-2022-45888.json deleted file mode 100644 index c73330437e..0000000000 --- a/2022/CVE-2022-45888.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581537091, - "name": "CVE-2022-45888", - "full_name": "Live-Hack-CVE\/CVE-2022-45888", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45888", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45888 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T13:33:01Z", - "updated_at": "2022-12-23T13:33:01Z", - "pushed_at": "2022-12-23T13:33:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45907.json b/2022/CVE-2022-45907.json deleted file mode 100644 index e616214e88..0000000000 --- a/2022/CVE-2022-45907.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549792, - "name": "CVE-2022-45907", - "full_name": "Live-Hack-CVE\/CVE-2022-45907", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45907", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45907 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:54Z", - "updated_at": "2022-12-23T14:16:55Z", - "pushed_at": "2022-12-23T14:16:57Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45908.json b/2022/CVE-2022-45908.json deleted file mode 100644 index 67dbefe56e..0000000000 --- a/2022/CVE-2022-45908.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524717, - "name": "CVE-2022-45908", - "full_name": "Live-Hack-CVE\/CVE-2022-45908", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45908", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45908 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:49:08Z", - "updated_at": "2022-12-23T12:49:08Z", - "pushed_at": "2022-12-23T12:49:10Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45919.json b/2022/CVE-2022-45919.json deleted file mode 100644 index 5e536bfd71..0000000000 --- a/2022/CVE-2022-45919.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581549814, - "name": "CVE-2022-45919", - "full_name": "Live-Hack-CVE\/CVE-2022-45919", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45919", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45919 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T14:16:58Z", - "updated_at": "2022-12-23T14:16:58Z", - "pushed_at": "2022-12-23T14:17:00Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45930.json b/2022/CVE-2022-45930.json deleted file mode 100644 index b1802f669a..0000000000 --- a/2022/CVE-2022-45930.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526478, - "name": "CVE-2022-45930", - "full_name": "Live-Hack-CVE\/CVE-2022-45930", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45930", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45930 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:34Z", - "updated_at": "2022-12-23T12:55:34Z", - "pushed_at": "2022-12-23T12:55:36Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45931.json b/2022/CVE-2022-45931.json deleted file mode 100644 index 24dd6478d0..0000000000 --- a/2022/CVE-2022-45931.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526491, - "name": "CVE-2022-45931", - "full_name": "Live-Hack-CVE\/CVE-2022-45931", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45931", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45931 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:37Z", - "updated_at": "2022-12-23T12:55:37Z", - "pushed_at": "2022-12-23T12:55:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45932.json b/2022/CVE-2022-45932.json deleted file mode 100644 index 4d7581a975..0000000000 --- a/2022/CVE-2022-45932.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581526530, - "name": "CVE-2022-45932", - "full_name": "Live-Hack-CVE\/CVE-2022-45932", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45932", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45932 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:55:44Z", - "updated_at": "2022-12-23T12:55:44Z", - "pushed_at": "2022-12-23T12:55:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45933.json b/2022/CVE-2022-45933.json deleted file mode 100644 index 63fb3780bc..0000000000 --- a/2022/CVE-2022-45933.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524632, - "name": "CVE-2022-45933", - "full_name": "Live-Hack-CVE\/CVE-2022-45933", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45933", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45933 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:51Z", - "updated_at": "2022-12-23T12:48:51Z", - "pushed_at": "2022-12-23T12:48:53Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45934.json b/2022/CVE-2022-45934.json deleted file mode 100644 index f09e03e4da..0000000000 --- a/2022/CVE-2022-45934.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524465, - "name": "CVE-2022-45934", - "full_name": "Live-Hack-CVE\/CVE-2022-45934", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45934", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45934 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:48:16Z", - "updated_at": "2022-12-23T12:48:16Z", - "pushed_at": "2022-12-23T12:48:18Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-45939.json b/2022/CVE-2022-45939.json deleted file mode 100644 index 51d53da5a0..0000000000 --- a/2022/CVE-2022-45939.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581524363, - "name": "CVE-2022-45939", - "full_name": "Live-Hack-CVE\/CVE-2022-45939", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-45939", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-45939 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:47:59Z", - "updated_at": "2022-12-23T12:47:59Z", - "pushed_at": "2022-12-23T12:48:01Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-46148.json b/2022/CVE-2022-46148.json deleted file mode 100644 index d5a0da5cc9..0000000000 --- a/2022/CVE-2022-46148.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515588, - "name": "CVE-2022-46148", - "full_name": "Live-Hack-CVE\/CVE-2022-46148", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46148", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46148 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:28Z", - "updated_at": "2022-12-23T12:15:28Z", - "pushed_at": "2022-12-23T12:15:30Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/2022/CVE-2022-46150.json b/2022/CVE-2022-46150.json deleted file mode 100644 index a060fe9d53..0000000000 --- a/2022/CVE-2022-46150.json +++ /dev/null @@ -1,31 +0,0 @@ -[ - { - "id": 581515601, - "name": "CVE-2022-46150", - "full_name": "Live-Hack-CVE\/CVE-2022-46150", - "owner": { - "login": "Live-Hack-CVE", - "id": 121191732, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4", - "html_url": "https:\/\/github.com\/Live-Hack-CVE" - }, - "html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-46150", - "description": "This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file is in JSON format and contains detailed information about the vulnerability, such as its reference number, description, impact, and resolution. CVE: CVE-2022-46150 Made by Sn0wAlice. ❤️", - "fork": false, - "created_at": "2022-12-23T12:15:31Z", - "updated_at": "2022-12-23T12:15:31Z", - "pushed_at": "2022-12-23T12:15:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0 - } -] \ No newline at end of file diff --git a/README.md b/README.md index 73df1f6d72..0a1c7aa232 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,14 @@ # PoC in GitHub ## 2022 +### CVE-2022-0031 (2022-11-09) + + +A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system allows a local attacker with shell access to the engine to execute programs with elevated privileges. + + +- [Live-Hack-CVE/CVE-2022-0031](https://github.com/Live-Hack-CVE/CVE-2022-0031) + ### CVE-2022-0137 (2022-11-14) @@ -17,6 +25,14 @@ dolibarr is vulnerable to Business Logic Errors - [Live-Hack-CVE/CVE-2022-0174](https://github.com/Live-Hack-CVE/CVE-2022-0174) +### CVE-2022-0175 (2022-08-26) + + +A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure. + + +- [Live-Hack-CVE/CVE-2022-0175](https://github.com/Live-Hack-CVE/CVE-2022-0175) + ### CVE-2022-0185 (2022-02-11) @@ -31,6 +47,22 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu - [veritas501/CVE-2022-0185-PipeVersion](https://github.com/veritas501/CVE-2022-0185-PipeVersion) - [featherL/CVE-2022-0185-exploit](https://github.com/featherL/CVE-2022-0185-exploit) +### CVE-2022-0204 (2022-03-09) + + +A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service. + + +- [Live-Hack-CVE/CVE-2022-0204](https://github.com/Live-Hack-CVE/CVE-2022-0204) + +### CVE-2022-0213 (2022-01-14) + + +vim is vulnerable to Heap-based Buffer Overflow + + +- [Live-Hack-CVE/CVE-2022-0213](https://github.com/Live-Hack-CVE/CVE-2022-0213) + ### CVE-2022-0219 (2022-01-20) @@ -39,14 +71,6 @@ Improper Restriction of XML External Entity Reference in GitHub repository skylo - [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219) -### CVE-2022-0222 (2022-11-22) - - -A CWE-269: Improper Privilege Management vulnerability exists that could cause a denial of service of the Ethernet communication of the controller when sending a specific request over SNMP. Affected products: Modicon M340 CPUs(BMXP34* versions prior to V3.40), Modicon M340 X80 Ethernet Communication modules:BMXNOE0100 (H), BMXNOE0110 (H), BMXNOR0200H RTU(BMXNOE* all versions)(BMXNOR* versions prior to v1.7 IR24) - - -- [Live-Hack-CVE/CVE-2022-0222](https://github.com/Live-Hack-CVE/CVE-2022-0222) - ### CVE-2022-0224 (2022-01-14) @@ -64,6 +88,22 @@ The WP Import Export WordPress plugin (both free and premium versions) is vulner - [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236) - [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236) +### CVE-2022-0261 (2022-01-18) + + +Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. + + +- [Live-Hack-CVE/CVE-2022-0261](https://github.com/Live-Hack-CVE/CVE-2022-0261) + +### CVE-2022-0264 (2022-02-04) + + +A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6 + + +- [Live-Hack-CVE/CVE-2022-0264](https://github.com/Live-Hack-CVE/CVE-2022-0264) + ### CVE-2022-0265 (2022-03-03) @@ -72,13 +112,13 @@ Improper Restriction of XML External Entity Reference in GitHub repository hazel - [achuna33/CVE-2022-0265](https://github.com/achuna33/CVE-2022-0265) -### CVE-2022-0318 (2022-01-21) +### CVE-2022-0319 (2022-01-21) -Heap-based Buffer Overflow in vim/vim prior to 8.2. +Out-of-bounds Read in vim/vim prior to 8.2. -- [Live-Hack-CVE/CVE-2022-0318](https://github.com/Live-Hack-CVE/CVE-2022-0318) +- [Live-Hack-CVE/CVE-2022-0319](https://github.com/Live-Hack-CVE/CVE-2022-0319) ### CVE-2022-0324 (2022-11-14) @@ -99,13 +139,53 @@ A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was ### CVE-2022-0337 - [Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera](https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera) -### CVE-2022-0392 (2022-01-28) +### CVE-2022-0351 (2022-01-25) -Heap-based Buffer Overflow in GitHub repository vim prior to 8.2. +Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2. -- [Live-Hack-CVE/CVE-2022-0392](https://github.com/Live-Hack-CVE/CVE-2022-0392) +- [Live-Hack-CVE/CVE-2022-0351](https://github.com/Live-Hack-CVE/CVE-2022-0351) + +### CVE-2022-0359 (2022-01-26) + + +Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. + + +- [Live-Hack-CVE/CVE-2022-0359](https://github.com/Live-Hack-CVE/CVE-2022-0359) + +### CVE-2022-0361 (2022-01-26) + + +Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. + + +- [Live-Hack-CVE/CVE-2022-0361](https://github.com/Live-Hack-CVE/CVE-2022-0361) + +### CVE-2022-0368 (2022-01-26) + + +Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. + + +- [Live-Hack-CVE/CVE-2022-0368](https://github.com/Live-Hack-CVE/CVE-2022-0368) + +### CVE-2022-0391 (2022-02-09) + + +A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14. + + +- [Live-Hack-CVE/CVE-2022-0391](https://github.com/Live-Hack-CVE/CVE-2022-0391) + +### CVE-2022-0396 (2022-03-23) + + +BIND 9.16.11 -> 9.16.26, 9.17.0 -> 9.18.0 and versions 9.16.11-S1 -> 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection. + + +- [Live-Hack-CVE/CVE-2022-0396](https://github.com/Live-Hack-CVE/CVE-2022-0396) ### CVE-2022-0414 (2022-01-31) @@ -115,14 +195,6 @@ Business Logic Errors in Packagist dolibarr/dolibarr prior to 16.0. - [Live-Hack-CVE/CVE-2022-0414](https://github.com/Live-Hack-CVE/CVE-2022-0414) -### CVE-2022-0421 (2022-11-21) - - -The Five Star Restaurant Reservations WordPress plugin before 2.4.12 does not have authorisation when changing whether a payment was successful or failed, allowing unauthenticated users to change the payment status of arbitrary bookings. Furthermore, due to the lack of sanitisation and escaping, attackers could perform Cross-Site Scripting attacks against a logged in admin viewing the failed payments - - -- [Live-Hack-CVE/CVE-2022-0421](https://github.com/Live-Hack-CVE/CVE-2022-0421) - ### CVE-2022-0441 (2022-03-07) @@ -139,14 +211,6 @@ Exposure of Private Personal Information to an Unauthorized Actor in GitHub repo - [Acceis/exploit-CVE-2022-0482](https://github.com/Acceis/exploit-CVE-2022-0482) -### CVE-2022-0485 (2022-08-29) - - -A flaw was found in the copying tool `nbdcopy` of libnbd. When performing multi-threaded copies using asynchronous nbd calls, nbdcopy was blindly treating the completion of an asynchronous command as successful, rather than checking the *error parameter. This could result in the silent creation of a corrupted destination image. - - -- [Live-Hack-CVE/CVE-2022-0485](https://github.com/Live-Hack-CVE/CVE-2022-0485) - ### CVE-2022-0486 (2022-05-17) @@ -192,29 +256,69 @@ It was discovered, that redis, a persistent key-value database, due to a packagi - [aodsec/CVE-2022-0543](https://github.com/aodsec/CVE-2022-0543) -### CVE-2022-0613 (2022-02-16) +### CVE-2022-0561 (2022-02-11) -Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8. +Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712. -- [Live-Hack-CVE/CVE-2022-0613](https://github.com/Live-Hack-CVE/CVE-2022-0613) +- [Live-Hack-CVE/CVE-2022-0561](https://github.com/Live-Hack-CVE/CVE-2022-0561) -### CVE-2022-0696 (2022-02-21) +### CVE-2022-0562 (2022-02-11) -NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428. +Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c. -- [Live-Hack-CVE/CVE-2022-0696](https://github.com/Live-Hack-CVE/CVE-2022-0696) +- [Live-Hack-CVE/CVE-2022-0562](https://github.com/Live-Hack-CVE/CVE-2022-0562) -### CVE-2022-0698 (2022-11-25) +### CVE-2022-0581 (2022-02-14) -Microweber version 1.3.1 allows an unauthenticated user to perform an account takeover via an XSS on the 'select-file' parameter. +Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file -- [Live-Hack-CVE/CVE-2022-0698](https://github.com/Live-Hack-CVE/CVE-2022-0698) +- [Live-Hack-CVE/CVE-2022-0581](https://github.com/Live-Hack-CVE/CVE-2022-0581) + +### CVE-2022-0582 (2022-02-14) + + +Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2022-0582](https://github.com/Live-Hack-CVE/CVE-2022-0582) + +### CVE-2022-0583 (2022-02-14) + + +Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2022-0583](https://github.com/Live-Hack-CVE/CVE-2022-0583) + +### CVE-2022-0585 (2022-02-18) + + +Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2022-0585](https://github.com/Live-Hack-CVE/CVE-2022-0585) + +### CVE-2022-0586 (2022-02-14) + + +Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2022-0586](https://github.com/Live-Hack-CVE/CVE-2022-0586) + +### CVE-2022-0594 (2022-07-25) + + +The Professional Social Sharing Buttons, Icons & Related Posts WordPress plugin before 9.7.6 does not have proper authorisation check in one of the AJAX action, available to unauthenticated (in v < 9.7.5) and author+ (in v9.7.5) users, allowing them to call it and retrieve various information such as the list of active plugins, various version like PHP, cURL, WP etc. + + +- [Live-Hack-CVE/CVE-2022-0594](https://github.com/Live-Hack-CVE/CVE-2022-0594) ### CVE-2022-0725 (2022-03-07) @@ -250,6 +354,7 @@ The BN_mod_sqrt() function, which computes a modular square root, contains a bug - [yywing/cve-2022-0778](https://github.com/yywing/cve-2022-0778) - [jkakavas/CVE-2022-0778-POC](https://github.com/jkakavas/CVE-2022-0778-POC) - [0xUhaw/CVE-2022-0778](https://github.com/0xUhaw/CVE-2022-0778) +- [Live-Hack-CVE/CVE-2022-0778](https://github.com/Live-Hack-CVE/CVE-2022-0778) ### CVE-2022-0811 (2022-03-16) @@ -275,7 +380,6 @@ Improper Access Control to Remote Code Execution in GitHub repository webmin/web - [faisalfs10x/Webmin-CVE-2022-0824-revshell](https://github.com/faisalfs10x/Webmin-CVE-2022-0824-revshell) - [honypot/CVE-2022-0824](https://github.com/honypot/CVE-2022-0824) -- [Live-Hack-CVE/CVE-2022-0824](https://github.com/Live-Hack-CVE/CVE-2022-0824) ### CVE-2022-0847 (2022-03-07) @@ -364,6 +468,46 @@ A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak - [ByteHackr/CVE-2022-0853](https://github.com/ByteHackr/CVE-2022-0853) +### CVE-2022-0865 (2022-03-07) + + +Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045. + + +- [Live-Hack-CVE/CVE-2022-0865](https://github.com/Live-Hack-CVE/CVE-2022-0865) + +### CVE-2022-0891 (2022-03-09) + + +A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact + + +- [Live-Hack-CVE/CVE-2022-0891](https://github.com/Live-Hack-CVE/CVE-2022-0891) + +### CVE-2022-0907 (2022-03-11) + + +Unchecked Return Value to NULL Pointer Dereference in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f2b656e2. + + +- [Live-Hack-CVE/CVE-2022-0907](https://github.com/Live-Hack-CVE/CVE-2022-0907) + +### CVE-2022-0908 (2022-03-11) + + +Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file. + + +- [Live-Hack-CVE/CVE-2022-0908](https://github.com/Live-Hack-CVE/CVE-2022-0908) + +### CVE-2022-0909 (2022-03-11) + + +Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa. + + +- [Live-Hack-CVE/CVE-2022-0909](https://github.com/Live-Hack-CVE/CVE-2022-0909) + ### CVE-2022-0918 (2022-03-16) @@ -372,6 +516,14 @@ A vulnerability was discovered in the 389 Directory Server that allows an unauth - [NathanMulbrook/CVE-2022-0918](https://github.com/NathanMulbrook/CVE-2022-0918) +### CVE-2022-0924 (2022-03-11) + + +Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4. + + +- [Live-Hack-CVE/CVE-2022-0924](https://github.com/Live-Hack-CVE/CVE-2022-0924) + ### CVE-2022-0995 (2022-03-25) @@ -396,7 +548,6 @@ A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of t - [pqlx/CVE-2022-1015](https://github.com/pqlx/CVE-2022-1015) - [zanezhub/CVE-2022-1015-1016](https://github.com/zanezhub/CVE-2022-1015-1016) -- [Live-Hack-CVE/CVE-2022-1015](https://github.com/Live-Hack-CVE/CVE-2022-1015) ### CVE-2022-1040 (2022-03-25) @@ -414,6 +565,14 @@ The WPQA Builder Plugin WordPress plugin before 5.2, used as a companion plugin - [V35HR4J/CVE-2022-1051](https://github.com/V35HR4J/CVE-2022-1051) +### CVE-2022-1056 (2022-03-28) + + +Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd. + + +- [Live-Hack-CVE/CVE-2022-1056](https://github.com/Live-Hack-CVE/CVE-2022-1056) + ### CVE-2022-1077 (2022-03-29) @@ -446,14 +605,6 @@ Improper neutralization of user input in GitLab CE/EE versions 14.4 before 14.7. - [Greenwolf/CVE-2022-1175](https://github.com/Greenwolf/CVE-2022-1175) -### CVE-2022-1184 (2022-08-29) - - -A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service. - - -- [Live-Hack-CVE/CVE-2022-1184](https://github.com/Live-Hack-CVE/CVE-2022-1184) - ### CVE-2022-1192 (2022-05-23) @@ -462,21 +613,29 @@ The Turn off all comments WordPress plugin through 1.0 does not sanitise and esc - [Mouhamedtec/CVE-2022-1192](https://github.com/Mouhamedtec/CVE-2022-1192) -### CVE-2022-1233 (2022-04-04) +### CVE-2022-1203 (2022-05-30) -URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11. +The Content Mask WordPress plugin before 1.8.4.1 does not have authorisation and CSRF checks in various AJAX actions, as well as does not validate the option to be updated to ensure it belongs to the plugin. As a result, any authenticated user, such as subscriber could modify arbitrary blog options -- [Live-Hack-CVE/CVE-2022-1233](https://github.com/Live-Hack-CVE/CVE-2022-1233) +- [Live-Hack-CVE/CVE-2022-1203](https://github.com/Live-Hack-CVE/CVE-2022-1203) -### CVE-2022-1270 (2022-09-28) +### CVE-2022-1210 (2022-04-03) -In GraphicsMagick, a heap buffer overflow was found when parsing MIFF. +A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used. -- [Live-Hack-CVE/CVE-2022-1270](https://github.com/Live-Hack-CVE/CVE-2022-1270) +- [Live-Hack-CVE/CVE-2022-1210](https://github.com/Live-Hack-CVE/CVE-2022-1210) + +### CVE-2022-1259 (2022-08-31) + + +A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server. This flaw exists because of an incomplete fix for CVE-2021-3629. + + +- [Live-Hack-CVE/CVE-2022-1259](https://github.com/Live-Hack-CVE/CVE-2022-1259) ### CVE-2022-1292 (2022-05-03) @@ -489,6 +648,14 @@ The c_rehash script does not properly sanitise shell metacharacters to prevent c - [alcaparra/CVE-2022-1292](https://github.com/alcaparra/CVE-2022-1292) - [rama291041610/CVE-2022-1292](https://github.com/rama291041610/CVE-2022-1292) +### CVE-2022-1319 (2022-08-31) + + +A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG. + + +- [Live-Hack-CVE/CVE-2022-1319](https://github.com/Live-Hack-CVE/CVE-2022-1319) + ### CVE-2022-1329 (2022-04-19) @@ -498,14 +665,31 @@ The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized - [AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit](https://github.com/AkuCyberSec/CVE-2022-1329-WordPress-Elementor-3.6.0-3.6.1-3.6.2-Remote-Code-Execution-Exploit) - [mcdulltii/CVE-2022-1329](https://github.com/mcdulltii/CVE-2022-1329) - [Grazee/CVE-2022-1329-WordPress-Elementor-RCE](https://github.com/Grazee/CVE-2022-1329-WordPress-Elementor-RCE) +- [Live-Hack-CVE/CVE-2022-1329](https://github.com/Live-Hack-CVE/CVE-2022-1329) -### CVE-2022-1365 (2022-04-15) +### CVE-2022-1354 (2022-08-31) -Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository lquixada/cross-fetch prior to 3.1.5. +A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service. -- [Live-Hack-CVE/CVE-2022-1365](https://github.com/Live-Hack-CVE/CVE-2022-1365) +- [Live-Hack-CVE/CVE-2022-1354](https://github.com/Live-Hack-CVE/CVE-2022-1354) + +### CVE-2022-1355 (2022-08-31) + + +A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service. + + +- [Live-Hack-CVE/CVE-2022-1355](https://github.com/Live-Hack-CVE/CVE-2022-1355) + +### CVE-2022-1381 (2022-04-17) + + +global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution + + +- [Live-Hack-CVE/CVE-2022-1381](https://github.com/Live-Hack-CVE/CVE-2022-1381) ### CVE-2022-1388 (2022-05-05) @@ -566,29 +750,29 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5. - [Chocapikk/CVE-2022-1388](https://github.com/Chocapikk/CVE-2022-1388) - [electr0lulz/Mass-CVE-2022-1388](https://github.com/electr0lulz/Mass-CVE-2022-1388) -### CVE-2022-1578 (2022-11-21) +### CVE-2022-1391 (2022-04-25) -The My wpdb WordPress plugin before 2.5 is missing CSRF check when running SQL queries, which could allow attacker to make a logged in admin run arbitrary SQL query via a CSRF attack +The Cab fare calculator WordPress plugin before 1.0.4 does not validate the controller parameter before using it in require statements, which could lead to Local File Inclusion issues. -- [Live-Hack-CVE/CVE-2022-1578](https://github.com/Live-Hack-CVE/CVE-2022-1578) +- [Live-Hack-CVE/CVE-2022-1391](https://github.com/Live-Hack-CVE/CVE-2022-1391) -### CVE-2022-1579 (2022-11-21) +### CVE-2022-1420 (2022-04-21) -The function check_is_login_page() uses headers for the IP check, which can be easily spoofed. +Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774. -- [Live-Hack-CVE/CVE-2022-1579](https://github.com/Live-Hack-CVE/CVE-2022-1579) +- [Live-Hack-CVE/CVE-2022-1420](https://github.com/Live-Hack-CVE/CVE-2022-1420) -### CVE-2022-1581 (2022-11-21) +### CVE-2022-1566 (2022-05-30) -The WP-Polls WordPress plugin before 2.76.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations. +The Quotes llama WordPress plugin before 1.0.0 does not sanitise and escape Quotes, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed. The attack could also be performed by tricking an admin to import a malicious CSV file -- [Live-Hack-CVE/CVE-2022-1581](https://github.com/Live-Hack-CVE/CVE-2022-1581) +- [Live-Hack-CVE/CVE-2022-1566](https://github.com/Live-Hack-CVE/CVE-2022-1566) ### CVE-2022-1597 (2022-06-06) @@ -611,21 +795,29 @@ The WPQA Builder WordPress plugin before 5.4 which is a companion to the Discy a - [NullBrunk/CVE-2022-1609](https://github.com/NullBrunk/CVE-2022-1609) - [0xSojalSec/-CVE-2022-1609](https://github.com/0xSojalSec/-CVE-2022-1609) -### CVE-2022-1621 (2022-05-09) +### CVE-2022-1620 (2022-05-08) -Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution +NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input. -- [Live-Hack-CVE/CVE-2022-1621](https://github.com/Live-Hack-CVE/CVE-2022-1621) +- [Live-Hack-CVE/CVE-2022-1620](https://github.com/Live-Hack-CVE/CVE-2022-1620) -### CVE-2022-1785 (2022-05-19) +### CVE-2022-1622 (2022-05-11) -Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. +LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa. -- [Live-Hack-CVE/CVE-2022-1785](https://github.com/Live-Hack-CVE/CVE-2022-1785) +- [Live-Hack-CVE/CVE-2022-1622](https://github.com/Live-Hack-CVE/CVE-2022-1622) + +### CVE-2022-1725 (2022-05-16) + + +NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959. + + +- [Live-Hack-CVE/CVE-2022-1725](https://github.com/Live-Hack-CVE/CVE-2022-1725) ### CVE-2022-1903 (2022-06-27) @@ -635,13 +827,37 @@ The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (ev - [biulove0x/CVE-2022-1903](https://github.com/biulove0x/CVE-2022-1903) -### CVE-2022-1942 (2022-05-31) +### CVE-2022-1921 (2022-07-19) -Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. +Integer overflow in avidemux element in gst_avi_demux_invert function which allows a heap overwrite while parsing avi files. Potential for arbitrary code execution through heap overwrite. -- [Live-Hack-CVE/CVE-2022-1942](https://github.com/Live-Hack-CVE/CVE-2022-1942) +- [Live-Hack-CVE/CVE-2022-1921](https://github.com/Live-Hack-CVE/CVE-2022-1921) + +### CVE-2022-1928 (2022-05-29) + + +Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9. + + +- [Live-Hack-CVE/CVE-2022-1928](https://github.com/Live-Hack-CVE/CVE-2022-1928) + +### CVE-2022-1938 (2022-07-11) + + +The Awin Data Feed WordPress plugin before 1.8 does not sanitise and escape a header when processing request to generate analytics data, allowing unauthenticated users to perform Stored Cross-Site Scripting attacks against a logged in admin viewing the plugin's settings + + +- [Live-Hack-CVE/CVE-2022-1938](https://github.com/Live-Hack-CVE/CVE-2022-1938) + +### CVE-2022-1943 (2022-06-01) + + +A flaw out of bounds memory write in the Linux kernel UDF file system functionality was found in the way user triggers some file operation which triggers udf_write_fi(). A local user could use this flaw to crash the system or potentially + + +- [Live-Hack-CVE/CVE-2022-1943](https://github.com/Live-Hack-CVE/CVE-2022-1943) ### CVE-2022-1966 - [ASkyeye/CVE-2022-1966](https://github.com/ASkyeye/CVE-2022-1966) @@ -649,13 +865,13 @@ Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ### CVE-2022-1972 - [randorisec/CVE-2022-1972-infoleak-PoC](https://github.com/randorisec/CVE-2022-1972-infoleak-PoC) -### CVE-2022-2000 (2022-06-07) +### CVE-2022-1973 (2022-08-05) -Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. +A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem. -- [Live-Hack-CVE/CVE-2022-2000](https://github.com/Live-Hack-CVE/CVE-2022-2000) +- [Live-Hack-CVE/CVE-2022-1973](https://github.com/Live-Hack-CVE/CVE-2022-1973) ### CVE-2022-2022 (2022-06-07) @@ -665,6 +881,14 @@ Cross-site Scripting (XSS) - Stored in GitHub repository nocodb/nocodb prior to - [GREENHAT7/pxplan](https://github.com/GREENHAT7/pxplan) +### CVE-2022-2042 (2022-06-10) + + +Use After Free in GitHub repository vim/vim prior to 8.2. + + +- [Live-Hack-CVE/CVE-2022-2042](https://github.com/Live-Hack-CVE/CVE-2022-2042) + ### CVE-2022-2060 (2022-06-13) @@ -673,22 +897,6 @@ Cross-site Scripting (XSS) - Stored in GitHub repository dolibarr/dolibarr prior - [Live-Hack-CVE/CVE-2022-2060](https://github.com/Live-Hack-CVE/CVE-2022-2060) -### CVE-2022-2129 (2022-06-19) - - -Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. - - -- [Live-Hack-CVE/CVE-2022-2129](https://github.com/Live-Hack-CVE/CVE-2022-2129) - -### CVE-2022-2153 (2022-08-31) - - -A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service. - - -- [Live-Hack-CVE/CVE-2022-2153](https://github.com/Live-Hack-CVE/CVE-2022-2153) - ### CVE-2022-2166 (2022-11-15) @@ -697,6 +905,14 @@ Improper Restriction of Excessive Authentication Attempts in GitHub repository m - [Live-Hack-CVE/CVE-2022-2166](https://github.com/Live-Hack-CVE/CVE-2022-2166) +### CVE-2022-2188 (2022-11-07) + + +Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker. + + +- [Live-Hack-CVE/CVE-2022-2188](https://github.com/Live-Hack-CVE/CVE-2022-2188) + ### CVE-2022-2207 (2022-06-27) @@ -705,21 +921,21 @@ Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. - [Live-Hack-CVE/CVE-2022-2207](https://github.com/Live-Hack-CVE/CVE-2022-2207) -### CVE-2022-2294 (2022-07-27) +### CVE-2022-2214 (2022-06-27) -Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. +A vulnerability was found in SourceCodester Library Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /librarian/bookdetails.php. The manipulation of the argument id with the input ' AND (SELECT 9198 FROM (SELECT(SLEEP(5)))iqZA)-- PbtB leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. -- [Live-Hack-CVE/CVE-2022-2294](https://github.com/Live-Hack-CVE/CVE-2022-2294) +- [Live-Hack-CVE/CVE-2022-2214](https://github.com/Live-Hack-CVE/CVE-2022-2214) -### CVE-2022-2311 (2022-11-28) +### CVE-2022-2268 (2022-07-04) -The Find and Replace All WordPress plugin before 1.3 does not sanitize and escape some parameters from its setting page before outputting them back to the user, leading to a Reflected Cross-Site Scripting issue. +The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE -- [Live-Hack-CVE/CVE-2022-2311](https://github.com/Live-Hack-CVE/CVE-2022-2311) +- [Live-Hack-CVE/CVE-2022-2268](https://github.com/Live-Hack-CVE/CVE-2022-2268) ### CVE-2022-2333 (2022-09-16) @@ -729,189 +945,189 @@ If an attacker manages to trick a valid user into loading a malicious DLL, the a - [shirouQwQ/CVE-2022-2333](https://github.com/shirouQwQ/CVE-2022-2333) -### CVE-2022-2476 (2022-07-19) +### CVE-2022-2387 (2022-11-07) -A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:834 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:834 in main ==84257==ABORTING +The Easy Digital Downloads WordPress plugin before 3.0 does not have CSRF check in place when deleting payment history, and does not ensure that the post to be deleted is actually a payment history. As a result, attackers could make a logged in admin delete arbitrary post via a CSRF attack -- [Live-Hack-CVE/CVE-2022-2476](https://github.com/Live-Hack-CVE/CVE-2022-2476) +- [Live-Hack-CVE/CVE-2022-2387](https://github.com/Live-Hack-CVE/CVE-2022-2387) -### CVE-2022-2650 (2022-11-24) +### CVE-2022-2449 (2022-11-14) -Improper Restriction of Excessive Authentication Attempts in GitHub repository wger-project/wger prior to 2.2. +The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 does not perform CSRF checks for any of its AJAX actions, allowing an attackers to trick logged in users to perform various actions on their behalf on the site. -- [Live-Hack-CVE/CVE-2022-2650](https://github.com/Live-Hack-CVE/CVE-2022-2650) +- [Live-Hack-CVE/CVE-2022-2449](https://github.com/Live-Hack-CVE/CVE-2022-2449) -### CVE-2022-2663 (2022-09-01) +### CVE-2022-2450 (2022-11-14) -An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured. +The reSmush.it : the only free Image Optimizer & compress plugin WordPress plugin before 0.4.4 lacks authorization in various AJAX actions, allowing any logged-in users, such as subscribers to call them. -- [Live-Hack-CVE/CVE-2022-2663](https://github.com/Live-Hack-CVE/CVE-2022-2663) +- [Live-Hack-CVE/CVE-2022-2450](https://github.com/Live-Hack-CVE/CVE-2022-2450) -### CVE-2022-2721 (2022-11-24) +### CVE-2022-2526 (2022-09-09) -In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled. +A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later. -- [Live-Hack-CVE/CVE-2022-2721](https://github.com/Live-Hack-CVE/CVE-2022-2721) +- [Live-Hack-CVE/CVE-2022-2526](https://github.com/Live-Hack-CVE/CVE-2022-2526) -### CVE-2022-2791 (2022-11-22) +### CVE-2022-2637 (2022-10-06) -Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-434 Unrestricted Upload of File with Dangerous Type, and will upload any file written into the PLC logic folder to the connected PLC. +Incorrect Privilege Assignment vulnerability in Hitachi Storage Plug-in for VMware vCenter allows remote authenticated users to cause privilege escalation. This issue affects: Hitachi Storage Plug-in for VMware vCenter 04.8.0. -- [Live-Hack-CVE/CVE-2022-2791](https://github.com/Live-Hack-CVE/CVE-2022-2791) +- [Live-Hack-CVE/CVE-2022-2637](https://github.com/Live-Hack-CVE/CVE-2022-2637) -### CVE-2022-2867 (2022-08-17) +### CVE-2022-2711 (2022-11-07) -libtiff's tiffcrop utility has a uint32_t underflow that can lead to out of bounds read and write. An attacker who supplies a crafted file to tiffcrop (likely via tricking a user to run tiffcrop on it with certain parameters) could cause a crash or in some cases, further exploitation. +The Import any XML or CSV File to WordPress plugin before 3.6.9 is not validating the paths of files contained in uploaded zip archives, allowing highly privileged users, such as admins, to write arbitrary files to any part of the file system accessible by the web server via a path traversal vector. -- [Live-Hack-CVE/CVE-2022-2867](https://github.com/Live-Hack-CVE/CVE-2022-2867) +- [Live-Hack-CVE/CVE-2022-2711](https://github.com/Live-Hack-CVE/CVE-2022-2711) -### CVE-2022-2868 (2022-08-17) +### CVE-2022-2756 (2022-08-10) -libtiff's tiffcrop utility has a improper input validation flaw that can lead to out of bounds read and ultimately cause a crash if an attacker is able to supply a crafted file to tiffcrop. +Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1. -- [Live-Hack-CVE/CVE-2022-2868](https://github.com/Live-Hack-CVE/CVE-2022-2868) +- [Live-Hack-CVE/CVE-2022-2756](https://github.com/Live-Hack-CVE/CVE-2022-2756) -### CVE-2022-2869 (2022-08-17) +### CVE-2022-2758 (2022-08-31) -libtiff's tiffcrop tool has a uint32_t underflow which leads to out of bounds read and write in the extractContigSamples8bits routine. An attacker who supplies a crafted file to tiffcrop could trigger this flaw, most likely by tricking a user into opening the crafted file with tiffcrop. Triggering this flaw could cause a crash or potentially further exploitation. +Passwords are not adequately encrypted during the communication process between all versions of LS Industrial Systems (LSIS) Co. Ltd LS Electric XG5000 software prior to V4.0 and LS Electric PLCs: all versions of XGK-CPUU/H/A/S/E prior to V3.50, all versions of XGI-CPUU/UD/H/S/E prior to V3.20, all versions of XGR-CPUH prior to V1.80, all versions of XGB-XBMS prior to V3.00, all versions of XGB-XBCH prior to V1.90, and all versions of XGB-XECH prior to V1.30. This would allow an attacker to identify and decrypt the password of the affected PLCs by sniffing the PLC’s communication traffic. -- [Live-Hack-CVE/CVE-2022-2869](https://github.com/Live-Hack-CVE/CVE-2022-2869) +- [Live-Hack-CVE/CVE-2022-2758](https://github.com/Live-Hack-CVE/CVE-2022-2758) -### CVE-2022-2905 (2022-09-09) +### CVE-2022-2761 (2022-11-09) -An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data. +An information disclosure issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to use GitLab Flavored Markdown (GFM) references in a Jira issue to disclose the names of resources they don't have access to. -- [Live-Hack-CVE/CVE-2022-2905](https://github.com/Live-Hack-CVE/CVE-2022-2905) +- [Live-Hack-CVE/CVE-2022-2761](https://github.com/Live-Hack-CVE/CVE-2022-2761) -### CVE-2022-2928 (2022-10-07) +### CVE-2022-2764 (2022-09-01) -In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort. +A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations. -- [Live-Hack-CVE/CVE-2022-2928](https://github.com/Live-Hack-CVE/CVE-2022-2928) +- [Live-Hack-CVE/CVE-2022-2764](https://github.com/Live-Hack-CVE/CVE-2022-2764) -### CVE-2022-2929 (2022-10-07) +### CVE-2022-2781 (2022-10-06) -In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory. +In affected versions of Octopus Server it was identified that the same encryption process was used for both encrypting session cookies and variables. -- [Live-Hack-CVE/CVE-2022-2929](https://github.com/Live-Hack-CVE/CVE-2022-2929) +- [Live-Hack-CVE/CVE-2022-2781](https://github.com/Live-Hack-CVE/CVE-2022-2781) -### CVE-2022-2983 (2022-11-28) +### CVE-2022-2783 (2022-10-06) -The Salat Times WordPress plugin before 3.2.2 does not sanitize and escapes its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. +In affected versions of Octopus Server it was identified that a session cookie could be used as the CSRF token -- [Live-Hack-CVE/CVE-2022-2983](https://github.com/Live-Hack-CVE/CVE-2022-2983) +- [Live-Hack-CVE/CVE-2022-2783](https://github.com/Live-Hack-CVE/CVE-2022-2783) -### CVE-2022-3028 (2022-08-31) +### CVE-2022-2787 (2022-08-27) -A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket. +Schroot before 1.6.13 had too permissive rules on chroot or session names, allowing a denial of service on the schroot service for all users that may start a schroot session. -- [Live-Hack-CVE/CVE-2022-3028](https://github.com/Live-Hack-CVE/CVE-2022-3028) +- [Live-Hack-CVE/CVE-2022-2787](https://github.com/Live-Hack-CVE/CVE-2022-2787) -### CVE-2022-3061 (2022-09-01) +### CVE-2022-2805 (2022-10-19) -Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error. +A flaw was found in ovirt-engine, which leads to the logging of plaintext passwords in the log file when using otapi-style. This flaw allows an attacker with sufficient privileges to read the log file, leading to confidentiality loss. -- [Live-Hack-CVE/CVE-2022-3061](https://github.com/Live-Hack-CVE/CVE-2022-3061) +- [Live-Hack-CVE/CVE-2022-2805](https://github.com/Live-Hack-CVE/CVE-2022-2805) -### CVE-2022-3090 (2022-11-17) +### CVE-2022-2863 (2022-09-16) -Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could allow an attacker to obtain user credential hashes. +The Migration, Backup, Staging WordPress plugin before 0.9.76 does not sanitise and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server via a Traversal attack -- [Live-Hack-CVE/CVE-2022-3090](https://github.com/Live-Hack-CVE/CVE-2022-3090) +- [Live-Hack-CVE/CVE-2022-2863](https://github.com/Live-Hack-CVE/CVE-2022-2863) -### CVE-2022-3097 (2022-10-25) +### CVE-2022-2880 (2022-10-14) -The Plugin LBstopattack WordPress plugin before 1.1.3 does not use nonces when saving its settings, making it possible for attackers to conduct CSRF attacks. This could allow attackers to disable the plugin's protections. +Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged. -- [Live-Hack-CVE/CVE-2022-3097](https://github.com/Live-Hack-CVE/CVE-2022-3097) +- [Live-Hack-CVE/CVE-2022-2880](https://github.com/Live-Hack-CVE/CVE-2022-2880) -### CVE-2022-3176 (2022-09-16) +### CVE-2022-2881 (2022-09-21) -There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659 +The underlying bug might cause read past end of the buffer and either read memory it should not read, or crash the process. -- [Live-Hack-CVE/CVE-2022-3176](https://github.com/Live-Hack-CVE/CVE-2022-3176) +- [Live-Hack-CVE/CVE-2022-2881](https://github.com/Live-Hack-CVE/CVE-2022-2881) -### CVE-2022-3196 (2022-09-26) +### CVE-2022-2953 (2022-08-29) -Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) +LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8. -- [Live-Hack-CVE/CVE-2022-3196](https://github.com/Live-Hack-CVE/CVE-2022-3196) +- [Live-Hack-CVE/CVE-2022-2953](https://github.com/Live-Hack-CVE/CVE-2022-2953) -### CVE-2022-3197 (2022-09-26) +### CVE-2022-2986 (2022-10-06) -Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) +Enabling and disabling installed H5P libraries did not include the necessary token to prevent a CSRF risk. -- [Live-Hack-CVE/CVE-2022-3197](https://github.com/Live-Hack-CVE/CVE-2022-3197) +- [Live-Hack-CVE/CVE-2022-2986](https://github.com/Live-Hack-CVE/CVE-2022-2986) -### CVE-2022-3198 (2022-09-26) +### CVE-2022-3002 (2022-10-06) -Use after free in PDF in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) +Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. -- [Live-Hack-CVE/CVE-2022-3198](https://github.com/Live-Hack-CVE/CVE-2022-3198) +- [Live-Hack-CVE/CVE-2022-3002](https://github.com/Live-Hack-CVE/CVE-2022-3002) -### CVE-2022-3199 (2022-09-26) +### CVE-2022-3023 (2022-11-04) -Use after free in Frames in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) +Use of Externally-Controlled Format String in GitHub repository pingcap/tidb prior to 6.4.0, 6.1.3. -- [Live-Hack-CVE/CVE-2022-3199](https://github.com/Live-Hack-CVE/CVE-2022-3199) +- [Live-Hack-CVE/CVE-2022-3023](https://github.com/Live-Hack-CVE/CVE-2022-3023) -### CVE-2022-3200 (2022-09-26) +### CVE-2022-3122 (2022-09-05) -Heap buffer overflow in Internals in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) +A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file medicine_details.php. The manipulation of the argument medicine leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207854 is the identifier assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3200](https://github.com/Live-Hack-CVE/CVE-2022-3200) +- [Live-Hack-CVE/CVE-2022-3122](https://github.com/Live-Hack-CVE/CVE-2022-3122) -### CVE-2022-3235 (2022-09-18) +### CVE-2022-3195 (2022-09-26) -Use After Free in GitHub repository vim/vim prior to 9.0.0490. +Out of bounds write in Storage in Google Chrome prior to 105.0.5195.125 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) -- [Live-Hack-CVE/CVE-2022-3235](https://github.com/Live-Hack-CVE/CVE-2022-3235) +- [Live-Hack-CVE/CVE-2022-3195](https://github.com/Live-Hack-CVE/CVE-2022-3195) ### CVE-2022-3238 (2022-11-14) @@ -929,37 +1145,53 @@ The "Follow Me Plugin" plugin for WordPress is vulnerable to Cross-Sit - [Live-Hack-CVE/CVE-2022-3240](https://github.com/Live-Hack-CVE/CVE-2022-3240) -### CVE-2022-3256 (2022-09-22) +### CVE-2022-3258 (2022-11-03) -Use After Free in GitHub repository vim/vim prior to 9.0.0530. +Incorrect Permission Assignment for Critical Resource vulnerability in HYPR Workforce Access on Windows allows Authentication Abuse. -- [Live-Hack-CVE/CVE-2022-3256](https://github.com/Live-Hack-CVE/CVE-2022-3256) +- [Live-Hack-CVE/CVE-2022-3258](https://github.com/Live-Hack-CVE/CVE-2022-3258) -### CVE-2022-3336 (2022-11-21) +### CVE-2022-3265 (2022-11-09) -The Event Monster WordPress plugin before 1.2.0 does not have CSRF check when deleting visitors, which could allow attackers to make logged in admin delete arbitrary visitors via a CSRF attack +A cross-site scripting issue has been discovered in GitLab CE/EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the labels colour feature which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. -- [Live-Hack-CVE/CVE-2022-3336](https://github.com/Live-Hack-CVE/CVE-2022-3336) +- [Live-Hack-CVE/CVE-2022-3265](https://github.com/Live-Hack-CVE/CVE-2022-3265) -### CVE-2022-3352 (2022-09-29) +### CVE-2022-3280 (2022-11-09) -Use After Free in GitHub repository vim/vim prior to 9.0.0614. +An open redirect in GitLab CE/EE affecting all versions from 10.1 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick users into visiting a trustworthy URL and being redirected to arbitrary content. -- [Live-Hack-CVE/CVE-2022-3352](https://github.com/Live-Hack-CVE/CVE-2022-3352) +- [Live-Hack-CVE/CVE-2022-3280](https://github.com/Live-Hack-CVE/CVE-2022-3280) -### CVE-2022-3361 (2022-11-29) +### CVE-2022-3281 (2022-10-17) -The Ultimate Member plugin for WordPress is vulnerable to directory traversal in versions up to, and including 2.5.0 due to insufficient input validation on the 'template' attribute used in shortcodes. This makes it possible for attackers with administrative privileges to supply arbitrary paths using traversal (../../) to access and include files outside of the intended directory. If an attacker can successfully upload a php file then remote code execution via inclusion may also be possible. Note: for users with less than administrative capabilities, /wp-admin access needs to be enabled for that user in order for this to be exploitable by those users. +WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter. -- [Live-Hack-CVE/CVE-2022-3361](https://github.com/Live-Hack-CVE/CVE-2022-3361) +- [Live-Hack-CVE/CVE-2022-3281](https://github.com/Live-Hack-CVE/CVE-2022-3281) + +### CVE-2022-3285 (2022-11-09) + + +Bypass of healthcheck endpoint allow list affecting all versions from 12.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an unauthorized attacker to prevent access to GitLab + + +- [Live-Hack-CVE/CVE-2022-3285](https://github.com/Live-Hack-CVE/CVE-2022-3285) + +### CVE-2022-3340 (2022-11-04) + + +XML External Entity (XXE) vulnerability in Trellix IPS Manager prior to 10.1 M8 allows a remote authenticated administrator to perform XXE attack in the administrator interface part of the interface, which allows a saved XML configuration file to be imported. + + +- [Live-Hack-CVE/CVE-2022-3340](https://github.com/Live-Hack-CVE/CVE-2022-3340) ### CVE-2022-3362 (2022-11-14) @@ -969,29 +1201,85 @@ Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2 - [Live-Hack-CVE/CVE-2022-3362](https://github.com/Live-Hack-CVE/CVE-2022-3362) -### CVE-2022-3377 (2022-11-15) +### CVE-2022-3413 (2022-11-09) -Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read. +Incorrect authorization during display of Audit Events in GitLab EE affecting all versions from 14.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allowed Developers to view the project's Audit Events and Developers or Maintainers to view the group's Audit Events. These should have been restricted to Project Maintainers, Group Owners, and above. -- [Live-Hack-CVE/CVE-2022-3377](https://github.com/Live-Hack-CVE/CVE-2022-3377) +- [Live-Hack-CVE/CVE-2022-3413](https://github.com/Live-Hack-CVE/CVE-2022-3413) -### CVE-2022-3383 (2022-11-29) +### CVE-2022-3415 (2022-11-14) -The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server. +The Chat Bubble WordPress plugin before 2.3 does not sanitise and escape some contact parameters, which could allow unauthenticated attackers to set Stored Cross-Site Scripting payloads in them, which will trigger when an admin view the related contact message -- [Live-Hack-CVE/CVE-2022-3383](https://github.com/Live-Hack-CVE/CVE-2022-3383) +- [Live-Hack-CVE/CVE-2022-3415](https://github.com/Live-Hack-CVE/CVE-2022-3415) -### CVE-2022-3384 (2022-11-29) +### CVE-2022-3418 (2022-11-07) -The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server. +The Import any XML or CSV File to WordPress plugin before 3.6.9 is not properly filtering which file extensions are allowed to be imported on the server, which could allow administrators in multi-site WordPress installations to upload arbitrary files -- [Live-Hack-CVE/CVE-2022-3384](https://github.com/Live-Hack-CVE/CVE-2022-3384) +- [Live-Hack-CVE/CVE-2022-3418](https://github.com/Live-Hack-CVE/CVE-2022-3418) + +### CVE-2022-3445 (2022-11-09) + + +Use after free in Skia in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) + + +- [Live-Hack-CVE/CVE-2022-3445](https://github.com/Live-Hack-CVE/CVE-2022-3445) + +### CVE-2022-3446 (2022-11-09) + + +Heap buffer overflow in WebSQL in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) + + +- [Live-Hack-CVE/CVE-2022-3446](https://github.com/Live-Hack-CVE/CVE-2022-3446) + +### CVE-2022-3447 (2022-11-09) + + +Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 106.0.5249.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High) + + +- [Live-Hack-CVE/CVE-2022-3447](https://github.com/Live-Hack-CVE/CVE-2022-3447) + +### CVE-2022-3448 (2022-11-09) + + +Use after free in Permissions API in Google Chrome prior to 106.0.5249.119 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) + + +- [Live-Hack-CVE/CVE-2022-3448](https://github.com/Live-Hack-CVE/CVE-2022-3448) + +### CVE-2022-3449 (2022-11-09) + + +Use after free in Safe Browsing in Google Chrome prior to 106.0.5249.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High) + + +- [Live-Hack-CVE/CVE-2022-3449](https://github.com/Live-Hack-CVE/CVE-2022-3449) + +### CVE-2022-3450 (2022-11-09) + + +Use after free in Peer Connection in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) + + +- [Live-Hack-CVE/CVE-2022-3450](https://github.com/Live-Hack-CVE/CVE-2022-3450) + +### CVE-2022-3451 (2022-11-07) + + +The Product Stock Manager WordPress plugin before 1.0.5 does not have authorisation and proper CSRF checks in multiple AJAX actions, allowing users with a role as low as subscriber to call them. One action in particular could allow to update arbitrary options + + +- [Live-Hack-CVE/CVE-2022-3451](https://github.com/Live-Hack-CVE/CVE-2022-3451) ### CVE-2022-3461 (2022-11-15) @@ -1001,6 +1289,38 @@ In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated - [Live-Hack-CVE/CVE-2022-3461](https://github.com/Live-Hack-CVE/CVE-2022-3461) +### CVE-2022-3462 (2022-11-07) + + +The Highlight Focus WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) + + +- [Live-Hack-CVE/CVE-2022-3462](https://github.com/Live-Hack-CVE/CVE-2022-3462) + +### CVE-2022-3463 (2022-11-07) + + +The Contact Form Plugin WordPress plugin before 4.3.13 does not validate and escape fields when exporting form entries as CSV, leading to a CSV injection + + +- [Live-Hack-CVE/CVE-2022-3463](https://github.com/Live-Hack-CVE/CVE-2022-3463) + +### CVE-2022-3469 (2022-11-14) + + +The WP Attachments WordPress plugin before 5.0.5 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). + + +- [Live-Hack-CVE/CVE-2022-3469](https://github.com/Live-Hack-CVE/CVE-2022-3469) + +### CVE-2022-3477 (2022-11-14) + + +The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address + + +- [Live-Hack-CVE/CVE-2022-3477](https://github.com/Live-Hack-CVE/CVE-2022-3477) + ### CVE-2022-3480 (2022-11-15) @@ -1009,173 +1329,229 @@ A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CO - [Live-Hack-CVE/CVE-2022-3480](https://github.com/Live-Hack-CVE/CVE-2022-3480) -### CVE-2022-3490 (2022-11-28) +### CVE-2022-3483 (2022-11-09) -The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present +An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.1 before 15.3.5, all versions starting from 15.4 before 15.4.4, all versions starting from 15.5 before 15.5.2. A malicious maintainer could exfiltrate a Datadog integration's access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. -- [Live-Hack-CVE/CVE-2022-3490](https://github.com/Live-Hack-CVE/CVE-2022-3490) +- [Live-Hack-CVE/CVE-2022-3483](https://github.com/Live-Hack-CVE/CVE-2022-3483) -### CVE-2022-3511 (2022-11-28) +### CVE-2022-3484 (2022-11-14) -The Awesome Support WordPress plugin before 6.1.2 does not ensure that the exported tickets archive to be downloaded belongs to the user making the request, allowing a low privileged user, such as subscriber to download arbitrary exported tickets via an IDOR vector +The WPB Show Core WordPress plugin through TODO does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting -- [Live-Hack-CVE/CVE-2022-3511](https://github.com/Live-Hack-CVE/CVE-2022-3511) +- [Live-Hack-CVE/CVE-2022-3484](https://github.com/Live-Hack-CVE/CVE-2022-3484) -### CVE-2022-3516 (2022-11-19) +### CVE-2022-3486 (2022-11-09) -Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. +An open redirect vulnerability in GitLab EE/CE affecting all versions from 9.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allows an attacker to redirect users to an arbitrary location if they trust the URL. -- [Live-Hack-CVE/CVE-2022-3516](https://github.com/Live-Hack-CVE/CVE-2022-3516) +- [Live-Hack-CVE/CVE-2022-3486](https://github.com/Live-Hack-CVE/CVE-2022-3486) -### CVE-2022-3525 (2022-11-19) +### CVE-2022-3489 (2022-11-07) -Deserialization of Untrusted Data in GitHub repository librenms/librenms prior to 22.10.0. +The WP Hide WordPress plugin through 0.0.2 does not have authorisation and CSRF checks in place when updating the custom_wpadmin_slug settings, allowing unauthenticated attackers to update it with a crafted request -- [Live-Hack-CVE/CVE-2022-3525](https://github.com/Live-Hack-CVE/CVE-2022-3525) +- [Live-Hack-CVE/CVE-2022-3489](https://github.com/Live-Hack-CVE/CVE-2022-3489) -### CVE-2022-3550 (2022-10-17) +### CVE-2022-3494 (2022-11-07) -A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051. +The Complianz WordPress plugin before 6.3.4, and Complianz Premium WordPress plugin before 6.3.6 allow a translators to inject arbitrary SQL through an unsanitized translation. SQL can be injected through an infected translation file, or by a user with a translator role through translation plugins such as Loco Translate or WPML. -- [Live-Hack-CVE/CVE-2022-3550](https://github.com/Live-Hack-CVE/CVE-2022-3550) +- [Live-Hack-CVE/CVE-2022-3494](https://github.com/Live-Hack-CVE/CVE-2022-3494) -### CVE-2022-3553 (2022-10-17) +### CVE-2022-3518 (2022-10-15) -A vulnerability, which was classified as problematic, was found in X.org Server. This affects an unknown part of the file hw/xquartz/X11Controller.m of the component xquartz. The manipulation leads to denial of service. It is recommended to apply a patch to fix this issue. The identifier VDB-211053 was assigned to this vulnerability. +A vulnerability classified as problematic has been found in SourceCodester Sanitization Management System 1.0. Affected is an unknown function of the component User Creation Handler. The manipulation of the argument First Name/Middle Name/Last Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-211014 is the identifier assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3553](https://github.com/Live-Hack-CVE/CVE-2022-3553) +- [Live-Hack-CVE/CVE-2022-3518](https://github.com/Live-Hack-CVE/CVE-2022-3518) -### CVE-2022-3561 (2022-11-19) +### CVE-2022-3536 (2022-11-07) -Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0. +The Role Based Pricing for WooCommerce WordPress plugin before 1.6.3 does not have authorisation and proper CSRF checks, as well as does not validate path given via user input, allowing any authenticated users like subscriber to perform PHAR deserialization attacks when they can upload a file, and a suitable gadget chain is present on the blog -- [Live-Hack-CVE/CVE-2022-3561](https://github.com/Live-Hack-CVE/CVE-2022-3561) +- [Live-Hack-CVE/CVE-2022-3536](https://github.com/Live-Hack-CVE/CVE-2022-3536) -### CVE-2022-3562 (2022-11-19) +### CVE-2022-3537 (2022-11-07) -Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. +The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP -- [Live-Hack-CVE/CVE-2022-3562](https://github.com/Live-Hack-CVE/CVE-2022-3562) +- [Live-Hack-CVE/CVE-2022-3537](https://github.com/Live-Hack-CVE/CVE-2022-3537) -### CVE-2022-3570 (2022-10-21) +### CVE-2022-3538 (2022-11-14) -Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact +The Webmaster Tools Verification WordPress plugin through 1.2 does not have authorisation and CSRF checks when disabling plugins, allowing unauthenticated users to disable arbitrary plugins -- [Live-Hack-CVE/CVE-2022-3570](https://github.com/Live-Hack-CVE/CVE-2022-3570) +- [Live-Hack-CVE/CVE-2022-3538](https://github.com/Live-Hack-CVE/CVE-2022-3538) -### CVE-2022-3589 (2022-11-21) +### CVE-2022-3539 (2022-11-14) -An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability. +The Testimonials WordPress plugin before 2.7, super-testimonial-pro WordPress plugin before 1.0.8 do not sanitize and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. -- [Live-Hack-CVE/CVE-2022-3589](https://github.com/Live-Hack-CVE/CVE-2022-3589) +- [Live-Hack-CVE/CVE-2022-3539](https://github.com/Live-Hack-CVE/CVE-2022-3539) -### CVE-2022-3600 (2022-11-21) +### CVE-2022-3558 (2022-11-07) -The Easy Digital Downloads WordPress plugin before 3.1.0.2 does not validate data when its output in a CSV file, which could lead to CSV injection. +The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files. -- [Live-Hack-CVE/CVE-2022-3600](https://github.com/Live-Hack-CVE/CVE-2022-3600) +- [Live-Hack-CVE/CVE-2022-3558](https://github.com/Live-Hack-CVE/CVE-2022-3558) -### CVE-2022-3601 (2022-11-28) +### CVE-2022-3559 (2022-10-17) -The Image Hover Effects Css3 WordPress plugin through 4.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +A vulnerability was found in Exim and classified as problematic. This issue affects some unknown processing of the component Regex Handler. The manipulation leads to use after free. The name of the patch is 4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2. It is recommended to apply a patch to fix this issue. The identifier VDB-211073 was assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3601](https://github.com/Live-Hack-CVE/CVE-2022-3601) +- [Live-Hack-CVE/CVE-2022-3559](https://github.com/Live-Hack-CVE/CVE-2022-3559) -### CVE-2022-3603 (2022-11-28) +### CVE-2022-3574 (2022-11-14) -The Export customers list csv for WooCommerce, WordPress users csv, export Guest customer list WordPress plugin before 2.0.69 does not validate data when outputting it back in a CSV file, which could lead to CSV injection. +The WPForms Pro WordPress plugin before 1.7.7 does not validate its form data when generating the exported CSV, which could lead to CSV injection. -- [Live-Hack-CVE/CVE-2022-3603](https://github.com/Live-Hack-CVE/CVE-2022-3603) +- [Live-Hack-CVE/CVE-2022-3574](https://github.com/Live-Hack-CVE/CVE-2022-3574) -### CVE-2022-3610 (2022-11-28) +### CVE-2022-3575 (2022-11-02) -The Jeeng Push Notifications WordPress plugin before 2.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) +Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device. -- [Live-Hack-CVE/CVE-2022-3610](https://github.com/Live-Hack-CVE/CVE-2022-3610) +- [Live-Hack-CVE/CVE-2022-3575](https://github.com/Live-Hack-CVE/CVE-2022-3575) -### CVE-2022-3618 (2022-11-21) +### CVE-2022-3578 (2022-11-14) -The Spacer WordPress plugin before 3.0.7 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). +The ProfileGrid WordPress plugin before 5.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting -- [Live-Hack-CVE/CVE-2022-3618](https://github.com/Live-Hack-CVE/CVE-2022-3618) +- [Live-Hack-CVE/CVE-2022-3578](https://github.com/Live-Hack-CVE/CVE-2022-3578) -### CVE-2022-3634 (2022-11-21) +### CVE-2022-3586 (2022-10-19) -The Contact Form 7 Database Addon WordPress plugin before 1.2.6.5 does not validate data when output it back in a CSV file, which could lead to CSV injection +A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service. -- [Live-Hack-CVE/CVE-2022-3634](https://github.com/Live-Hack-CVE/CVE-2022-3634) +- [Live-Hack-CVE/CVE-2022-3586](https://github.com/Live-Hack-CVE/CVE-2022-3586) -### CVE-2022-3647 (2022-10-21) +### CVE-2022-3602 (2022-11-01) -** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to apply a patch to fix this issue. VDB-211962 is the identifier assigned to this vulnerability. NOTE: The vendor claims that this is not a DoS because it applies to the crash logging mechanism which is triggered after a crash has occurred. +A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). -- [Live-Hack-CVE/CVE-2022-3647](https://github.com/Live-Hack-CVE/CVE-2022-3647) +- [Live-Hack-CVE/CVE-2022-3602](https://github.com/Live-Hack-CVE/CVE-2022-3602) -### CVE-2022-3688 (2022-11-21) +### CVE-2022-3620 (2022-10-20) -The WPQA Builder WordPress plugin before 5.9 does not have CSRF check when following and unfollowing users, which could allow attackers to make logged in users perform such actions via CSRF attacks +A vulnerability was found in Exim and classified as problematic. This issue affects the function dmarc_dns_lookup of the file dmarc.c of the component DMARC Handler. The manipulation leads to use after free. The attack may be initiated remotely. The name of the patch is 12fb3842f81bcbd4a4519d5728f2d7e0e3ca1445. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211919. -- [Live-Hack-CVE/CVE-2022-3688](https://github.com/Live-Hack-CVE/CVE-2022-3688) +- [Live-Hack-CVE/CVE-2022-3620](https://github.com/Live-Hack-CVE/CVE-2022-3620) -### CVE-2022-3689 (2022-11-28) +### CVE-2022-3621 (2022-10-20) -The HTML Forms WordPress plugin before 1.3.25 does not properly properly escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users +A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920. -- [Live-Hack-CVE/CVE-2022-3689](https://github.com/Live-Hack-CVE/CVE-2022-3689) +- [Live-Hack-CVE/CVE-2022-3621](https://github.com/Live-Hack-CVE/CVE-2022-3621) -### CVE-2022-3720 (2022-11-21) +### CVE-2022-3625 (2022-10-21) -The Event Monster WordPress plugin before 1.2.0 does not validate and escape some parameters before using them in SQL statements, which could lead to SQL Injection exploitable by high privilege users +A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3720](https://github.com/Live-Hack-CVE/CVE-2022-3720) +- [Live-Hack-CVE/CVE-2022-3625](https://github.com/Live-Hack-CVE/CVE-2022-3625) -### CVE-2022-3734 (2022-10-28) +### CVE-2022-3629 (2022-10-21) -** DISPUTED ** A vulnerability was found in a port or fork of Redis. It has been declared as critical. This vulnerability affects unknown code in the library C:/Program Files/Redis/dbghelp.dll. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of this vulnerability is VDB-212416. NOTE: The official Redis release is not affected. This issue might affect an unofficial fork or port on Windows only. +A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3734](https://github.com/Live-Hack-CVE/CVE-2022-3734) +- [Live-Hack-CVE/CVE-2022-3629](https://github.com/Live-Hack-CVE/CVE-2022-3629) + +### CVE-2022-3631 (2022-11-14) + + +The OAuth Client by DigitialPixies WordPress plugin through 1.1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). + + +- [Live-Hack-CVE/CVE-2022-3631](https://github.com/Live-Hack-CVE/CVE-2022-3631) + +### CVE-2022-3632 (2022-11-14) + + +The OAuth Client by DigitialPixies WordPress plugin through 1.1.0 does not have CSRF checks in some places, which could allow attackers to make logged-in users perform unwanted actions. + + +- [Live-Hack-CVE/CVE-2022-3632](https://github.com/Live-Hack-CVE/CVE-2022-3632) + +### CVE-2022-3675 (2022-11-03) + + +Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora CoreOS releases have a misconfiguration which allows booting non-default OSTree deployments without entering a password. This allows someone with access to the GRUB menu to boot into an older version of Fedora CoreOS, reverting any security fixes that have recently been applied to the machine. A password is still required to modify kernel command-line arguments and to access the GRUB command line. + + +- [Live-Hack-CVE/CVE-2022-3675](https://github.com/Live-Hack-CVE/CVE-2022-3675) + +### CVE-2022-3703 (2022-11-10) + + +All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. + + +- [Live-Hack-CVE/CVE-2022-3703](https://github.com/Live-Hack-CVE/CVE-2022-3703) + +### CVE-2022-3706 (2022-11-09) + + +Improper authorization in GitLab CE/EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take ownership of the retried jobs in the upstream pipeline even if the user doesn't have access to that project. + + +- [Live-Hack-CVE/CVE-2022-3706](https://github.com/Live-Hack-CVE/CVE-2022-3706) + +### CVE-2022-3721 (2022-11-04) + + +Code Injection in GitHub repository froxlor/froxlor prior to 0.10.39. + + +- [Live-Hack-CVE/CVE-2022-3721](https://github.com/Live-Hack-CVE/CVE-2022-3721) + +### CVE-2022-3726 (2022-11-09) + + +Lack of sand-boxing of OpenAPI documents in GitLab CE/EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click on the Swagger OpenAPI viewer and issue HTTP requests that affect the victim's account. + + +- [Live-Hack-CVE/CVE-2022-3726](https://github.com/Live-Hack-CVE/CVE-2022-3726) ### CVE-2022-3737 (2022-11-15) @@ -1185,157 +1561,125 @@ In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can b - [Live-Hack-CVE/CVE-2022-3737](https://github.com/Live-Hack-CVE/CVE-2022-3737) -### CVE-2022-3747 (2022-11-29) +### CVE-2022-3793 (2022-11-09) -The Becustom plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5.2. This is due to missing nonce validation when saving the plugin's settings. This makes it possible for unauthenticated attackers to update the plugin's settings like betheme_url_slug, replaced_theme_author, and betheme_label to name a few, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. +An improper authorization issue in GitLab CE/EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to read variables set directly in a GitLab CI/CD configuration file they don't have access to. -- [Live-Hack-CVE/CVE-2022-3747](https://github.com/Live-Hack-CVE/CVE-2022-3747) +- [Live-Hack-CVE/CVE-2022-3793](https://github.com/Live-Hack-CVE/CVE-2022-3793) -### CVE-2022-3750 (2022-11-21) +### CVE-2022-3818 (2022-11-09) -The has a CSRF vulnerability that allows the deletion of a post without using a nonce or prompting for confirmation. +An uncontrolled resource consumption issue when parsing URLs in GitLab CE/EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to cause performance issues and potentially a denial of service on the GitLab instance. -- [Live-Hack-CVE/CVE-2022-3750](https://github.com/Live-Hack-CVE/CVE-2022-3750) +- [Live-Hack-CVE/CVE-2022-3818](https://github.com/Live-Hack-CVE/CVE-2022-3818) -### CVE-2022-3751 (2022-11-29) +### CVE-2022-3819 (2022-11-09) -SQL Injection in GitHub repository owncast/owncast prior to 0.0.13. +An improper authorization issue in GitLab CE/EE affecting all versions from 15.0 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a malicious users to set emojis on internal notes they don't have access to. -- [Live-Hack-CVE/CVE-2022-3751](https://github.com/Live-Hack-CVE/CVE-2022-3751) +- [Live-Hack-CVE/CVE-2022-3819](https://github.com/Live-Hack-CVE/CVE-2022-3819) -### CVE-2022-3753 (2022-11-21) +### CVE-2022-3825 (2022-11-02) -The Evaluate WordPress plugin through 1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). +A vulnerability was found in Huaxia ERP 2.3 and classified as critical. Affected by this issue is some unknown functionality of the component User Management. The manipulation of the argument login leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212792. -- [Live-Hack-CVE/CVE-2022-3753](https://github.com/Live-Hack-CVE/CVE-2022-3753) +- [Live-Hack-CVE/CVE-2022-3825](https://github.com/Live-Hack-CVE/CVE-2022-3825) -### CVE-2022-3762 (2022-11-21) +### CVE-2022-3826 (2022-11-02) -The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite) +A vulnerability was found in Huaxia ERP. It has been classified as problematic. This affects an unknown part of the file /depotHead/list of the component Retail Management. The manipulation of the argument search leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212793 was assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3762](https://github.com/Live-Hack-CVE/CVE-2022-3762) +- [Live-Hack-CVE/CVE-2022-3826](https://github.com/Live-Hack-CVE/CVE-2022-3826) -### CVE-2022-3763 (2022-11-21) +### CVE-2022-3827 (2022-11-02) -The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack +A vulnerability was found in centreon. It has been declared as critical. This vulnerability affects unknown code of the file formContactGroup.php of the component Contact Groups Form. The manipulation of the argument cg_id leads to sql injection. The attack can be initiated remotely. The name of the patch is 293b10628f7d9f83c6c82c78cf637cbe9b907369. It is recommended to apply a patch to fix this issue. VDB-212794 is the identifier assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3763](https://github.com/Live-Hack-CVE/CVE-2022-3763) +- [Live-Hack-CVE/CVE-2022-3827](https://github.com/Live-Hack-CVE/CVE-2022-3827) -### CVE-2022-3822 (2022-11-28) +### CVE-2022-3852 (2022-11-03) -The Donations via PayPal WordPress plugin before 1.9.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +The VR Calendar plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.3.3. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to delete, and modify calendars as well as the plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. -- [Live-Hack-CVE/CVE-2022-3822](https://github.com/Live-Hack-CVE/CVE-2022-3822) +- [Live-Hack-CVE/CVE-2022-3852](https://github.com/Live-Hack-CVE/CVE-2022-3852) -### CVE-2022-3823 (2022-11-28) +### CVE-2022-3866 (2022-11-10) -The Beautiful Cookie Consent Banner WordPress plugin before 2.9.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under nomad/ that belong to other jobs in the same namespace. Fixed in 1.4.2. -- [Live-Hack-CVE/CVE-2022-3823](https://github.com/Live-Hack-CVE/CVE-2022-3823) +- [Live-Hack-CVE/CVE-2022-3866](https://github.com/Live-Hack-CVE/CVE-2022-3866) -### CVE-2022-3824 (2022-11-28) +### CVE-2022-3867 (2022-11-10) -The WP Admin UI Customize WordPress plugin before 1.5.13 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2. -- [Live-Hack-CVE/CVE-2022-3824](https://github.com/Live-Hack-CVE/CVE-2022-3824) +- [Live-Hack-CVE/CVE-2022-3867](https://github.com/Live-Hack-CVE/CVE-2022-3867) -### CVE-2022-3828 (2022-11-28) +### CVE-2022-3868 (2022-11-05) -The Video Thumbnails WordPress plugin through 2.12.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +A vulnerability classified as critical has been found in SourceCodester Sanitization Management System. Affected is an unknown function of the file /php-sms/classes/Master.php?f=save_quote. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213012. -- [Live-Hack-CVE/CVE-2022-3828](https://github.com/Live-Hack-CVE/CVE-2022-3828) +- [Live-Hack-CVE/CVE-2022-3868](https://github.com/Live-Hack-CVE/CVE-2022-3868) -### CVE-2022-3831 (2022-11-28) +### CVE-2022-3869 (2022-11-05) -The reCAPTCHA WordPress plugin through 1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +Code Injection in GitHub repository froxlor/froxlor prior to 0.10.38.2. -- [Live-Hack-CVE/CVE-2022-3831](https://github.com/Live-Hack-CVE/CVE-2022-3831) +- [Live-Hack-CVE/CVE-2022-3869](https://github.com/Live-Hack-CVE/CVE-2022-3869) -### CVE-2022-3833 (2022-11-28) +### CVE-2022-3873 (2022-11-07) -The Fancier Author Box by ThematoSoup WordPress plugin through 1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/drawio prior to 20.5.2. -- [Live-Hack-CVE/CVE-2022-3833](https://github.com/Live-Hack-CVE/CVE-2022-3833) +- [Live-Hack-CVE/CVE-2022-3873](https://github.com/Live-Hack-CVE/CVE-2022-3873) -### CVE-2022-3834 (2022-11-28) +### CVE-2022-3878 (2022-11-07) -The Google Forms WordPress plugin through 0.95 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +A vulnerability classified as critical has been found in Maxon ERP. This affects an unknown part of the file /index.php/purchase_order/browse_data. The manipulation of the argument tb_search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213039. -- [Live-Hack-CVE/CVE-2022-3834](https://github.com/Live-Hack-CVE/CVE-2022-3834) +- [Live-Hack-CVE/CVE-2022-3878](https://github.com/Live-Hack-CVE/CVE-2022-3878) -### CVE-2022-3839 (2022-11-28) +### CVE-2022-3893 (2022-11-15) -The Analytics for WP WordPress plugin through 1.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). +Cross-site Scripting (XSS) vulnerability in BlueSpiceCustomMenu extension of BlueSpice allows user with admin permissions to inject arbitrary HTML into the custom menu navigation of the application. -- [Live-Hack-CVE/CVE-2022-3839](https://github.com/Live-Hack-CVE/CVE-2022-3839) +- [Live-Hack-CVE/CVE-2022-3893](https://github.com/Live-Hack-CVE/CVE-2022-3893) -### CVE-2022-3850 (2022-11-28) +### CVE-2022-3895 (2022-11-15) -The Find and Replace All WordPress plugin before 1.3 does not have CSRF check when replacing string, which could allow attackers to make a logged admin replace arbitrary string in database tables via a CSRF attack +Some UI elements of the Common User Interface Component are not properly sanitizing output and therefore prone to output arbitrary HTML (XSS). -- [Live-Hack-CVE/CVE-2022-3850](https://github.com/Live-Hack-CVE/CVE-2022-3850) - -### CVE-2022-3861 (2022-11-21) - - -The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc.. - - -- [Live-Hack-CVE/CVE-2022-3861](https://github.com/Live-Hack-CVE/CVE-2022-3861) - -### CVE-2022-3896 (2022-11-29) - - -The WP Affiliate Platform plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via $_SERVER["REQUEST_URI"] in versions up to, and including, 6.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is unlikely to work in modern browsers. - - -- [Live-Hack-CVE/CVE-2022-3896](https://github.com/Live-Hack-CVE/CVE-2022-3896) - -### CVE-2022-3897 (2022-11-29) - - -The WP Affiliate Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in versions up to, and including, 6.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - - -- [Live-Hack-CVE/CVE-2022-3897](https://github.com/Live-Hack-CVE/CVE-2022-3897) - -### CVE-2022-3898 (2022-11-29) - - -The WP Affiliate Platform plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.3.9. This is due to missing or incorrect nonce validation on various functions including the affiliates_menu method. This makes it possible for unauthenticated attackers to delete affiliate records, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. - - -- [Live-Hack-CVE/CVE-2022-3898](https://github.com/Live-Hack-CVE/CVE-2022-3898) +- [Live-Hack-CVE/CVE-2022-3895](https://github.com/Live-Hack-CVE/CVE-2022-3895) ### CVE-2022-3903 (2022-11-14) @@ -1345,29 +1689,133 @@ An incorrect read request flaw was found in the Infrared Transceiver USB driver - [Live-Hack-CVE/CVE-2022-3903](https://github.com/Live-Hack-CVE/CVE-2022-3903) -### CVE-2022-3910 (2022-11-22) +### CVE-2022-3939 (2022-11-11) -Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 +A vulnerability, which was classified as critical, has been found in lanyulei ferry. Affected by this issue is some unknown functionality of the file apis/public/file.go of the component API. The manipulation of the argument file leads to path traversal. The attack may be launched remotely. VDB-213446 is the identifier assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3910](https://github.com/Live-Hack-CVE/CVE-2022-3910) +- [Live-Hack-CVE/CVE-2022-3939](https://github.com/Live-Hack-CVE/CVE-2022-3939) -### CVE-2022-3920 (2022-11-15) +### CVE-2022-3940 (2022-11-11) -HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0. +A vulnerability, which was classified as problematic, was found in lanyulei ferry. This affects an unknown part of the file apis/process/task.go. The manipulation of the argument file_name leads to path traversal. The associated identifier of this vulnerability is VDB-213447. -- [Live-Hack-CVE/CVE-2022-3920](https://github.com/Live-Hack-CVE/CVE-2022-3920) +- [Live-Hack-CVE/CVE-2022-3940](https://github.com/Live-Hack-CVE/CVE-2022-3940) -### CVE-2022-3941 (2022-11-11) +### CVE-2022-3942 (2022-11-11) -A vulnerability has been found in Activity Log Plugin and classified as critical. This vulnerability affects unknown code of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213448. +A vulnerability was found in SourceCodester Sanitization Management System and classified as problematic. This issue affects some unknown processing of the file php-sms/?p=request_quote. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-213449 was assigned to this vulnerability. -- [Live-Hack-CVE/CVE-2022-3941](https://github.com/Live-Hack-CVE/CVE-2022-3941) +- [Live-Hack-CVE/CVE-2022-3942](https://github.com/Live-Hack-CVE/CVE-2022-3942) + +### CVE-2022-3943 (2022-11-11) + + +A vulnerability was found in ForU CMS. It has been classified as problematic. Affected is an unknown function of the file cms_chip.php. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-213450 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-3943](https://github.com/Live-Hack-CVE/CVE-2022-3943) + +### CVE-2022-3944 (2022-11-11) + + +A vulnerability was found in jerryhanjj ERP. It has been declared as critical. Affected by this vulnerability is the function uploadImages of the file application/controllers/basedata/inventory.php of the component Commodity Management. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213451. + + +- [Live-Hack-CVE/CVE-2022-3944](https://github.com/Live-Hack-CVE/CVE-2022-3944) + +### CVE-2022-3945 (2022-11-11) + + +Improper Restriction of Excessive Authentication Attempts in GitHub repository kareadita/kavita prior to 0.6.0.3. + + +- [Live-Hack-CVE/CVE-2022-3945](https://github.com/Live-Hack-CVE/CVE-2022-3945) + +### CVE-2022-3947 (2022-11-11) + + +A vulnerability classified as critical has been found in eolinker goku_lite. This affects an unknown part of the file /balance/service/list. The manipulation of the argument route/keyword leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213453 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-3947](https://github.com/Live-Hack-CVE/CVE-2022-3947) + +### CVE-2022-3948 (2022-11-11) + + +A vulnerability classified as critical was found in eolinker goku_lite. This vulnerability affects unknown code of the file /plugin/getList. The manipulation of the argument route/keyword leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-213454 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-3948](https://github.com/Live-Hack-CVE/CVE-2022-3948) + +### CVE-2022-3949 (2022-11-11) + + +A vulnerability, which was classified as problematic, has been found in Sourcecodester Simple Cashiering System. This issue affects some unknown processing of the component User Account Handler. The manipulation of the argument fullname leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-213455. + + +- [Live-Hack-CVE/CVE-2022-3949](https://github.com/Live-Hack-CVE/CVE-2022-3949) + +### CVE-2022-3950 (2022-11-11) + + +A vulnerability, which was classified as problematic, was found in sanluan PublicCMS. Affected is the function initLink of the file dwz.min.js of the component Tab Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a972dc9b1c94aea2d84478bf26283904c21e4ca2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213456. + + +- [Live-Hack-CVE/CVE-2022-3950](https://github.com/Live-Hack-CVE/CVE-2022-3950) + +### CVE-2022-3952 (2022-11-11) + + +A vulnerability has been found in ManyDesigns Portofino 5.3.2 and classified as problematic. Affected by this vulnerability is the function createTempDir of the file WarFileLauncher.java. The manipulation leads to creation of temporary file in directory with insecure permissions. Upgrading to version 5.3.3 is able to address this issue. The name of the patch is 94653cb357806c9cf24d8d294e6afea33f8f0775. It is recommended to upgrade the affected component. The identifier VDB-213457 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-3952](https://github.com/Live-Hack-CVE/CVE-2022-3952) + +### CVE-2022-3955 (2022-11-11) + + +A vulnerability was found in tholum crm42. It has been rated as critical. This issue affects some unknown processing of the file crm42\class\class.user.php of the component Login. The manipulation of the argument user_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213461 was assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-3955](https://github.com/Live-Hack-CVE/CVE-2022-3955) + +### CVE-2022-3956 (2022-11-11) + + +A vulnerability classified as critical has been found in tsruban HHIMS 2.1. Affected is an unknown function of the component Patient Portrait Handler. The manipulation of the argument PID leads to sql injection. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. VDB-213462 is the identifier assigned to this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-3956](https://github.com/Live-Hack-CVE/CVE-2022-3956) + +### CVE-2022-3957 (2022-11-11) + + +A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463. + + +- [Live-Hack-CVE/CVE-2022-3957](https://github.com/Live-Hack-CVE/CVE-2022-3957) + +### CVE-2022-3958 (2022-11-15) + + +Cross-site Scripting (XSS) vulnerability in BlueSpiceUserSidebar extension of BlueSpice allows user with regular account and edit permissions to inject arbitrary HTML into the personal menu navigation of their own and other users. This allows for targeted attacks. + + +- [Live-Hack-CVE/CVE-2022-3958](https://github.com/Live-Hack-CVE/CVE-2022-3958) + +### CVE-2022-3959 (2022-11-11) + + +A vulnerability, which was classified as problematic, has been found in drogon up to 1.8.1. Affected by this issue is some unknown functionality of the component Session Hash Handler. The manipulation leads to small space of random values. The attack may be launched remotely. Upgrading to version 1.8.2 is able to address this issue. The name of the patch is c0d48da99f66aaada17bcd28b07741cac8697647. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213464. + + +- [Live-Hack-CVE/CVE-2022-3959](https://github.com/Live-Hack-CVE/CVE-2022-3959) ### CVE-2022-3963 (2022-11-12) @@ -1457,38 +1905,6 @@ A vulnerability classified as critical was found in Axiomatic Bento4. Affected b - [Live-Hack-CVE/CVE-2022-3974](https://github.com/Live-Hack-CVE/CVE-2022-3974) -### CVE-2022-3975 (2022-11-13) - - -A vulnerability, which was classified as problematic, has been found in NukeViet CMS. Affected by this issue is the function filterAttr of the file vendor/vinades/nukeviet/Core/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. Upgrading to version 4.5 is able to address this issue. The name of the patch is 0b3197fad950bb3383e83039a8ee4c9509b3ce02. It is recommended to upgrade the affected component. VDB-213554 is the identifier assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3975](https://github.com/Live-Hack-CVE/CVE-2022-3975) - -### CVE-2022-3976 (2022-11-13) - - -A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556. - - -- [Live-Hack-CVE/CVE-2022-3976](https://github.com/Live-Hack-CVE/CVE-2022-3976) - -### CVE-2022-3978 (2022-11-13) - - -A vulnerability, which was classified as problematic, was found in NodeBB up to 2.5.7. This affects an unknown part of the file /register/abort. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 2.5.8 is able to address this issue. The name of the patch is 2f9d8c350e54543f608d3d4c8e1a49bbb6cdea38. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-213555. - - -- [Live-Hack-CVE/CVE-2022-3978](https://github.com/Live-Hack-CVE/CVE-2022-3978) - -### CVE-2022-3979 (2022-11-13) - - -A vulnerability was found in NagVis up to 1.9.33 and classified as problematic. This issue affects the function checkAuthCookie of the file share/server/core/classes/CoreLogonMultisite.php. The manipulation of the argument hash leads to incorrect type conversion. The attack may be initiated remotely. Upgrading to version 1.9.34 is able to address this issue. The name of the patch is 7574fd8a2903282c2e0d1feef5c4876763db21d5. It is recommended to upgrade the affected component. The identifier VDB-213557 was assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3979](https://github.com/Live-Hack-CVE/CVE-2022-3979) - ### CVE-2022-3980 (2022-11-16) @@ -1497,13 +1913,13 @@ An XML External Entity (XEE) vulnerability allows server-side request forgery (S - [Live-Hack-CVE/CVE-2022-3980](https://github.com/Live-Hack-CVE/CVE-2022-3980) -### CVE-2022-3991 (2022-11-29) +### CVE-2022-3988 (2022-11-14) -The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. +A vulnerability was found in Frappe. It has been rated as problematic. Affected by this issue is some unknown functionality of the file frappe/templates/includes/navbar/navbar_search.html of the component Search. The manipulation of the argument q leads to cross site scripting. The attack may be launched remotely. The name of the patch is bfab7191543961c6cb77fe267063877c31b616ce. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213560. -- [Live-Hack-CVE/CVE-2022-3991](https://github.com/Live-Hack-CVE/CVE-2022-3991) +- [Live-Hack-CVE/CVE-2022-3988](https://github.com/Live-Hack-CVE/CVE-2022-3988) ### CVE-2022-3992 (2022-11-14) @@ -1521,46 +1937,6 @@ Authentication Bypass by Primary Weakness in GitHub repository kareadita/kavita - [Live-Hack-CVE/CVE-2022-3993](https://github.com/Live-Hack-CVE/CVE-2022-3993) -### CVE-2022-3995 (2022-11-29) - - -The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets. - - -- [Live-Hack-CVE/CVE-2022-3995](https://github.com/Live-Hack-CVE/CVE-2022-3995) - -### CVE-2022-3997 (2022-11-15) - - -A vulnerability, which was classified as critical, has been found in MonikaBrzica scm. Affected by this issue is some unknown functionality of the file upis_u_bazu.php. The manipulation of the argument email/lozinka/ime/id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-213698 is the identifier assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-3997](https://github.com/Live-Hack-CVE/CVE-2022-3997) - -### CVE-2022-3998 (2022-11-15) - - -A vulnerability, which was classified as critical, was found in MonikaBrzica scm. This affects an unknown part of the file uredi_korisnika.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213699. - - -- [Live-Hack-CVE/CVE-2022-3998](https://github.com/Live-Hack-CVE/CVE-2022-3998) - -### CVE-2022-4006 (2022-11-15) - - -A vulnerability, which was classified as problematic, has been found in WBCE CMS. Affected by this issue is the function increase_attempts of the file wbce/framework/class.login.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The name of the patch is d394ba39a7bfeb31eda797b6195fd90ef74b2e75. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213716. - - -- [Live-Hack-CVE/CVE-2022-4006](https://github.com/Live-Hack-CVE/CVE-2022-4006) - -### CVE-2022-4011 (2022-11-16) - - -A vulnerability was found in Simple History Plugin. It has been rated as critical. This issue affects some unknown processing of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213785 was assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-4011](https://github.com/Live-Hack-CVE/CVE-2022-4011) - ### CVE-2022-4012 (2022-11-16) @@ -1577,22 +1953,6 @@ A vulnerability classified as problematic was found in Hospital Management Cente - [Live-Hack-CVE/CVE-2022-4013](https://github.com/Live-Hack-CVE/CVE-2022-4013) -### CVE-2022-4014 (2022-11-16) - - -A vulnerability, which was classified as problematic, has been found in FeehiCMS. Affected by this issue is some unknown functionality of the component Post My Comment Tab. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The identifier of this vulnerability is VDB-213788. - - -- [Live-Hack-CVE/CVE-2022-4014](https://github.com/Live-Hack-CVE/CVE-2022-4014) - -### CVE-2022-4015 (2022-11-16) - - -A vulnerability, which was classified as critical, was found in Sports Club Management System 119. This affects an unknown part of the file admin/make_payments.php. The manipulation of the argument m_id/plan leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213789 was assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-4015](https://github.com/Live-Hack-CVE/CVE-2022-4015) - ### CVE-2022-4018 (2022-11-16) @@ -1601,22 +1961,6 @@ Missing Authentication for Critical Function in GitHub repository ikus060/rdiffw - [Live-Hack-CVE/CVE-2022-4018](https://github.com/Live-Hack-CVE/CVE-2022-4018) -### CVE-2022-4019 (2022-11-23) - - -A denial-of-service vulnerability in the Mattermost Playbooks plugin allows an authenticated user to crash the server via multiple large requests to one of the Playbooks API endpoints. - - -- [Live-Hack-CVE/CVE-2022-4019](https://github.com/Live-Hack-CVE/CVE-2022-4019) - -### CVE-2022-4020 (2022-11-28) - - -Vulnerability in the HQSwSmiDxe DXE driver on some consumer Acer Notebook devices may allow an attacker with elevated privileges to modify UEFI Secure Boot settings by modifying an NVRAM variable. - - -- [Live-Hack-CVE/CVE-2022-4020](https://github.com/Live-Hack-CVE/CVE-2022-4020) - ### CVE-2022-4021 (2022-11-16) @@ -1633,254 +1977,6 @@ The SVG Support plugin for WordPress defaults to insecure settings in version 2. - [Live-Hack-CVE/CVE-2022-4022](https://github.com/Live-Hack-CVE/CVE-2022-4022) -### CVE-2022-4027 (2022-11-29) - - -The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during a forum response in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when responding to forum threads that will execute whenever a user accesses an injected page. - - -- [Live-Hack-CVE/CVE-2022-4027](https://github.com/Live-Hack-CVE/CVE-2022-4027) - -### CVE-2022-4028 (2022-11-29) - - -The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during the profile-save action when modifying a profile signature in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. This makes it possible for authenticated attackers, with minimal permissions, such as a subscriber to inject arbitrary web scripts in pages when modifying a profile signature that will execute whenever a user accesses an injected page. - - -- [Live-Hack-CVE/CVE-2022-4028](https://github.com/Live-Hack-CVE/CVE-2022-4028) - -### CVE-2022-4029 (2022-11-29) - - -The Simple:Press plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sforum_[md5 hash of the WordPress URL]' cookie value in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This would be highly complex to exploit as it would require the attacker to set the cookie a cookie for the targeted user. - - -- [Live-Hack-CVE/CVE-2022-4029](https://github.com/Live-Hack-CVE/CVE-2022-4029) - -### CVE-2022-4030 (2022-11-29) - - -The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitrary files on the server that will subsequently be deleted. This can be used to delete the wp-config.php file that can allow an attacker to configure the site and achieve remote code execution. - - -- [Live-Hack-CVE/CVE-2022-4030](https://github.com/Live-Hack-CVE/CVE-2022-4030) - -### CVE-2022-4031 (2022-11-29) - - -The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions such as an administrator, to supply paths to arbitrary files on the server that can be modified outside of the intended scope of the plugin. - - -- [Live-Hack-CVE/CVE-2022-4031](https://github.com/Live-Hack-CVE/CVE-2022-4031) - -### CVE-2022-4036 (2022-11-29) - - -The Appointment Hour Booking plugin for WordPress is vulnerable to CAPTCHA bypass in versions up to, and including, 1.3.72. This is due to the use of insufficiently strong hashing algorithm on the CAPTCHA secret that is also displayed to the user via a cookie. - - -- [Live-Hack-CVE/CVE-2022-4036](https://github.com/Live-Hack-CVE/CVE-2022-4036) - -### CVE-2022-4044 (2022-11-23) - - -A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages. - - -- [Live-Hack-CVE/CVE-2022-4044](https://github.com/Live-Hack-CVE/CVE-2022-4044) - -### CVE-2022-4045 (2022-11-23) - - -A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data. - - -- [Live-Hack-CVE/CVE-2022-4045](https://github.com/Live-Hack-CVE/CVE-2022-4045) - -### CVE-2022-4051 (2022-11-17) - - -A vulnerability has been found in Hostel Searching Project and classified as critical. This vulnerability affects unknown code of the file view-property.php. The manipulation of the argument property_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213844. - - -- [Live-Hack-CVE/CVE-2022-4051](https://github.com/Live-Hack-CVE/CVE-2022-4051) - -### CVE-2022-4052 (2022-11-17) - - -A vulnerability was found in Student Attendance Management System and classified as critical. This issue affects some unknown processing of the file /Admin/createClass.php. The manipulation of the argument Id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213845 was assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-4052](https://github.com/Live-Hack-CVE/CVE-2022-4052) - -### CVE-2022-4053 (2022-11-17) - - -A vulnerability was found in Student Attendance Management System. It has been classified as problematic. Affected is an unknown function of the file createClass.php. The manipulation of the argument className leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-213846 is the identifier assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-4053](https://github.com/Live-Hack-CVE/CVE-2022-4053) - -### CVE-2022-4055 (2022-11-18) - - -When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked. - - -- [Live-Hack-CVE/CVE-2022-4055](https://github.com/Live-Hack-CVE/CVE-2022-4055) - -### CVE-2022-4064 (2022-11-19) - - -A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec61789e7a7c3700e0f50d. It is recommended to apply a patch to fix this issue. VDB-214026 is the identifier assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-4064](https://github.com/Live-Hack-CVE/CVE-2022-4064) - -### CVE-2022-4065 (2022-11-19) - - -A vulnerability was found in cbeust testng. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-214027. - - -- [Live-Hack-CVE/CVE-2022-4065](https://github.com/Live-Hack-CVE/CVE-2022-4065) - -### CVE-2022-4066 (2022-11-19) - - -A vulnerability was found in davidmoreno onion. It has been rated as problematic. Affected by this issue is the function onion_response_flush of the file src/onion/response.c of the component Log Handler. The manipulation leads to allocation of resources. The name of the patch is de8ea938342b36c28024fd8393ebc27b8442a161. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-214028. - - -- [Live-Hack-CVE/CVE-2022-4066](https://github.com/Live-Hack-CVE/CVE-2022-4066) - -### CVE-2022-4067 (2022-11-19) - - -Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. - - -- [Live-Hack-CVE/CVE-2022-4067](https://github.com/Live-Hack-CVE/CVE-2022-4067) - -### CVE-2022-4068 (2022-11-19) - - -A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context of an admin's account. - - -- [Live-Hack-CVE/CVE-2022-4068](https://github.com/Live-Hack-CVE/CVE-2022-4068) - -### CVE-2022-4069 (2022-11-19) - - -Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0. - - -- [Live-Hack-CVE/CVE-2022-4069](https://github.com/Live-Hack-CVE/CVE-2022-4069) - -### CVE-2022-4070 (2022-11-19) - - -Insufficient Session Expiration in GitHub repository librenms/librenms prior to 22.10.0. - - -- [Live-Hack-CVE/CVE-2022-4070](https://github.com/Live-Hack-CVE/CVE-2022-4070) - -### CVE-2022-4088 (2022-11-24) - - -A vulnerability was found in rickxy Stock Management System and classified as critical. Affected by this issue is some unknown functionality of the file /pages/processlogin.php. The manipulation of the argument user/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214322 is the identifier assigned to this vulnerability. - - -- [Live-Hack-CVE/CVE-2022-4088](https://github.com/Live-Hack-CVE/CVE-2022-4088) - -### CVE-2022-4089 (2022-11-24) - - -A vulnerability was found in rickxy Stock Management System. It has been declared as problematic. This vulnerability affects unknown code of the file /pages/processlogin.php. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214324. - - -- [Live-Hack-CVE/CVE-2022-4089](https://github.com/Live-Hack-CVE/CVE-2022-4089) - -### CVE-2022-4090 (2022-11-24) - - -A vulnerability was found in rickxy Stock Management System and classified as problematic. This issue affects some unknown processing of the file us_transac.php?action=add. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214331. - - -- [Live-Hack-CVE/CVE-2022-4090](https://github.com/Live-Hack-CVE/CVE-2022-4090) - -### CVE-2022-4091 (2022-11-25) - - -A vulnerability was found in SourceCodester Canteen Management System. It has been classified as problematic. This affects the function query of the file food.php. The manipulation of the argument product_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214359. - - -- [Live-Hack-CVE/CVE-2022-4091](https://github.com/Live-Hack-CVE/CVE-2022-4091) - -### CVE-2022-4093 (2022-11-20) - - -SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker can obtain a persistent backdoor into an organization's systems, leading to a long-term compromise that can go unnoticed for an extended period. This affect 16.0.1 and 16.0.2 only. 16.0.0 or lower, and 16.0.3 or higher are not affected - - -- [Live-Hack-CVE/CVE-2022-4093](https://github.com/Live-Hack-CVE/CVE-2022-4093) - -### CVE-2022-4096 (2022-11-21) - - -Server-Side Request Forgery (SSRF) in GitHub repository appsmithorg/appsmith prior to 1.8.2. - - -- [Live-Hack-CVE/CVE-2022-4096](https://github.com/Live-Hack-CVE/CVE-2022-4096) - -### CVE-2022-4105 (2022-11-21) - - -A stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page. - - -- [Live-Hack-CVE/CVE-2022-4105](https://github.com/Live-Hack-CVE/CVE-2022-4105) - -### CVE-2022-4111 (2022-11-21) - - -Unrestricted file size limit can lead to DoS in tooljet/tooljet <1.27 by allowing a logged in attacker to upload profile pictures over 2MB. - - -- [Live-Hack-CVE/CVE-2022-4111](https://github.com/Live-Hack-CVE/CVE-2022-4111) - -### CVE-2022-4127 (2022-11-28) - - -A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service. - - -- [Live-Hack-CVE/CVE-2022-4127](https://github.com/Live-Hack-CVE/CVE-2022-4127) - -### CVE-2022-4128 (2022-11-28) - - -A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service. - - -- [Live-Hack-CVE/CVE-2022-4128](https://github.com/Live-Hack-CVE/CVE-2022-4128) - -### CVE-2022-4135 (2022-11-24) - - -Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) - - -- [Live-Hack-CVE/CVE-2022-4135](https://github.com/Live-Hack-CVE/CVE-2022-4135) - -### CVE-2022-4136 (2022-11-24) - - -Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4.15 allows an attacker to control the target host by calling any function in leadshop.php via the GET method. - - -- [Live-Hack-CVE/CVE-2022-4136](https://github.com/Live-Hack-CVE/CVE-2022-4136) - ### CVE-2022-5555 - [huihuo123/CVE-2022-5555](https://github.com/huihuo123/CVE-2022-5555) @@ -1917,37 +2013,157 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007) -### CVE-2022-20427 (2022-11-17) +### CVE-2022-20231 (2022-09-14) -In (TBD) of (TBD), there is a possible way to corrupt memory due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555070References: N/A +In smc_intc_request_fiq of arm_gic.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-211485702References: N/A -- [Live-Hack-CVE/CVE-2022-20427](https://github.com/Live-Hack-CVE/CVE-2022-20427) +- [Live-Hack-CVE/CVE-2022-20231](https://github.com/Live-Hack-CVE/CVE-2022-20231) -### CVE-2022-20428 (2022-11-17) +### CVE-2022-20239 (2022-08-09) -In (TBD) of (TBD), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555411References: N/A +remap_pfn_range' here may map out of size kernel memory (for example, may map the kernel area), and because the 'vma->vm_page_prot' can also be controlled by userspace, so userspace may map the kernel area to be writable, which is easy to be exploitedProduct: AndroidVersions: Android SoCAndroid ID: A-233972091 -- [Live-Hack-CVE/CVE-2022-20428](https://github.com/Live-Hack-CVE/CVE-2022-20428) +- [Live-Hack-CVE/CVE-2022-20239](https://github.com/Live-Hack-CVE/CVE-2022-20239) -### CVE-2022-20459 (2022-11-17) +### CVE-2022-20364 (2022-09-14) -In (TBD) of (TBD), there is a possible way to redirect code execution due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239556260References: N/A +In sysmmu_unmap of TBD, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-233606615References: N/A -- [Live-Hack-CVE/CVE-2022-20459](https://github.com/Live-Hack-CVE/CVE-2022-20459) +- [Live-Hack-CVE/CVE-2022-20364](https://github.com/Live-Hack-CVE/CVE-2022-20364) -### CVE-2022-20460 (2022-11-17) +### CVE-2022-20409 (2022-10-11) -In (TBD) mprot_unmap? of (TBD), there is a possible way to corrupt the memory mapping due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239557547References: N/A +In io_identity_cow of io_uring.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238177383References: Upstream kernel -- [Live-Hack-CVE/CVE-2022-20460](https://github.com/Live-Hack-CVE/CVE-2022-20460) +- [Live-Hack-CVE/CVE-2022-20409](https://github.com/Live-Hack-CVE/CVE-2022-20409) + +### CVE-2022-20414 (2022-11-08) + + +In setImpl of AlarmManagerService.java, there is a possible way to put a device into a boot loop due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234441463 + + +- [Live-Hack-CVE/CVE-2022-20414](https://github.com/Live-Hack-CVE/CVE-2022-20414) + +### CVE-2022-20426 (2022-11-08) + + +In multiple functions of many files, there is a possible obstruction of the user's ability to select a phone account due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-236263294 + + +- [Live-Hack-CVE/CVE-2022-20426](https://github.com/Live-Hack-CVE/CVE-2022-20426) + +### CVE-2022-20441 (2022-11-08) + + +In navigateUpTo of Task.java, there is a possible way to launch an unexported intent handler due to a logic error in the code. This could lead to local escalation of privilege if the targeted app has an intent trampoline, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-238605611 + + +- [Live-Hack-CVE/CVE-2022-20441](https://github.com/Live-Hack-CVE/CVE-2022-20441) + +### CVE-2022-20445 (2022-11-08) + + +In process_service_search_rsp of sdp_discovery.cc, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-225876506 + + +- [Live-Hack-CVE/CVE-2022-20445](https://github.com/Live-Hack-CVE/CVE-2022-20445) + +### CVE-2022-20446 (2022-11-08) + + +In AlwaysOnHotwordDetector of AlwaysOnHotwordDetector.java, there is a possible way to access the microphone from the background due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-229793943 + + +- [Live-Hack-CVE/CVE-2022-20446](https://github.com/Live-Hack-CVE/CVE-2022-20446) + +### CVE-2022-20447 (2022-11-08) + + +In PAN_WriteBuf of pan_api.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233604485 + + +- [Live-Hack-CVE/CVE-2022-20447](https://github.com/Live-Hack-CVE/CVE-2022-20447) + +### CVE-2022-20448 (2022-11-08) + + +In buzzBeepBlinkLocked of NotificationManagerService.java, there is a possible way to share data across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-237540408 + + +- [Live-Hack-CVE/CVE-2022-20448](https://github.com/Live-Hack-CVE/CVE-2022-20448) + +### CVE-2022-20450 (2022-11-08) + + +In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way to bypass user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-210065877 + + +- [Live-Hack-CVE/CVE-2022-20450](https://github.com/Live-Hack-CVE/CVE-2022-20450) + +### CVE-2022-20451 (2022-11-08) + + +In onCallRedirectionComplete of CallsManager.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-235098883 + + +- [Live-Hack-CVE/CVE-2022-20451](https://github.com/Live-Hack-CVE/CVE-2022-20451) + +### CVE-2022-20452 (2022-11-08) + + +In initializeFromParcelLocked of BaseBundle.java, there is a possible method arbitrary code execution due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240138318 + + +- [Live-Hack-CVE/CVE-2022-20452](https://github.com/Live-Hack-CVE/CVE-2022-20452) + +### CVE-2022-20453 (2022-11-08) + + +In update of MmsProvider.java, there is a possible constriction of directory permissions due to a path traversal error. This could lead to local denial of service of SIM recognition with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-240685104 + + +- [Live-Hack-CVE/CVE-2022-20453](https://github.com/Live-Hack-CVE/CVE-2022-20453) + +### CVE-2022-20454 (2022-11-08) + + +In fdt_next_tag of fdt.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242096164 + + +- [Live-Hack-CVE/CVE-2022-20454](https://github.com/Live-Hack-CVE/CVE-2022-20454) + +### CVE-2022-20457 (2022-11-08) + + +In getMountModeInternal of StorageManagerService.java, there is a possible prevention of package installation due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-243924784 + + +- [Live-Hack-CVE/CVE-2022-20457](https://github.com/Live-Hack-CVE/CVE-2022-20457) + +### CVE-2022-20462 (2022-11-08) + + +In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196 + + +- [Live-Hack-CVE/CVE-2022-20462](https://github.com/Live-Hack-CVE/CVE-2022-20462) + +### CVE-2022-20465 (2022-11-08) + + +In dismiss and related functions of KeyguardHostViewController.java and related files, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-218500036 + + +- [Live-Hack-CVE/CVE-2022-20465](https://github.com/Live-Hack-CVE/CVE-2022-20465) ### CVE-2022-20699 (2022-02-10) @@ -1958,13 +2174,29 @@ Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 - [Audiobahn/CVE-2022-20699](https://github.com/Audiobahn/CVE-2022-20699) - [rohankumardubey/CVE-2022-20699](https://github.com/rohankumardubey/CVE-2022-20699) -### CVE-2022-20826 (2022-11-15) +### CVE-2022-20772 (2022-11-04) -A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality. This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust. +A vulnerability in Cisco Email Security Appliance (ESA) and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack. This vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. -- [Live-Hack-CVE/CVE-2022-20826](https://github.com/Live-Hack-CVE/CVE-2022-20826) +- [Live-Hack-CVE/CVE-2022-20772](https://github.com/Live-Hack-CVE/CVE-2022-20772) + +### CVE-2022-20775 (2022-09-30) + + +Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. + + +- [Live-Hack-CVE/CVE-2022-20775](https://github.com/Live-Hack-CVE/CVE-2022-20775) + +### CVE-2022-20812 (2022-07-06) + + +Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow a remote attacker to overwrite arbitrary files or conduct null byte poisoning attacks on an affected device. Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device. For more information about these vulnerabilities, see the Details section of this advisory. + + +- [Live-Hack-CVE/CVE-2022-20812](https://github.com/Live-Hack-CVE/CVE-2022-20812) ### CVE-2022-20829 (2022-06-24) @@ -1982,78 +2214,6 @@ Multiple vulnerabilities in the web-based management interface of Cisco Firepowe - [Live-Hack-CVE/CVE-2022-20831](https://github.com/Live-Hack-CVE/CVE-2022-20831) -### CVE-2022-20832 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20832](https://github.com/Live-Hack-CVE/CVE-2022-20832) - -### CVE-2022-20833 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20833](https://github.com/Live-Hack-CVE/CVE-2022-20833) - -### CVE-2022-20834 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20834](https://github.com/Live-Hack-CVE/CVE-2022-20834) - -### CVE-2022-20835 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20835](https://github.com/Live-Hack-CVE/CVE-2022-20835) - -### CVE-2022-20836 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20836](https://github.com/Live-Hack-CVE/CVE-2022-20836) - -### CVE-2022-20838 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20838](https://github.com/Live-Hack-CVE/CVE-2022-20838) - -### CVE-2022-20839 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20839](https://github.com/Live-Hack-CVE/CVE-2022-20839) - -### CVE-2022-20840 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20840](https://github.com/Live-Hack-CVE/CVE-2022-20840) - -### CVE-2022-20843 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20843](https://github.com/Live-Hack-CVE/CVE-2022-20843) - ### CVE-2022-20854 (2022-11-15) @@ -2062,189 +2222,101 @@ A vulnerability in the processing of SSH connections of Cisco Firepower Manageme - [Live-Hack-CVE/CVE-2022-20854](https://github.com/Live-Hack-CVE/CVE-2022-20854) -### CVE-2022-20872 (2022-11-15) +### CVE-2022-20867 (2022-11-04) -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. +A vulnerability in web-based management interface of the of Cisco Email Security Appliance and Cisco Secure Email and Web Manager could allow an authenticated, remote attacker to conduct SQL injection attacks as root on an affected system. The attacker must have the credentials of a high-privileged user account. This vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data or modify data that is stored in the underlying database of the affected system. -- [Live-Hack-CVE/CVE-2022-20872](https://github.com/Live-Hack-CVE/CVE-2022-20872) +- [Live-Hack-CVE/CVE-2022-20867](https://github.com/Live-Hack-CVE/CVE-2022-20867) -### CVE-2022-20905 (2022-11-15) +### CVE-2022-20868 (2022-11-04) -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. +A vulnerability in the web-based management interface of Cisco Email Security Appliance, Cisco Secure Email and Web Manager and Cisco Secure Web Appliance could allow an authenticated, remote attacker to elevate privileges on an affected system. The attacker needs valid credentials to exploit this vulnerability. This vulnerability is due to the use of a hardcoded value to encrypt a token used for certain APIs calls . An attacker could exploit this vulnerability by authenticating to the device and sending a crafted HTTP request. A successful exploit could allow the attacker to impersonate another valid user and execute commands with the privileges of that user account. -- [Live-Hack-CVE/CVE-2022-20905](https://github.com/Live-Hack-CVE/CVE-2022-20905) +- [Live-Hack-CVE/CVE-2022-20868](https://github.com/Live-Hack-CVE/CVE-2022-20868) -### CVE-2022-20918 (2022-11-15) +### CVE-2022-20937 (2022-11-04) -A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential. This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential. This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed. +A vulnerability in a feature that monitors RADIUS requests on Cisco Identity Services Engine (ISE) Software could allow an unauthenticated, remote attacker to negatively affect the performance of an affected device. This vulnerability is due to insufficient management of system resources. An attacker could exploit this vulnerability by taking actions that cause Cisco ISE Software to receive specific RADIUS traffic. A successful and sustained exploit of this vulnerability could allow the attacker to cause reduced performance of the affected device, resulting in significant delays to RADIUS authentications. There are workarounds that address this vulnerability. -- [Live-Hack-CVE/CVE-2022-20918](https://github.com/Live-Hack-CVE/CVE-2022-20918) +- [Live-Hack-CVE/CVE-2022-20937](https://github.com/Live-Hack-CVE/CVE-2022-20937) -### CVE-2022-20922 (2022-11-15) +### CVE-2022-20942 (2022-11-04) -Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected. +A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA), Cisco Secure Email and Web Manager, and Cisco Secure Web Appliance, formerly known as Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to retrieve sensitive information from an affected device, including user credentials. This vulnerability is due to weak enforcement of back-end authorization checks. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain confidential data that is stored on the affected device. -- [Live-Hack-CVE/CVE-2022-20922](https://github.com/Live-Hack-CVE/CVE-2022-20922) +- [Live-Hack-CVE/CVE-2022-20942](https://github.com/Live-Hack-CVE/CVE-2022-20942) -### CVE-2022-20924 (2022-11-15) +### CVE-2022-20951 (2022-11-04) -A vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. +A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]] -- [Live-Hack-CVE/CVE-2022-20924](https://github.com/Live-Hack-CVE/CVE-2022-20924) +- [Live-Hack-CVE/CVE-2022-20951](https://github.com/Live-Hack-CVE/CVE-2022-20951) -### CVE-2022-20925 (2022-11-15) +### CVE-2022-20956 (2022-11-04) -A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions. +A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files. This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to. Cisco plans to release software updates that address this vulnerability. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"] -- [Live-Hack-CVE/CVE-2022-20925](https://github.com/Live-Hack-CVE/CVE-2022-20925) +- [Live-Hack-CVE/CVE-2022-20956](https://github.com/Live-Hack-CVE/CVE-2022-20956) -### CVE-2022-20926 (2022-11-15) +### CVE-2022-20958 (2022-11-04) -A vulnerability in the web management interface of the Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. The vulnerability is due to insufficient validation of user-supplied parameters for certain API endpoints. An attacker could exploit this vulnerability by sending crafted input to an affected API endpoint. A successful exploit could allow an attacker to execute arbitrary commands on the device with low system privileges. To successfully exploit this vulnerability, an attacker would need valid credentials for a user with Device permissions: by default, only Administrators, Security Approvers and Network Admins user accounts have these permissions. +A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an unauthenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network. {{value}} ["%7b%7bvalue%7d%7d"])}]] -- [Live-Hack-CVE/CVE-2022-20926](https://github.com/Live-Hack-CVE/CVE-2022-20926) +- [Live-Hack-CVE/CVE-2022-20958](https://github.com/Live-Hack-CVE/CVE-2022-20958) -### CVE-2022-20927 (2022-11-15) +### CVE-2022-20960 (2022-11-04) -A vulnerability in the SSL/TLS client of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper memory management when a device initiates SSL/TLS connections. An attacker could exploit this vulnerability by ensuring that the device will connect to an SSL/TLS server that is using specific encryption parameters. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition. +A vulnerability in Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of certain TLS connections that are processed by an affected device. An attacker could exploit this vulnerability by establishing a large number of concurrent TLS connections to an affected device. A successful exploit could allow the attacker to cause the device to drop new TLS email messages that come from the associated email servers. Exploitation of this vulnerability does not cause the affected device to unexpectedly reload. The device will recover autonomously within a few hours of when the attack is halted or mitigated. -- [Live-Hack-CVE/CVE-2022-20927](https://github.com/Live-Hack-CVE/CVE-2022-20927) +- [Live-Hack-CVE/CVE-2022-20960](https://github.com/Live-Hack-CVE/CVE-2022-20960) -### CVE-2022-20928 (2022-11-15) +### CVE-2022-20961 (2022-11-04) -A vulnerability in the authentication and authorization flows for VPN connections in Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to establish a connection as a different user. This vulnerability is due to a flaw in the authorization verifications during the VPN authentication flow. An attacker could exploit this vulnerability by sending a crafted packet during a VPN authentication. The attacker must have valid credentials to establish a VPN connection. A successful exploit could allow the attacker to establish a VPN connection with access privileges from a different user. +A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the target user. -- [Live-Hack-CVE/CVE-2022-20928](https://github.com/Live-Hack-CVE/CVE-2022-20928) +- [Live-Hack-CVE/CVE-2022-20961](https://github.com/Live-Hack-CVE/CVE-2022-20961) -### CVE-2022-20932 (2022-11-15) +### CVE-2022-20962 (2022-11-04) -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. +A vulnerability in the Localdisk Management feature of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to make unauthorized changes to the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request with absolute path sequences. A successful exploit could allow the attacker to upload malicious files to arbitrary locations within the file system. Using this method, it is possible to access the underlying operating system and execute commands with system privileges. -- [Live-Hack-CVE/CVE-2022-20932](https://github.com/Live-Hack-CVE/CVE-2022-20932) +- [Live-Hack-CVE/CVE-2022-20962](https://github.com/Live-Hack-CVE/CVE-2022-20962) -### CVE-2022-20934 (2022-11-15) +### CVE-2022-20963 (2022-11-04) -A vulnerability in the CLI of Cisco Firepower Threat Defense (FTD) Software and Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root. This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials. +A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid credentials to access the web-based management interface of an affected device. -- [Live-Hack-CVE/CVE-2022-20934](https://github.com/Live-Hack-CVE/CVE-2022-20934) +- [Live-Hack-CVE/CVE-2022-20963](https://github.com/Live-Hack-CVE/CVE-2022-20963) -### CVE-2022-20935 (2022-11-15) +### CVE-2022-20969 (2022-11-04) -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. +A vulnerability in multiple management dashboard pages of Cisco Umbrella could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the Cisco Umbrella dashboard. This vulnerability is due to unsanitized user input. An attacker could exploit this vulnerability by submitting custom JavaScript to the web application and persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. -- [Live-Hack-CVE/CVE-2022-20935](https://github.com/Live-Hack-CVE/CVE-2022-20935) - -### CVE-2022-20936 (2022-11-15) - - -Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. In some cases, it is also possible to cause a temporary availability impact to portions of the FMC Dashboard. - - -- [Live-Hack-CVE/CVE-2022-20936](https://github.com/Live-Hack-CVE/CVE-2022-20936) - -### CVE-2022-20938 (2022-11-15) - - -A vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view sensitive information. This vulnerability is due to insufficient validation of the XML syntax when importing a module. An attacker could exploit this vulnerability by supplying a specially crafted XML file to the function. A successful exploit could allow the attacker to read sensitive data that would normally not be revealed. - - -- [Live-Hack-CVE/CVE-2022-20938](https://github.com/Live-Hack-CVE/CVE-2022-20938) - -### CVE-2022-20940 (2022-11-15) - - -A vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper implementation of countermeasures against a Bleichenbacher attack on a device that uses SSL decryption policies. An attacker could exploit this vulnerability by sending crafted TLS messages to an affected device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device. - - -- [Live-Hack-CVE/CVE-2022-20940](https://github.com/Live-Hack-CVE/CVE-2022-20940) - -### CVE-2022-20941 (2022-11-15) - - -A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to access sensitive information. This vulnerability is due to missing authorization for certain resources in the web-based management interface together with insufficient entropy in these resource names. An attacker could exploit this vulnerability by sending a series of HTTPS requests to an affected device to enumerate resources on the device. A successful exploit could allow the attacker to retrieve sensitive information from the device. - - -- [Live-Hack-CVE/CVE-2022-20941](https://github.com/Live-Hack-CVE/CVE-2022-20941) - -### CVE-2022-20943 (2022-11-15) - - -Multiple vulnerabilities in the Server Message Block Version 2 (SMB2) processor of the Snort detection engine on multiple Cisco products could allow an unauthenticated, remote attacker to bypass the configured policies or cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to improper management of system resources when the Snort detection engine is processing SMB2 traffic. An attacker could exploit these vulnerabilities by sending a high rate of certain types of SMB2 packets through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process, resulting in a DoS condition. Note: When the snort preserve-connection option is enabled for the Snort detection engine, a successful exploit could also allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network. The snort preserve-connection setting is enabled by default. See the Details ["#details"] section of this advisory for more information. Note: Only products that have Snort 3 configured are affected. Products that are configured with Snort 2 are not affected. - - -- [Live-Hack-CVE/CVE-2022-20943](https://github.com/Live-Hack-CVE/CVE-2022-20943) - -### CVE-2022-20946 (2022-11-15) - - -A vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory handling error that occurs when GRE traffic is processed. An attacker could exploit this vulnerability by sending a crafted GRE payload through an affected device. A successful exploit could allow the attacker to cause the device to restart, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-gre-dos-hmedHQPM"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. - - -- [Live-Hack-CVE/CVE-2022-20946](https://github.com/Live-Hack-CVE/CVE-2022-20946) - -### CVE-2022-20947 (2022-11-15) - - -A vulnerability in dynamic access policies (DAP) functionality of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability is due to improper processing of HostScan data received from the Posture (HostScan) module. An attacker could exploit this vulnerability by sending crafted HostScan data to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-dap-dos-GhYZBxDU"] This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. - - -- [Live-Hack-CVE/CVE-2022-20947](https://github.com/Live-Hack-CVE/CVE-2022-20947) - -### CVE-2022-20949 (2022-11-15) - - -A vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker with high privileges to execute configuration commands on an affected system. This vulnerability exists because access to HTTPS endpoints is not properly restricted on an affected device. An attacker could exploit this vulnerability by sending specific messages to the affected HTTPS handler. A successful exploit could allow the attacker to perform configuration changes on the affected system, which should be configured and managed only through Cisco Firepower Management Center (FMC) Software. - - -- [Live-Hack-CVE/CVE-2022-20949](https://github.com/Live-Hack-CVE/CVE-2022-20949) - -### CVE-2022-20950 (2022-11-15) - - -A vulnerability in the interaction of SIP and Snort 3 for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the Snort 3 detection engine to restart. This vulnerability is due to a lack of error-checking when SIP bidirectional flows are being inspected by Snort 3. An attacker could exploit this vulnerability by sending a stream of crafted SIP traffic through an interface on the targeted device. A successful exploit could allow the attacker to trigger a restart of the Snort 3 process, resulting in a denial of service (DoS) condition. - - -- [Live-Hack-CVE/CVE-2022-20950](https://github.com/Live-Hack-CVE/CVE-2022-20950) - -### CVE-2022-21126 (2022-11-29) - - -The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it. - - -- [Live-Hack-CVE/CVE-2022-21126](https://github.com/Live-Hack-CVE/CVE-2022-21126) - -### CVE-2022-21198 (2022-11-11) - - -Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. - - -- [Live-Hack-CVE/CVE-2022-21198](https://github.com/Live-Hack-CVE/CVE-2022-21198) +- [Live-Hack-CVE/CVE-2022-20969](https://github.com/Live-Hack-CVE/CVE-2022-20969) ### CVE-2022-21241 (2022-02-08) @@ -2275,6 +2347,166 @@ Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product o - [Damok82/SignChecker](https://github.com/Damok82/SignChecker) - [fundaergn/CVE-2022-21449](https://github.com/fundaergn/CVE-2022-21449) +### CVE-2022-21589 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.39 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). + + +- [Live-Hack-CVE/CVE-2022-21589](https://github.com/Live-Hack-CVE/CVE-2022-21589) + +### CVE-2022-21592 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). + + +- [Live-Hack-CVE/CVE-2022-21592](https://github.com/Live-Hack-CVE/CVE-2022-21592) + +### CVE-2022-21594 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21594](https://github.com/Live-Hack-CVE/CVE-2022-21594) + +### CVE-2022-21595 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21595](https://github.com/Live-Hack-CVE/CVE-2022-21595) + +### CVE-2022-21599 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21599](https://github.com/Live-Hack-CVE/CVE-2022-21599) + +### CVE-2022-21600 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). + + +- [Live-Hack-CVE/CVE-2022-21600](https://github.com/Live-Hack-CVE/CVE-2022-21600) + +### CVE-2022-21604 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21604](https://github.com/Live-Hack-CVE/CVE-2022-21604) + +### CVE-2022-21605 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21605](https://github.com/Live-Hack-CVE/CVE-2022-21605) + +### CVE-2022-21607 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21607](https://github.com/Live-Hack-CVE/CVE-2022-21607) + +### CVE-2022-21608 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21608](https://github.com/Live-Hack-CVE/CVE-2022-21608) + +### CVE-2022-21611 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21611](https://github.com/Live-Hack-CVE/CVE-2022-21611) + +### CVE-2022-21617 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21617](https://github.com/Live-Hack-CVE/CVE-2022-21617) + +### CVE-2022-21625 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21625](https://github.com/Live-Hack-CVE/CVE-2022-21625) + +### CVE-2022-21632 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21632](https://github.com/Live-Hack-CVE/CVE-2022-21632) + +### CVE-2022-21633 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21633](https://github.com/Live-Hack-CVE/CVE-2022-21633) + +### CVE-2022-21635 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). + + +- [Live-Hack-CVE/CVE-2022-21635](https://github.com/Live-Hack-CVE/CVE-2022-21635) + +### CVE-2022-21637 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21637](https://github.com/Live-Hack-CVE/CVE-2022-21637) + +### CVE-2022-21638 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21638](https://github.com/Live-Hack-CVE/CVE-2022-21638) + +### CVE-2022-21640 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21640](https://github.com/Live-Hack-CVE/CVE-2022-21640) + +### CVE-2022-21641 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-21641](https://github.com/Live-Hack-CVE/CVE-2022-21641) + ### CVE-2022-21658 (2022-01-20) @@ -2311,6 +2543,22 @@ pipenv is a Python development workflow tool. Starting with version 2018.10.9 an - [sreeram281997/CVE-2022-21668-Pipenv-RCE-vulnerability](https://github.com/sreeram281997/CVE-2022-21668-Pipenv-RCE-vulnerability) +### CVE-2022-21680 (2022-01-14) + + +Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources. + + +- [Live-Hack-CVE/CVE-2022-21680](https://github.com/Live-Hack-CVE/CVE-2022-21680) + +### CVE-2022-21681 (2022-01-14) + + +Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or run marked on a worker thread and set a reasonable time limit to prevent draining resources. + + +- [Live-Hack-CVE/CVE-2022-21681](https://github.com/Live-Hack-CVE/CVE-2022-21681) + ### CVE-2022-21722 (2022-01-26) @@ -2319,6 +2567,14 @@ PJSIP is a free and open source multimedia communication library written in C la - [Live-Hack-CVE/CVE-2022-21722](https://github.com/Live-Hack-CVE/CVE-2022-21722) +### CVE-2022-21724 (2022-02-02) + + +pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue. + + +- [Live-Hack-CVE/CVE-2022-21724](https://github.com/Live-Hack-CVE/CVE-2022-21724) + ### CVE-2022-21728 (2022-02-03) @@ -2327,6 +2583,14 @@ Tensorflow is an Open Source Machine Learning Framework. The implementation of s - [mwina/CVE-2022-21728-test](https://github.com/mwina/CVE-2022-21728-test) +### CVE-2022-21778 (2022-11-08) + + +In vpu, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06382421; Issue ID: ALPS06382421. + + +- [Live-Hack-CVE/CVE-2022-21778](https://github.com/Live-Hack-CVE/CVE-2022-21778) + ### CVE-2022-21789 (2022-08-01) @@ -2343,13 +2607,13 @@ Improper authentication in BIOS firmware for some Intel(R) NUC Boards, Intel(R) - [Live-Hack-CVE/CVE-2022-21794](https://github.com/Live-Hack-CVE/CVE-2022-21794) -### CVE-2022-21831 (2022-05-26) +### CVE-2022-21824 (2022-02-24) -A code injection vulnerability exists in the Active Storage >= v5.2.0 that could allow an attacker to execute code via image_processing arguments. +Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to. -- [Live-Hack-CVE/CVE-2022-21831](https://github.com/Live-Hack-CVE/CVE-2022-21831) +- [Live-Hack-CVE/CVE-2022-21824](https://github.com/Live-Hack-CVE/CVE-2022-21824) ### CVE-2022-21877 (2022-01-11) @@ -2388,6 +2652,14 @@ HTTP Protocol Stack Remote Code Execution Vulnerability. - [iveresk/cve-2022-21907-http.sys](https://github.com/iveresk/cve-2022-21907-http.sys) - [iveresk/cve-2022-21907](https://github.com/iveresk/cve-2022-21907) +### CVE-2022-21944 (2022-01-26) + + +A UNIX Symbolic Link (Symlink) Following vulnerability in the systemd service file for watchman of openSUSE Backports SLE-15-SP3, Factory allows local attackers to escalate to root. This issue affects: openSUSE Backports SLE-15-SP3 watchman versions prior to 4.9.0. openSUSE Factory watchman versions prior to 4.9.0-9.1. + + +- [Live-Hack-CVE/CVE-2022-21944](https://github.com/Live-Hack-CVE/CVE-2022-21944) + ### CVE-2022-21971 (2022-02-09) @@ -2429,6 +2701,30 @@ Sourcecodester Hospital's Patient Records Management System 1.0 is vulnerable to - [vlakhani28/CVE-2022-22296](https://github.com/vlakhani28/CVE-2022-22296) +### CVE-2022-22425 (2022-11-03) + + +"IBM InfoSphere Information Server 11.7 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 223598." + + +- [Live-Hack-CVE/CVE-2022-22425](https://github.com/Live-Hack-CVE/CVE-2022-22425) + +### CVE-2022-22442 (2022-11-03) + + +"IBM InfoSphere Information Server 11.7 could allow an authenticated user to access information restricted to users with elevated privileges due to improper access controls. IBM X-Force ID: 224427." + + +- [Live-Hack-CVE/CVE-2022-22442](https://github.com/Live-Hack-CVE/CVE-2022-22442) + +### CVE-2022-22503 (2022-10-06) + + +IBM Robotic Process Automation 21.0.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 227125. + + +- [Live-Hack-CVE/CVE-2022-22503](https://github.com/Live-Hack-CVE/CVE-2022-22503) + ### CVE-2022-22536 (2022-02-09) @@ -2438,14 +2734,6 @@ SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, AB - [antx-code/CVE-2022-22536](https://github.com/antx-code/CVE-2022-22536) - [tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536](https://github.com/tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536) -### CVE-2022-22577 (2022-05-26) - - -An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for non HTML like responses. - - -- [Live-Hack-CVE/CVE-2022-22577](https://github.com/Live-Hack-CVE/CVE-2022-22577) - ### CVE-2022-22582 - [poizon-box/CVE-2022-22582](https://github.com/poizon-box/CVE-2022-22582) @@ -2490,6 +2778,14 @@ Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is uniqu - [ahmetfurkans/CVE-2022-22718](https://github.com/ahmetfurkans/CVE-2022-22718) +### CVE-2022-22808 (2022-02-09) + + +A CWE-352: Cross-Site Request Forgery (CSRF) exists that could cause a remote attacker to gain unauthorized access to the product when conducting cross-domain attacks based on same-origin policy or cross-site request forgery protections bypass. Affected Product: EcoStruxure EV Charging Expert (formerly known as EVlink Load Management System): (HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML) (All Versions prior to SP8 (Version 01) V4.0.0.13) + + +- [Live-Hack-CVE/CVE-2022-22808](https://github.com/Live-Hack-CVE/CVE-2022-22808) + ### CVE-2022-22814 (2022-03-10) @@ -2498,29 +2794,13 @@ The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalatio - [DShankle/CVE-2022-22814_PoC](https://github.com/DShankle/CVE-2022-22814_PoC) -### CVE-2022-22815 (2022-01-07) +### CVE-2022-22818 (2022-02-02) -path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path. +The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. -- [Live-Hack-CVE/CVE-2022-22815](https://github.com/Live-Hack-CVE/CVE-2022-22815) - -### CVE-2022-22816 (2022-01-07) - - -path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path. - - -- [Live-Hack-CVE/CVE-2022-22816](https://github.com/Live-Hack-CVE/CVE-2022-22816) - -### CVE-2022-22817 (2022-01-07) - - -PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used, - - -- [Live-Hack-CVE/CVE-2022-22817](https://github.com/Live-Hack-CVE/CVE-2022-22817) +- [Live-Hack-CVE/CVE-2022-22818](https://github.com/Live-Hack-CVE/CVE-2022-22818) ### CVE-2022-22822 (2022-01-07) @@ -2538,6 +2818,14 @@ An insecure direct object reference for the file-download URL in Synametrics Syn - [videnlabs/CVE-2022-22828](https://github.com/videnlabs/CVE-2022-22828) +### CVE-2022-22844 (2022-01-08) + + +LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field. + + +- [Live-Hack-CVE/CVE-2022-22844](https://github.com/Live-Hack-CVE/CVE-2022-22844) + ### CVE-2022-22845 (2022-01-09) @@ -2825,62 +3113,6 @@ A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Qu - [jweny/cve-2022-22980-exp](https://github.com/jweny/cve-2022-22980-exp) - [murataydemir/CVE-2022-22980](https://github.com/murataydemir/CVE-2022-22980) -### CVE-2022-23036 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23036](https://github.com/Live-Hack-CVE/CVE-2022-23036) - -### CVE-2022-23037 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23037](https://github.com/Live-Hack-CVE/CVE-2022-23037) - -### CVE-2022-23038 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23038](https://github.com/Live-Hack-CVE/CVE-2022-23038) - -### CVE-2022-23039 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23039](https://github.com/Live-Hack-CVE/CVE-2022-23039) - -### CVE-2022-23040 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23040](https://github.com/Live-Hack-CVE/CVE-2022-23040) - -### CVE-2022-23041 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23041](https://github.com/Live-Hack-CVE/CVE-2022-23041) - -### CVE-2022-23042 (2022-03-10) - - -Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042 - - -- [Live-Hack-CVE/CVE-2022-23042](https://github.com/Live-Hack-CVE/CVE-2022-23042) - ### CVE-2022-23046 (2022-01-19) @@ -2912,6 +3144,30 @@ In the case of instances where the SAML SSO authentication is enabled (non-defau - [Kazaf6s/CVE-2022-23131](https://github.com/Kazaf6s/CVE-2022-23131) - [trhacknon/CVE-2022-23131](https://github.com/trhacknon/CVE-2022-23131) +### CVE-2022-23181 (2022-01-27) + + +The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore. + + +- [Live-Hack-CVE/CVE-2022-23181](https://github.com/Live-Hack-CVE/CVE-2022-23181) + +### CVE-2022-23218 (2022-01-14) + + +The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2022-23218](https://github.com/Live-Hack-CVE/CVE-2022-23218) + +### CVE-2022-23219 (2022-01-14) + + +The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2022-23219](https://github.com/Live-Hack-CVE/CVE-2022-23219) + ### CVE-2022-23222 (2022-01-14) @@ -2973,14 +3229,6 @@ PJSIP is a free and open source multimedia communication library written in C la - [Live-Hack-CVE/CVE-2022-23608](https://github.com/Live-Hack-CVE/CVE-2022-23608) -### CVE-2022-23632 (2022-02-17) - - -Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.6.1, Traefik skips the router transport layer security (TLS) configuration when the host header is a fully qualified domain name (FQDN). For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS configuration falls back to the default configuration that might not correspond to the configured one. If the CNAME flattening is enabled, the selected TLS configuration is the SNI one and the routing uses the CNAME value, so this can skip the expected TLS configuration. Version 2.6.1 contains a patch for this issue. As a workaround, one may add the FDQN to the host rule. However, there is no workaround if the CNAME flattening is enabled. - - -- [Live-Hack-CVE/CVE-2022-23632](https://github.com/Live-Hack-CVE/CVE-2022-23632) - ### CVE-2022-23642 (2022-02-18) @@ -2997,6 +3245,14 @@ containerd is a container runtime available as a daemon for Linux and Windows. A - [raesene/CVE-2022-23648-POC](https://github.com/raesene/CVE-2022-23648-POC) +### CVE-2022-23708 (2022-03-03) + + +A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. + + +- [Live-Hack-CVE/CVE-2022-23708](https://github.com/Live-Hack-CVE/CVE-2022-23708) + ### CVE-2022-23731 (2022-03-11) @@ -3005,21 +3261,21 @@ V8 javascript engine (heap vulnerability) can cause privilege escalation ,which - [DavidBuchanan314/WAMpage](https://github.com/DavidBuchanan314/WAMpage) -### CVE-2022-23740 (2022-11-23) +### CVE-2022-23772 (2022-02-10) -CRITICAL: An improper neutralization of argument delimiters in a command vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. To exploit this vulnerability, an attacker would need permission to create and build GitHub Pages using GitHub Actions. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program. +Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption. -- [Live-Hack-CVE/CVE-2022-23740](https://github.com/Live-Hack-CVE/CVE-2022-23740) +- [Live-Hack-CVE/CVE-2022-23772](https://github.com/Live-Hack-CVE/CVE-2022-23772) -### CVE-2022-23743 (2022-05-11) +### CVE-2022-23773 (2022-02-10) -Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process. In addition, weak permissions in the ProgramData\CheckPoint\ZoneAlarm\Data\Updates directory allow a local attacker the ability to execute an arbitrary file write, leading to execution of code as local system, in ZoneAlarm versions before v15.8.211.192119 +cmd/go in Go before 1.16.14 and 1.17.x before 1.17.7 can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is supposed to be able to create branches but not tags. -- [Live-Hack-CVE/CVE-2022-23743](https://github.com/Live-Hack-CVE/CVE-2022-23743) +- [Live-Hack-CVE/CVE-2022-23773](https://github.com/Live-Hack-CVE/CVE-2022-23773) ### CVE-2022-23779 (2022-03-02) @@ -3029,6 +3285,14 @@ Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed serve - [fbusr/CVE-2022-23779](https://github.com/fbusr/CVE-2022-23779) +### CVE-2022-23806 (2022-02-10) + + +Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17.x before 1.17.7 can incorrectly return true in situations with a big.Int value that is not a valid field element. + + +- [Live-Hack-CVE/CVE-2022-23806](https://github.com/Live-Hack-CVE/CVE-2022-23806) + ### CVE-2022-23808 (2022-01-21) @@ -3045,6 +3309,14 @@ This affects the package node-ipc from 10.1.1 and before 10.1.3. This package co - [scriptzteam/node-ipc-malware-protestware-CVE-2022-23812](https://github.com/scriptzteam/node-ipc-malware-protestware-CVE-2022-23812) +### CVE-2022-23825 (2022-07-14) + + +Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure. + + +- [Live-Hack-CVE/CVE-2022-23825](https://github.com/Live-Hack-CVE/CVE-2022-23825) + ### CVE-2022-23831 (2022-11-09) @@ -3053,6 +3325,14 @@ Insufficient validation of the IOCTL input buffer in AMD μProf may allow an att - [Live-Hack-CVE/CVE-2022-23831](https://github.com/Live-Hack-CVE/CVE-2022-23831) +### CVE-2022-23833 (2022-02-02) + + +An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. + + +- [Live-Hack-CVE/CVE-2022-23833](https://github.com/Live-Hack-CVE/CVE-2022-23833) + ### CVE-2022-23852 (2022-01-23) @@ -3101,29 +3381,13 @@ Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog functi - [Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23990](https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-23990) -### CVE-2022-24036 (2022-11-16) +### CVE-2022-24082 (2022-07-19) -Karmasis informatics solutions Infraskope Security Event Manager product has an unauthenticated access which could allow an unauthenticated attacker to modificate logs. +If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture. -- [Live-Hack-CVE/CVE-2022-24036](https://github.com/Live-Hack-CVE/CVE-2022-24036) - -### CVE-2022-24037 (2022-11-18) - - -Karmasis informatics solutions Infraskope Security Event Manager product has an unauthenticated access which could allow an unauthenticated attacker to obtain critical information. - - -- [Live-Hack-CVE/CVE-2022-24037](https://github.com/Live-Hack-CVE/CVE-2022-24037) - -### CVE-2022-24038 (2022-11-18) - - -Karmasis informatics solutions Infraskope Security Event Manager product has an unauthenticated access which could allow an unauthenticated attacker to damage the page where the agents are listed. - - -- [Live-Hack-CVE/CVE-2022-24038](https://github.com/Live-Hack-CVE/CVE-2022-24038) +- [Live-Hack-CVE/CVE-2022-24082](https://github.com/Live-Hack-CVE/CVE-2022-24082) ### CVE-2022-24086 (2022-02-16) @@ -3187,14 +3451,6 @@ Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System - [comrade99/CVE-2022-24181](https://github.com/comrade99/CVE-2022-24181) -### CVE-2022-24303 (2022-03-27) - - -Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled. - - -- [Live-Hack-CVE/CVE-2022-24303](https://github.com/Live-Hack-CVE/CVE-2022-24303) - ### CVE-2022-24348 (2022-02-04) @@ -3203,6 +3459,14 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t - [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2) +### CVE-2022-24407 (2022-02-23) + + +In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement. + + +- [Live-Hack-CVE/CVE-2022-24407](https://github.com/Live-Hack-CVE/CVE-2022-24407) + ### CVE-2022-24449 (2022-04-28) @@ -3235,6 +3499,14 @@ Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerabili - [vportal/AFD](https://github.com/vportal/AFD) +### CVE-2022-24495 (2022-04-15) + + +Windows Direct Show - Remote Code Execution Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-24495](https://github.com/Live-Hack-CVE/CVE-2022-24495) + ### CVE-2022-24497 (2022-04-15) @@ -3292,7 +3564,6 @@ In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured d - [sadshade/CVE-2022-24706-CouchDB-Exploit](https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit) - [ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-](https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post-) -- [Live-Hack-CVE/CVE-2022-24706](https://github.com/Live-Hack-CVE/CVE-2022-24706) ### CVE-2022-24707 (2022-02-23) @@ -3310,13 +3581,29 @@ regex is an implementation of regular expressions for the Rust language. The reg - [ItzSwirlz/CVE-2022-24713-POC](https://github.com/ItzSwirlz/CVE-2022-24713-POC) -### CVE-2022-24723 (2022-03-03) +### CVE-2022-24714 (2022-03-08) -URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround. +Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. -- [Live-Hack-CVE/CVE-2022-24723](https://github.com/Live-Hack-CVE/CVE-2022-24723) +- [Live-Hack-CVE/CVE-2022-24714](https://github.com/Live-Hack-CVE/CVE-2022-24714) + +### CVE-2022-24715 (2022-03-08) + + +Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration. + + +- [Live-Hack-CVE/CVE-2022-24715](https://github.com/Live-Hack-CVE/CVE-2022-24715) + +### CVE-2022-24716 (2022-03-08) + + +Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated. + + +- [Live-Hack-CVE/CVE-2022-24716](https://github.com/Live-Hack-CVE/CVE-2022-24716) ### CVE-2022-24734 (2022-03-09) @@ -3327,6 +3614,14 @@ MyBB is a free and open source forum software. In affected versions the Admin CP - [Altelus1/CVE-2022-24734](https://github.com/Altelus1/CVE-2022-24734) - [lavclash75/mybb-CVE-2022-24734](https://github.com/lavclash75/mybb-CVE-2022-24734) +### CVE-2022-24754 (2022-03-11) + + +PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP. + + +- [Live-Hack-CVE/CVE-2022-24754](https://github.com/Live-Hack-CVE/CVE-2022-24754) + ### CVE-2022-24760 (2022-03-11) @@ -3351,14 +3646,6 @@ PJSIP is a free and open source multimedia communication library written in C. V - [Live-Hack-CVE/CVE-2022-24764](https://github.com/Live-Hack-CVE/CVE-2022-24764) -### CVE-2022-24786 (2022-04-06) - - -PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds. - - -- [Live-Hack-CVE/CVE-2022-24786](https://github.com/Live-Hack-CVE/CVE-2022-24786) - ### CVE-2022-24853 (2022-04-14) @@ -3367,6 +3654,38 @@ Metabase is an open source business intelligence and analytics application. Meta - [secure-77/CVE-2022-24853](https://github.com/secure-77/CVE-2022-24853) +### CVE-2022-24882 (2022-04-26) + + +FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds. + + +- [Live-Hack-CVE/CVE-2022-24882](https://github.com/Live-Hack-CVE/CVE-2022-24882) + +### CVE-2022-24883 (2022-04-26) + + +FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left. + + +- [Live-Hack-CVE/CVE-2022-24883](https://github.com/Live-Hack-CVE/CVE-2022-24883) + +### CVE-2022-24903 (2022-05-05) + + +Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability. + + +- [Live-Hack-CVE/CVE-2022-24903](https://github.com/Live-Hack-CVE/CVE-2022-24903) + +### CVE-2022-24921 (2022-03-05) + + +regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression. + + +- [Live-Hack-CVE/CVE-2022-24921](https://github.com/Live-Hack-CVE/CVE-2022-24921) + ### CVE-2022-24924 (2022-02-11) @@ -3402,22 +3721,6 @@ A malformed packet causes a stack overflow in the Ember ZNet stack. This causes - [Live-Hack-CVE/CVE-2022-24938](https://github.com/Live-Hack-CVE/CVE-2022-24938) -### CVE-2022-24939 (2022-11-17) - - -A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error. - - -- [Live-Hack-CVE/CVE-2022-24939](https://github.com/Live-Hack-CVE/CVE-2022-24939) - -### CVE-2022-24942 (2022-11-15) - - -Heap based buffer overflow in HTTP Server functionality in Micrium uC-HTTP 3.01.01 allows remote code execution via HTTP request. - - -- [Live-Hack-CVE/CVE-2022-24942](https://github.com/Live-Hack-CVE/CVE-2022-24942) - ### CVE-2022-24990 - [Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-](https://github.com/Jaky5155/CVE-2022-24990-TerraMaster-TOS--PHP-) - [VVeakee/CVE-2022-24990-POC](https://github.com/VVeakee/CVE-2022-24990-POC) @@ -3432,7 +3735,6 @@ qs before 6.10.3, as used in Express before 4.17.3 and other products, allows at - [n8tz/CVE-2022-24999](https://github.com/n8tz/CVE-2022-24999) -- [Live-Hack-CVE/CVE-2022-24999](https://github.com/Live-Hack-CVE/CVE-2022-24999) ### CVE-2022-25018 (2022-02-28) @@ -3510,13 +3812,13 @@ Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary tem - [ComparedArray/printix-CVE-2022-25090](https://github.com/ComparedArray/printix-CVE-2022-25090) -### CVE-2022-25164 (2022-11-24) +### CVE-2022-25169 (2022-05-16) -Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 all versions and Mitsubishi Electric MX OPC UA Module Configurator-R all versions allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users can gain unauthorized access to the CPU module and the OPC UA server module. +The BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may allocate an unreasonable amount of memory on carefully crafted files. -- [Live-Hack-CVE/CVE-2022-25164](https://github.com/Live-Hack-CVE/CVE-2022-25164) +- [Live-Hack-CVE/CVE-2022-25169](https://github.com/Live-Hack-CVE/CVE-2022-25169) ### CVE-2022-25235 (2022-02-15) @@ -3526,6 +3828,14 @@ xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of e - [Satheesh575555/external_expat_AOSP10_r33_CVE-2022-25235](https://github.com/Satheesh575555/external_expat_AOSP10_r33_CVE-2022-25235) +### CVE-2022-25243 (2022-03-07) + + +"Vault and Vault Enterprise 1.8.0 through 1.8.8, and 1.9.3 allowed the PKI secrets engine under certain configurations to issue wildcard certificates to authorized users for a specified domain, even if the PKI role policy attribute allow_subdomains is set to false. Fixed in Vault Enterprise 1.8.9 and 1.9.4. + + +- [Live-Hack-CVE/CVE-2022-25243](https://github.com/Live-Hack-CVE/CVE-2022-25243) + ### CVE-2022-25256 (2022-02-18) @@ -3554,6 +3864,14 @@ In JetBrains Hub before 2022.1.14434, SAML request takeover was possible. - [yuriisanin/CVE-2022-25262](https://github.com/yuriisanin/CVE-2022-25262) +### CVE-2022-25271 (2022-02-16) + + +Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. + + +- [Live-Hack-CVE/CVE-2022-25271](https://github.com/Live-Hack-CVE/CVE-2022-25271) + ### CVE-2022-25313 (2022-02-17) @@ -3604,14 +3922,6 @@ In wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement - [dim0x69/cve-2022-25640-exploit](https://github.com/dim0x69/cve-2022-25640-exploit) -### CVE-2022-25647 (2022-05-01) - - -The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks. - - -- [Live-Hack-CVE/CVE-2022-25647](https://github.com/Live-Hack-CVE/CVE-2022-25647) - ### CVE-2022-25667 (2022-11-15) @@ -3700,21 +4010,45 @@ Memory corruption in graphics due to use-after-free while importing graphics buf - [Live-Hack-CVE/CVE-2022-25743](https://github.com/Live-Hack-CVE/CVE-2022-25743) -### CVE-2022-25848 (2022-11-29) +### CVE-2022-25765 (2022-09-09) -This affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory. +The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. -- [Live-Hack-CVE/CVE-2022-25848](https://github.com/Live-Hack-CVE/CVE-2022-25848) +- [Live-Hack-CVE/CVE-2022-25765](https://github.com/Live-Hack-CVE/CVE-2022-25765) -### CVE-2022-25917 (2022-11-11) +### CVE-2022-25794 (2022-04-11) -Uncaught exception in the firmware for some Intel(R) Server Board M50CYP Family before version R01.01.0005 may allow a privileged user to potentially enable a denial of service via local access. +An Out-Of-Bounds Read Vulnerability in Autodesk FBX Review version 1.5.2 and prior may lead to code execution through maliciously crafted ActionScript Byte Code 'ABC' files or information disclosure. ABC files are created by the Flash compiler and contain executable code. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. -- [Live-Hack-CVE/CVE-2022-25917](https://github.com/Live-Hack-CVE/CVE-2022-25917) +- [Live-Hack-CVE/CVE-2022-25794](https://github.com/Live-Hack-CVE/CVE-2022-25794) + +### CVE-2022-25799 (2022-08-16) + + +An open redirect vulnerability exists in CERT/CC VINCE software prior to 1.50.0. An attacker could send a link that has a specially crafted URL and convince the user to click the link. When an authenticated user clicks the link, the authenticated user's browser could be redirected to a malicious site that is designed to impersonate a legitimate website. The attacker could trick the user and potentially acquire sensitive information such as the user's credentials. + + +- [Live-Hack-CVE/CVE-2022-25799](https://github.com/Live-Hack-CVE/CVE-2022-25799) + +### CVE-2022-25844 (2022-05-01) + + +The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher. + + +- [Live-Hack-CVE/CVE-2022-25844](https://github.com/Live-Hack-CVE/CVE-2022-25844) + +### CVE-2022-25932 (2022-11-09) + + +The firmware of InHand Networks InRouter302 V3.5.45 introduces fixes for TALOS-2022-1472 and TALOS-2022-1474. The fixes are incomplete. An attacker can still perform, respectively, a privilege escalation and an information disclosure vulnerability. + + +- [Live-Hack-CVE/CVE-2022-25932](https://github.com/Live-Hack-CVE/CVE-2022-25932) ### CVE-2022-25943 (2022-03-08) @@ -3733,6 +4067,14 @@ The kernel mode driver kwatch3 of KINGSOFT Internet Security 9 Plus Version 2010 - [tandasat/CVE-2022-25949](https://github.com/tandasat/CVE-2022-25949) +### CVE-2022-25952 (2022-11-03) + + +Cross-Site Request Forgery (CSRF) vulnerability in Keywordrush Content Egg plugin <= 5.4.0 on WordPress. + + +- [Live-Hack-CVE/CVE-2022-25952](https://github.com/Live-Hack-CVE/CVE-2022-25952) + ### CVE-2022-26006 (2022-11-11) @@ -3741,6 +4083,14 @@ Improper input validation in the BIOS firmware for some Intel(R) Processors may - [Live-Hack-CVE/CVE-2022-26006](https://github.com/Live-Hack-CVE/CVE-2022-26006) +### CVE-2022-26023 (2022-11-09) + + +A leftover debug code vulnerability exists in the console verify functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-26023](https://github.com/Live-Hack-CVE/CVE-2022-26023) + ### CVE-2022-26024 (2022-11-11) @@ -3757,13 +4107,21 @@ Uncontrolled search path in the Intel(R) VTune(TM) Profiler software before vers - [Live-Hack-CVE/CVE-2022-26028](https://github.com/Live-Hack-CVE/CVE-2022-26028) -### CVE-2022-26047 (2022-11-11) +### CVE-2022-26045 (2022-11-11) -Improper input validation for some Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may allow unauthenticated user to potentially enable denial of service via local access. +Improper buffer restrictions in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access. -- [Live-Hack-CVE/CVE-2022-26047](https://github.com/Live-Hack-CVE/CVE-2022-26047) +- [Live-Hack-CVE/CVE-2022-26045](https://github.com/Live-Hack-CVE/CVE-2022-26045) + +### CVE-2022-26079 (2022-11-11) + + +Improper conditions check in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2022-26079](https://github.com/Live-Hack-CVE/CVE-2022-26079) ### CVE-2022-26086 (2022-11-11) @@ -3773,6 +4131,22 @@ Uncontrolled search path element in the PresentMon software maintained by Intel( - [Live-Hack-CVE/CVE-2022-26086](https://github.com/Live-Hack-CVE/CVE-2022-26086) +### CVE-2022-26088 (2022-11-10) + + +An issue was discovered in BMC Remedy before 22.1. Email-based Incident Forwarding allows remote authenticated users to inject HTML (such as an SSRF payload) into the Activity Log by placing it in the To: field. This affects rendering that occurs upon a click in the "number of recipients" field. NOTE: the vendor's position is that "no real impact is demonstrated." + + +- [Live-Hack-CVE/CVE-2022-26088](https://github.com/Live-Hack-CVE/CVE-2022-26088) + +### CVE-2022-26122 (2022-11-02) + + +An insufficient verification of data authenticity vulnerability [CWE-345] in FortiClient, FortiMail and FortiOS AV engines version 6.2.168 and below and version 6.4.274 and below may allow an attacker to bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64. + + +- [Live-Hack-CVE/CVE-2022-26122](https://github.com/Live-Hack-CVE/CVE-2022-26122) + ### CVE-2022-26124 (2022-11-11) @@ -3894,14 +4268,6 @@ Suzuki Connect v1.0.15 allows attackers to tamper with displayed messages via sp - [nsbogam/CVE-2022-26269](https://github.com/nsbogam/CVE-2022-26269) -### CVE-2022-26280 (2022-03-28) - - -Libarchive v3.6.0 was discovered to contain an out-of-bounds read via the component zipx_lzma_alone_init. - - -- [Live-Hack-CVE/CVE-2022-26280](https://github.com/Live-Hack-CVE/CVE-2022-26280) - ### CVE-2022-26318 (2022-03-04) @@ -3920,21 +4286,29 @@ Insufficiently protected credentials in software in Intel(R) AMT SDK before vers - [Live-Hack-CVE/CVE-2022-26341](https://github.com/Live-Hack-CVE/CVE-2022-26341) -### CVE-2022-26498 (2022-04-15) +### CVE-2022-26367 (2022-11-11) -An issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it is possible to download files that are not certificates. These files could be much larger than what one would expect to download, leading to Resource Exhaustion. This is fixed in 16.25.2, 18.11.2, and 19.3.2. +Improper buffer restrictions in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-26498](https://github.com/Live-Hack-CVE/CVE-2022-26498) +- [Live-Hack-CVE/CVE-2022-26367](https://github.com/Live-Hack-CVE/CVE-2022-26367) -### CVE-2022-26499 (2022-04-15) +### CVE-2022-26369 (2022-11-11) -An SSRF issue was discovered in Asterisk through 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2. +Out-of-bounds read in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via adjacent access. -- [Live-Hack-CVE/CVE-2022-26499](https://github.com/Live-Hack-CVE/CVE-2022-26499) +- [Live-Hack-CVE/CVE-2022-26369](https://github.com/Live-Hack-CVE/CVE-2022-26369) + +### CVE-2022-26446 (2022-11-08) + + +In Modem 4G RRC, there is a possible system crash due to improper input validation. This could lead to remote denial of service, when concatenating improper SIB12 (CMAS message), with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00867883; Issue ID: ALPS07274118. + + +- [Live-Hack-CVE/CVE-2022-26446](https://github.com/Live-Hack-CVE/CVE-2022-26446) ### CVE-2022-26503 (2022-03-17) @@ -3952,6 +4326,22 @@ Improper authentication in the Intel(R) SDP Tool before version 3.0.0 may allow - [Live-Hack-CVE/CVE-2022-26508](https://github.com/Live-Hack-CVE/CVE-2022-26508) +### CVE-2022-26513 (2022-11-11) + + +Out-of-bounds write in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. + + +- [Live-Hack-CVE/CVE-2022-26513](https://github.com/Live-Hack-CVE/CVE-2022-26513) + +### CVE-2022-26520 (2022-03-07) + + +** DISPUTED ** In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the vendor's position is that there is no pgjdbc vulnerability; instead, it is a vulnerability for any application to use the pgjdbc driver with untrusted connection properties. + + +- [Live-Hack-CVE/CVE-2022-26520](https://github.com/Live-Hack-CVE/CVE-2022-26520) + ### CVE-2022-26629 (2022-03-24) @@ -3969,13 +4359,13 @@ Automatic Question Paper Generator v1.0 contains a Time-Based Blind SQL injectio - [Cyb3rR3ap3r/CVE-2022-26631](https://github.com/Cyb3rR3ap3r/CVE-2022-26631) -### CVE-2022-26651 (2022-04-15) +### CVE-2022-26704 (2022-05-26) -An issue was discovered in Asterisk through 19.x and Certified Asterisk through 16.8-cert13. The func_odbc module provides possibly inadequate escaping functionality for backslash characters in SQL queries, resulting in user-provided data creating a broken SQL query or possibly a SQL injection. This is fixed in 16.25.2, 18.11.2, and 19.3.2, and 16.8-cert14. +A validation issue existed in the handling of symlinks and was addressed with improved validation of symlinks. This issue is fixed in macOS Monterey 12.4. An app may be able to gain elevated privileges. -- [Live-Hack-CVE/CVE-2022-26651](https://github.com/Live-Hack-CVE/CVE-2022-26651) +- [Live-Hack-CVE/CVE-2022-26704](https://github.com/Live-Hack-CVE/CVE-2022-26704) ### CVE-2022-26717 (2022-11-01) @@ -3994,6 +4384,22 @@ This issue was addressed with improved checks. This issue is fixed in Security U - [acheong08/CVE-2022-26726-POC](https://github.com/acheong08/CVE-2022-26726-POC) +### CVE-2022-26730 (2022-11-01) + + +A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13. Processing a maliciously crafted image may lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2022-26730](https://github.com/Live-Hack-CVE/CVE-2022-26730) + +### CVE-2022-26744 (2022-05-26) + + +A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 15.5 and iPadOS 15.5. An application may be able to execute arbitrary code with kernel privileges. + + +- [Live-Hack-CVE/CVE-2022-26744](https://github.com/Live-Hack-CVE/CVE-2022-26744) + ### CVE-2022-26757 (2022-05-26) @@ -4025,14 +4431,6 @@ Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11 - [Live-Hack-CVE/CVE-2022-26845](https://github.com/Live-Hack-CVE/CVE-2022-26845) -### CVE-2022-26885 (2022-11-24) - - -When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher. - - -- [Live-Hack-CVE/CVE-2022-26885](https://github.com/Live-Hack-CVE/CVE-2022-26885) - ### CVE-2022-26923 (2022-05-10) @@ -4067,13 +4465,13 @@ EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfe - [Kenun99/CVE-batdappboomx](https://github.com/Kenun99/CVE-batdappboomx) -### CVE-2022-27201 (2022-03-15) +### CVE-2022-27187 (2022-11-11) -Jenkins Semantic Versioning Plugin 1.13 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. +Uncontrolled search path element in the Intel(R) Quartus Prime Standard edition software before version 21.1 Patch 0.02std may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-27201](https://github.com/Live-Hack-CVE/CVE-2022-27201) +- [Live-Hack-CVE/CVE-2022-27187](https://github.com/Live-Hack-CVE/CVE-2022-27187) ### CVE-2022-27226 (2022-03-18) @@ -4083,6 +4481,14 @@ A CSRF issue in /api/crontab on iRZ Mobile Routers through 2022-03-16 allows a t - [SakuraSamuraii/ez-iRZ](https://github.com/SakuraSamuraii/ez-iRZ) +### CVE-2022-27233 (2022-11-11) + + +XML injection in the Intel(R) Quartus Prime Pro and Standard edition software may allow an unauthenticated user to potentially enable information disclosure via network access. + + +- [Live-Hack-CVE/CVE-2022-27233](https://github.com/Live-Hack-CVE/CVE-2022-27233) + ### CVE-2022-27251 - [TheCyberGeek/CVE-2022-27251](https://github.com/TheCyberGeek/CVE-2022-27251) @@ -4094,6 +4500,14 @@ The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal - [nonamecoder/CVE-2022-27254](https://github.com/nonamecoder/CVE-2022-27254) +### CVE-2022-27380 (2022-04-12) + + +An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. + + +- [Live-Hack-CVE/CVE-2022-27380](https://github.com/Live-Hack-CVE/CVE-2022-27380) + ### CVE-2022-27413 (2022-05-03) @@ -4134,6 +4548,38 @@ Premature release of resource during expected lifetime in the Intel(R) SGX SDK s - [Live-Hack-CVE/CVE-2022-27499](https://github.com/Live-Hack-CVE/CVE-2022-27499) +### CVE-2022-27510 (2022-11-08) + + +Unauthorized access to Gateway user capabilities + + +- [Live-Hack-CVE/CVE-2022-27510](https://github.com/Live-Hack-CVE/CVE-2022-27510) + +### CVE-2022-27513 (2022-11-08) + + +Remote desktop takeover via phishing + + +- [Live-Hack-CVE/CVE-2022-27513](https://github.com/Live-Hack-CVE/CVE-2022-27513) + +### CVE-2022-27516 (2022-11-08) + + +User login brute force protection functionality bypass + + +- [Live-Hack-CVE/CVE-2022-27516](https://github.com/Live-Hack-CVE/CVE-2022-27516) + +### CVE-2022-27536 (2022-04-20) + + +Certificate.Verify in crypto/x509 in Go 1.18.x before 1.18.1 can be caused to panic on macOS when presented with certain malformed certificates. This allows a remote TLS server to cause a TLS client to panic. + + +- [Live-Hack-CVE/CVE-2022-27536](https://github.com/Live-Hack-CVE/CVE-2022-27536) + ### CVE-2022-27638 (2022-11-11) @@ -4142,13 +4588,13 @@ Uncontrolled search path element in the Intel(R) Advanced Link Analyzer Pro befo - [Live-Hack-CVE/CVE-2022-27638](https://github.com/Live-Hack-CVE/CVE-2022-27638) -### CVE-2022-27650 (2022-04-04) +### CVE-2022-27639 (2022-11-11) -A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. +Incomplete cleanup in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via adjacent access. -- [Live-Hack-CVE/CVE-2022-27650](https://github.com/Live-Hack-CVE/CVE-2022-27650) +- [Live-Hack-CVE/CVE-2022-27639](https://github.com/Live-Hack-CVE/CVE-2022-27639) ### CVE-2022-27666 (2022-03-23) @@ -4190,6 +4636,46 @@ Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2. - [Live-Hack-CVE/CVE-2022-27812](https://github.com/Live-Hack-CVE/CVE-2022-27812) +### CVE-2022-27855 (2022-11-08) + + +Cross-Site Request Forgery (CSRF) vulnerability in Fatcat Apps Analytics Cat plugin <= 1.0.9 on WordPress allows Plugin Settings Change. + + +- [Live-Hack-CVE/CVE-2022-27855](https://github.com/Live-Hack-CVE/CVE-2022-27855) + +### CVE-2022-27858 (2022-11-08) + + +CSV Injection vulnerability in Activity Log Team Activity Log <= 2.8.3 on WordPress. + + +- [Live-Hack-CVE/CVE-2022-27858](https://github.com/Live-Hack-CVE/CVE-2022-27858) + +### CVE-2022-27874 (2022-11-11) + + +Improper authentication in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access. + + +- [Live-Hack-CVE/CVE-2022-27874](https://github.com/Live-Hack-CVE/CVE-2022-27874) + +### CVE-2022-27893 (2022-11-04) + + +The Foundry Magritte plugin osisoft-pi-web-connector versions 0.15.0 - 0.43.0 was found to be logging in a manner that captured authentication requests. This vulnerability is resolved in osisoft-pi-web-connector version 0.44.0. + + +- [Live-Hack-CVE/CVE-2022-27893](https://github.com/Live-Hack-CVE/CVE-2022-27893) + +### CVE-2022-27894 (2022-11-04) + + +The Foundry Blobster service was found to have a cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Foundry to launch attacks against other users. This vulnerability is resolved in Blobster 3.228.0. + + +- [Live-Hack-CVE/CVE-2022-27894](https://github.com/Live-Hack-CVE/CVE-2022-27894) + ### CVE-2022-27895 (2022-11-15) @@ -4206,6 +4692,14 @@ Information Exposure Through Log Files vulnerability discovered in Foundry Code- - [Live-Hack-CVE/CVE-2022-27896](https://github.com/Live-Hack-CVE/CVE-2022-27896) +### CVE-2022-27914 (2022-11-08) + + +An issue was discovered in Joomla! 4.0.0 through 4.2.4. Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in com_media. + + +- [Live-Hack-CVE/CVE-2022-27914](https://github.com/Live-Hack-CVE/CVE-2022-27914) + ### CVE-2022-27927 (2022-04-19) @@ -4214,6 +4708,14 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when - [erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated) +### CVE-2022-27949 (2022-11-14) + + +A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in rendered template values for tasks which were not executed (for example when they were depending on past and previous instances of the task failed). This issue affects Apache Airflow prior to 2.3.1. + + +- [Live-Hack-CVE/CVE-2022-27949](https://github.com/Live-Hack-CVE/CVE-2022-27949) + ### CVE-2022-28077 (2022-05-11) @@ -4270,6 +4772,14 @@ SiteServer CMS v7.x allows attackers to execute arbitrary code via a crafted plu - [Richard-Tang/SSCMS-PluginShell](https://github.com/Richard-Tang/SSCMS-PluginShell) +### CVE-2022-28126 (2022-11-11) + + +Improper input validation in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2022-28126](https://github.com/Live-Hack-CVE/CVE-2022-28126) + ### CVE-2022-28132 - [alpernae/CVE-2022-28132](https://github.com/alpernae/CVE-2022-28132) @@ -4299,14 +4809,15 @@ An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 - [DeEpinGh0st/CVE-2022-28346](https://github.com/DeEpinGh0st/CVE-2022-28346) - [ahsentekdemir/CVE-2022-28346](https://github.com/ahsentekdemir/CVE-2022-28346) - [pthlong9991/CVE-2022-28346](https://github.com/pthlong9991/CVE-2022-28346) +- [Live-Hack-CVE/CVE-2022-28346](https://github.com/Live-Hack-CVE/CVE-2022-28346) -### CVE-2022-28389 (2022-04-03) +### CVE-2022-28347 (2022-04-12) -mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free. +A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name. -- [Live-Hack-CVE/CVE-2022-28389](https://github.com/Live-Hack-CVE/CVE-2022-28389) +- [Live-Hack-CVE/CVE-2022-28347](https://github.com/Live-Hack-CVE/CVE-2022-28347) ### CVE-2022-28452 (2022-04-29) @@ -4349,6 +4860,14 @@ A Two-Factor Authentication (2FA) bypass vulnerability in "Simple 2FA Plugi - [FlaviuPopescu/CVE-2022-28601](https://github.com/FlaviuPopescu/CVE-2022-28601) +### CVE-2022-28611 (2022-11-11) + + +Improper input validation in some Intel(R) XMM(TM) 7560 Modem software before version M2_7560_R_01.2146.00 may allow a privileged user to potentially enable escalation of privilege via physical access. + + +- [Live-Hack-CVE/CVE-2022-28611](https://github.com/Live-Hack-CVE/CVE-2022-28611) + ### CVE-2022-28667 (2022-11-11) @@ -4357,13 +4876,29 @@ Out-of-bounds write for some Intel(R) PROSet/Wireless WiFi software before versi - [Live-Hack-CVE/CVE-2022-28667](https://github.com/Live-Hack-CVE/CVE-2022-28667) -### CVE-2022-28738 (2022-05-09) +### CVE-2022-28689 (2022-11-09) -A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations. +A leftover debug code vulnerability exists in the console support functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-28738](https://github.com/Live-Hack-CVE/CVE-2022-28738) +- [Live-Hack-CVE/CVE-2022-28689](https://github.com/Live-Hack-CVE/CVE-2022-28689) + +### CVE-2022-28697 (2022-08-18) + + +Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access. + + +- [Live-Hack-CVE/CVE-2022-28697](https://github.com/Live-Hack-CVE/CVE-2022-28697) + +### CVE-2022-28739 (2022-05-09) + + +There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f. + + +- [Live-Hack-CVE/CVE-2022-28739](https://github.com/Live-Hack-CVE/CVE-2022-28739) ### CVE-2022-28764 (2022-11-14) @@ -4373,30 +4908,6 @@ The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) befor - [Live-Hack-CVE/CVE-2022-28764](https://github.com/Live-Hack-CVE/CVE-2022-28764) -### CVE-2022-28766 (2022-11-17) - - -Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client. - - -- [Live-Hack-CVE/CVE-2022-28766](https://github.com/Live-Hack-CVE/CVE-2022-28766) - -### CVE-2022-28768 (2022-11-17) - - -The Zoom Client for Meetings Installer for macOS (Standard and for IT Admin) before version 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to root. - - -- [Live-Hack-CVE/CVE-2022-28768](https://github.com/Live-Hack-CVE/CVE-2022-28768) - -### CVE-2022-28805 (2022-04-08) - - -singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code. - - -- [Live-Hack-CVE/CVE-2022-28805](https://github.com/Live-Hack-CVE/CVE-2022-28805) - ### CVE-2022-28892 (2022-04-28) @@ -4482,6 +4993,14 @@ Multiple SQL injection vulnerabilities via the username and password parameters - [tiktb8/CVE-2022-29072](https://github.com/tiktb8/CVE-2022-29072) - [sentinelblue/CVE-2022-29072](https://github.com/sentinelblue/CVE-2022-29072) +### CVE-2022-29078 (2022-04-25) + + +The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation). + + +- [Live-Hack-CVE/CVE-2022-29078](https://github.com/Live-Hack-CVE/CVE-2022-29078) + ### CVE-2022-29221 (2022-05-24) @@ -4490,46 +5009,6 @@ Smarty is a template engine for PHP, facilitating the separation of presentation - [sbani/CVE-2022-29221-PoC](https://github.com/sbani/CVE-2022-29221-PoC) -### CVE-2022-29275 (2022-11-15) - - -In UsbCoreDxe, untrusted input may allow SMRAM or OS memory tampering Use of untrusted pointers could allow OS or SMRAM memory tampering leading to escalation of privileges. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.21 Kernel 5.1: version 05.17.21 Kernel 5.2: version 05.27.21 Kernel 5.3: version 05.36.21 Kernel 5.4: version 05.44.21 Kernel 5.5: version 05.52.21 https://www.insyde.com/security-pledge/SA-2022058 - - -- [Live-Hack-CVE/CVE-2022-29275](https://github.com/Live-Hack-CVE/CVE-2022-29275) - -### CVE-2022-29276 (2022-11-15) - - -SMI functions in AhciBusDxe use untrusted inputs leading to corruption of SMRAM. SMI functions in AhciBusDxe use untrusted inputs leading to corruption of SMRAM. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.18 Kernel 5.1: version 05.17.18 Kernel 5.2: version 05.27.18 Kernel 5.3: version 05.36.18 Kernel 5.4: version 05.44.18 Kernel 5.5: version 05.52.18 https://www.insyde.com/security-pledge/SA-2022059 - - -- [Live-Hack-CVE/CVE-2022-29276](https://github.com/Live-Hack-CVE/CVE-2022-29276) - -### CVE-2022-29277 (2022-11-15) - - -Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060 - - -- [Live-Hack-CVE/CVE-2022-29277](https://github.com/Live-Hack-CVE/CVE-2022-29277) - -### CVE-2022-29278 (2022-11-15) - - -Incorrect pointer checks within the NvmExpressDxe driver can allow tampering with SMRAM and OS memory Incorrect pointer checks within the NvmExpressDxe driver can allow tampering with SMRAM and OS memory. This issue was discovered by Insyde during security review. Fixed in: Kernel 5.1: Version 05.17.23 Kernel 5.2: Version 05.27.23 Kernel 5.3: Version 05.36.23 Kernel 5.4: Version 05.44.23 Kernel 5.5: Version 05.52.23 https://www.insyde.com/security-pledge/SA-2022061 - - -- [Live-Hack-CVE/CVE-2022-29278](https://github.com/Live-Hack-CVE/CVE-2022-29278) - -### CVE-2022-29279 (2022-11-15) - - -Use of a untrusted pointer allows tampering with SMRAM and OS memory in SdHostDriver and SdMmcDevice Use of a untrusted pointer allows tampering with SMRAM and OS memory in SdHostDriver and SdMmcDevice. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.17 Kernel 5.1: version 05.17.17 Kernel 5.2: version 05.27.17 Kernel 5.3: version 05.36.17 Kernel 5.4: version 05.44.17 Kernel 5.5: version 05.52.17 https://www.insyde.com/security-pledge/SA-2022062 - - -- [Live-Hack-CVE/CVE-2022-29279](https://github.com/Live-Hack-CVE/CVE-2022-29279) - ### CVE-2022-29303 (2022-05-12) @@ -4572,6 +5051,14 @@ DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elem - [GULL2100/Wordpress_xss-CVE-2022-29455](https://github.com/GULL2100/Wordpress_xss-CVE-2022-29455) +### CVE-2022-29458 (2022-04-18) + + +ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library. + + +- [Live-Hack-CVE/CVE-2022-29458](https://github.com/Live-Hack-CVE/CVE-2022-29458) + ### CVE-2022-29464 (2022-04-18) @@ -4603,6 +5090,14 @@ Improper input validation in firmware for Intel(R) SPS before version SPS_E3_04. - [Live-Hack-CVE/CVE-2022-29466](https://github.com/Live-Hack-CVE/CVE-2022-29466) +### CVE-2022-29481 (2022-11-09) + + +A leftover debug code vulnerability exists in the console nvram functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-29481](https://github.com/Live-Hack-CVE/CVE-2022-29481) + ### CVE-2022-29486 (2022-11-11) @@ -4639,14 +5134,6 @@ A reflected XSS issue exists in the Management Console of several WSO2 products. ### CVE-2022-29554 - [ComparedArray/printix-CVE-2022-29554](https://github.com/ComparedArray/printix-CVE-2022-29554) -### CVE-2022-29581 (2022-05-17) - - -Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions. - - -- [nidhihcl/linux-4.19.72_CVE-2022-29581](https://github.com/nidhihcl/linux-4.19.72_CVE-2022-29581) - ### CVE-2022-29593 (2022-07-14) @@ -4654,6 +5141,7 @@ relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allow - [9lyph/CVE-2022-29593](https://github.com/9lyph/CVE-2022-29593) +- [Live-Hack-CVE/CVE-2022-29593](https://github.com/Live-Hack-CVE/CVE-2022-29593) ### CVE-2022-29597 (2022-06-02) @@ -4671,6 +5159,14 @@ Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to an re - [TheGetch/CVE-2022-29598](https://github.com/TheGetch/CVE-2022-29598) +### CVE-2022-29620 (2022-06-07) + + +** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability. + + +- [Live-Hack-CVE/CVE-2022-29620](https://github.com/Live-Hack-CVE/CVE-2022-29620) + ### CVE-2022-29622 (2022-05-16) @@ -4679,6 +5175,14 @@ An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to - [keymandll/CVE-2022-29622](https://github.com/keymandll/CVE-2022-29622) +### CVE-2022-29774 (2022-06-21) + + +iSpy v7.2.2.0 is vulnerable to remote command execution via path traversal. + + +- [Live-Hack-CVE/CVE-2022-29774](https://github.com/Live-Hack-CVE/CVE-2022-29774) + ### CVE-2022-29778 (2022-06-03) @@ -4687,77 +5191,21 @@ An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to - [TyeYeah/DIR-890L-1.20-RCE](https://github.com/TyeYeah/DIR-890L-1.20-RCE) -### CVE-2022-29825 (2022-11-24) +### CVE-2022-29824 (2022-05-02) -Use of Hard-coded Password vulnerability in Mitsubishi Electric GX Works3 all versions allows an unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally. +In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. -- [Live-Hack-CVE/CVE-2022-29825](https://github.com/Live-Hack-CVE/CVE-2022-29825) +- [Live-Hack-CVE/CVE-2022-29824](https://github.com/Live-Hack-CVE/CVE-2022-29824) -### CVE-2022-29826 (2022-11-24) +### CVE-2022-29836 (2022-11-09) -Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions 1.086Q and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally. +Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability was discovered via an HTTP API on Western Digital My Cloud Home; My Cloud Home Duo; and SanDisk ibi devices that could allow an attacker to abuse certain parameters to point to random locations on the file system. This could also allow the attacker to initiate the installation of custom packages at these locations. This can only be exploited once the attacker has been authenticated to the device. This issue affects: Western Digital My Cloud Home and My Cloud Home Duo versions prior to 8.11.0-113 on Linux; SanDisk ibi versions prior to 8.11.0-113 on Linux. -- [Live-Hack-CVE/CVE-2022-29826](https://github.com/Live-Hack-CVE/CVE-2022-29826) - -### CVE-2022-29827 (2022-11-24) - - -Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 all versions allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally. - - -- [Live-Hack-CVE/CVE-2022-29827](https://github.com/Live-Hack-CVE/CVE-2022-29827) - -### CVE-2022-29828 (2022-11-24) - - -Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 all versions allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthorized users may view or execute programs illegally. - - -- [Live-Hack-CVE/CVE-2022-29828](https://github.com/Live-Hack-CVE/CVE-2022-29828) - -### CVE-2022-29829 (2022-11-24) - - -Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 all versions allows a remote unauthenticated attacker to disclose sensitive information . As a result, unauthorized users may view or execute programs illegally. - - -- [Live-Hack-CVE/CVE-2022-29829](https://github.com/Live-Hack-CVE/CVE-2022-29829) - -### CVE-2022-29830 (2022-11-24) - - -Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 all versions allows a remote unauthenticated attacker to disclose or tamper with sensitive information. As a result, unauthorized users may obtain information about project files illegally. - - -- [Live-Hack-CVE/CVE-2022-29830](https://github.com/Live-Hack-CVE/CVE-2022-29830) - -### CVE-2022-29831 (2022-11-24) - - -Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthorized attacker to obtain information about the project file for MELSEC safety CPU modules. - - -- [Live-Hack-CVE/CVE-2022-29831](https://github.com/Live-Hack-CVE/CVE-2022-29831) - -### CVE-2022-29832 (2022-11-24) - - -Cleartext Storage of Sensitive Information in Memory vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthorized attacker to disclose sensitive information. As a result, unauthorized users could obtain information about the project file for MELSEC safety CPU modules. - - -- [Live-Hack-CVE/CVE-2022-29832](https://github.com/Live-Hack-CVE/CVE-2022-29832) - -### CVE-2022-29833 (2022-11-24) - - -Insufficiently Protected Credentials vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthorized attacker to disclose sensitive information. As a result, unauthorized users could access to MELSEC safety CPU modules illgally. - - -- [Live-Hack-CVE/CVE-2022-29833](https://github.com/Live-Hack-CVE/CVE-2022-29833) +- [Live-Hack-CVE/CVE-2022-29836](https://github.com/Live-Hack-CVE/CVE-2022-29836) ### CVE-2022-29885 (2022-05-12) @@ -4766,6 +5214,15 @@ The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 to 10.0.20 - [quynhlab/CVE-2022-29885](https://github.com/quynhlab/CVE-2022-29885) +- [Live-Hack-CVE/CVE-2022-29885](https://github.com/Live-Hack-CVE/CVE-2022-29885) + +### CVE-2022-29888 (2022-11-09) + + +A leftover debug code vulnerability exists in the httpd port 4444 upload.cgi functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted HTTP request can lead to arbitrary file deletion. An attacker can send an HTTP request to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-29888](https://github.com/Live-Hack-CVE/CVE-2022-29888) ### CVE-2022-29893 (2022-11-11) @@ -4775,13 +5232,13 @@ Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11 - [Live-Hack-CVE/CVE-2022-29893](https://github.com/Live-Hack-CVE/CVE-2022-29893) -### CVE-2022-29930 (2022-05-12) +### CVE-2022-29931 (2022-06-25) -SHA1 implementation in JetBrains Ktor Native 2.0.0 was returning the same value. The issue was fixed in Ktor version 2.0.1. +The administration interface of the Raytion Custom Security Manager (Raytion CSM) in Version 7.2.0 allows reflected Cross-site Scripting (XSS). -- [Live-Hack-CVE/CVE-2022-29930](https://github.com/Live-Hack-CVE/CVE-2022-29930) +- [Live-Hack-CVE/CVE-2022-29931](https://github.com/Live-Hack-CVE/CVE-2022-29931) ### CVE-2022-29932 (2022-05-11) @@ -4791,6 +5248,14 @@ The HTTP Server in PRIMEUR SPAZIO 2.5.1.954 (File Transfer) allows an unauthenti - [Off3nS3c/CVE-2022-29932](https://github.com/Off3nS3c/CVE-2022-29932) +### CVE-2022-29959 (2022-08-16) + + +Emerson OpenBSI through 2022-04-29 mishandles credential storage. It is an engineering environment for the ControlWave and Bristol Babcock line of RTUs. This environment provides access control functionality through user authentication and privilege management. The credentials for various users are stored insecurely in the SecUsers.ini file by using a simple string transformation rather than a cryptographic mechanism. + + +- [Live-Hack-CVE/CVE-2022-29959](https://github.com/Live-Hack-CVE/CVE-2022-29959) + ### CVE-2022-29968 (2022-05-02) @@ -4799,6 +5264,14 @@ An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in f - [jprx/CVE-2022-29968](https://github.com/jprx/CVE-2022-29968) +### CVE-2022-29970 (2022-05-02) + + +Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files. + + +- [Live-Hack-CVE/CVE-2022-29970](https://github.com/Live-Hack-CVE/CVE-2022-29970) + ### CVE-2022-30006 - [ComparedArray/printix-CVE-2022-30006](https://github.com/ComparedArray/printix-CVE-2022-30006) @@ -4902,38 +5375,6 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi - [ethicalblue/Follina-CVE-2022-30190-Sample](https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample) - [Gra3s/CVE-2022-30190-Follina-PowerPoint-Version](https://github.com/Gra3s/CVE-2022-30190-Follina-PowerPoint-Version) -### CVE-2022-30256 (2022-11-18) - - -An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. - - -- [Live-Hack-CVE/CVE-2022-30256](https://github.com/Live-Hack-CVE/CVE-2022-30256) - -### CVE-2022-30257 (2022-11-21) - - -An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. - - -- [Live-Hack-CVE/CVE-2022-30257](https://github.com/Live-Hack-CVE/CVE-2022-30257) - -### CVE-2022-30258 (2022-11-21) - - -An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V2 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. - - -- [Live-Hack-CVE/CVE-2022-30258](https://github.com/Live-Hack-CVE/CVE-2022-30258) - -### CVE-2022-30283 (2022-11-15) - - -In UsbCoreDxe, tampering with the contents of the USB working buffer using DMA while certain USB transactions are in process leads to a TOCTOU problem that could be used by an attacker to cause SMRAM corruption and escalation of privileges The UsbCoreDxe module creates a working buffer for USB transactions outside of SMRAM. The code which uses can be inside of SMM, making the working buffer untrusted input. The buffer can be corrupted by DMA transfers. The SMM code code attempts to sanitize pointers to ensure all pointers refer to the working buffer, but when a pointer is not found in the list of pointers to sanitize, the current action is not aborted, leading to undefined behavior. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in: Kernel 5.0: Version 05.09. 21 Kernel 5.1: Version 05.17.21 Kernel 5.2: Version 05.27.21 Kernel 5.3: Version 05.36.21 Kernel 5.4: Version 05.44.21 Kernel 5.5: Version 05.52.21 https://www.insyde.com/security-pledge/SA-2022063 - - -- [Live-Hack-CVE/CVE-2022-30283](https://github.com/Live-Hack-CVE/CVE-2022-30283) - ### CVE-2022-30292 (2022-05-04) @@ -4950,29 +5391,13 @@ Cross-site scripting in the Intel(R) EMA software before version 1.8.0 may allow - [Live-Hack-CVE/CVE-2022-30297](https://github.com/Live-Hack-CVE/CVE-2022-30297) -### CVE-2022-30321 (2022-05-25) +### CVE-2022-30331 (2022-09-05) -go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go-getter path traversal, symlink processing, and command injection flaws. Fixed in 1.6.1 and 2.1.0. +** DISPUTED ** The User-Defined Functions (UDF) feature in TigerGraph 3.6.0 allows installation of a query (in the GSQL query language) without proper validation. Consequently, an attacker can execute arbitrary C++ code. NOTE: the vendor's position is "GSQL was behaving as expected." -- [Live-Hack-CVE/CVE-2022-30321](https://github.com/Live-Hack-CVE/CVE-2022-30321) - -### CVE-2022-30322 (2022-05-25) - - -go-getter up to 1.5.11 and 2.0.2 allowed asymmetric resource exhaustion when go-getter processed malicious HTTP responses. Fixed in 1.6.1 and 2.1.0. - - -- [Live-Hack-CVE/CVE-2022-30322](https://github.com/Live-Hack-CVE/CVE-2022-30322) - -### CVE-2022-30323 (2022-05-25) - - -go-getter up to 1.5.11 and 2.0.2 panicked when processing password-protected ZIP files. Fixed in 1.6.1 and 2.1.0. - - -- [Live-Hack-CVE/CVE-2022-30323](https://github.com/Live-Hack-CVE/CVE-2022-30323) +- [Live-Hack-CVE/CVE-2022-30331](https://github.com/Live-Hack-CVE/CVE-2022-30331) ### CVE-2022-30459 (2022-05-24) @@ -5039,6 +5464,14 @@ School Dormitory Management System v1.0 is vulnerable to reflected cross-site sc - [bigzooooz/CVE-2022-30514](https://github.com/bigzooooz/CVE-2022-30514) +### CVE-2022-30515 (2022-11-08) + + +ZKTeco BioTime 8.5.4 is missing authentication on folders containing employee photos, allowing an attacker to view them through filename enumeration. + + +- [Live-Hack-CVE/CVE-2022-30515](https://github.com/Live-Hack-CVE/CVE-2022-30515) + ### CVE-2022-30525 (2022-05-12) @@ -5060,14 +5493,6 @@ A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) - [furkanzengin/CVE-2022-30525](https://github.com/furkanzengin/CVE-2022-30525) - [ProngedFork/CVE-2022-30525](https://github.com/ProngedFork/CVE-2022-30525) -### CVE-2022-30529 (2022-11-21) - - -File upload vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to upload arbitrary files via /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php. - - -- [Live-Hack-CVE/CVE-2022-30529](https://github.com/Live-Hack-CVE/CVE-2022-30529) - ### CVE-2022-30542 (2022-11-11) @@ -5076,6 +5501,22 @@ Improper input validation in the firmware for some Intel(R) Server Board S2600WF - [Live-Hack-CVE/CVE-2022-30542](https://github.com/Live-Hack-CVE/CVE-2022-30542) +### CVE-2022-30543 (2022-11-09) + + +A leftover debug code vulnerability exists in the console infct functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to execution of privileged operations. An attacker can send a sequence of requests to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-30543](https://github.com/Live-Hack-CVE/CVE-2022-30543) + +### CVE-2022-30545 (2022-11-08) + + +Auth. Reflected Cross-Site Scripting (XSS) vulnerability in 5 Anker Connect plugin <= 1.2.6 on WordPress. + + +- [Live-Hack-CVE/CVE-2022-30545](https://github.com/Live-Hack-CVE/CVE-2022-30545) + ### CVE-2022-30548 (2022-11-11) @@ -5092,6 +5533,30 @@ Uncontrolled search path element in the Intel(R) Glorp software may allow an aut - [efchatz/QUIC-attacks](https://github.com/efchatz/QUIC-attacks) +### CVE-2022-30608 (2022-11-03) + + +"IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a "user that the website trusts. IBM X-Force ID: 227295. + + +- [Live-Hack-CVE/CVE-2022-30608](https://github.com/Live-Hack-CVE/CVE-2022-30608) + +### CVE-2022-30615 (2022-11-03) + + +"IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227592. + + +- [Live-Hack-CVE/CVE-2022-30615](https://github.com/Live-Hack-CVE/CVE-2022-30615) + +### CVE-2022-30674 (2022-09-16) + + +Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. + + +- [Live-Hack-CVE/CVE-2022-30674](https://github.com/Live-Hack-CVE/CVE-2022-30674) + ### CVE-2022-30691 (2022-11-11) @@ -5116,22 +5581,6 @@ Session fixation exists in ZoneMinder through 1.36.12 as an attacker can poison - [Live-Hack-CVE/CVE-2022-30769](https://github.com/Live-Hack-CVE/CVE-2022-30769) -### CVE-2022-30771 (2022-11-15) - - -Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions. This issue was discovered by Insyde engineering during a security review. Fixed in: Kernel 5.1: Version 05.17.25 Kernel 5.2: Version 05.27.25 Kernel 5.3: Version 05.36.25 Kernel 5.4: Version 05.44.25 Kernel 5.5: Version 05.52.25 https://www.insyde.com/security-pledge/SA-2022064 - - -- [Live-Hack-CVE/CVE-2022-30771](https://github.com/Live-Hack-CVE/CVE-2022-30771) - -### CVE-2022-30772 (2022-11-15) - - -Manipulation of the input address in PnpSmm function 0x52 could be used by malware to overwrite SMRAM or OS kernel memory. Function 0x52 of the PnpSmm driver is passed the address and size of data to write into the SMBIOS table, but manipulation of the address could be used by malware to overwrite SMRAM or OS kernel memory. This issue was discovered by Insyde engineering during a security review. This issue is fixed in: Kernel 5.0: 05.09.41 Kernel 5.1: 05.17.43 Kernel 5.2: 05.27.30 Kernel 5.3: 05.36.30 Kernel 5.4: 05.44.30 Kernel 5.5: 05.52.30 https://www.insyde.com/security-pledge/SA-2022065 - - -- [Live-Hack-CVE/CVE-2022-30772](https://github.com/Live-Hack-CVE/CVE-2022-30772) - ### CVE-2022-30773 (2022-11-14) @@ -5176,29 +5625,85 @@ Dolibarr 12.0.5 is vulnerable to Cross Site Scripting (XSS) via Sql Error Page. - [Live-Hack-CVE/CVE-2022-30875](https://github.com/Live-Hack-CVE/CVE-2022-30875) -### CVE-2022-31030 (2022-06-06) +### CVE-2022-30945 (2022-05-17) -containerd is an open source container runtime. A bug was found in the containerd's CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd's CRI implementation; `ExecSync` may be used when running probes or when executing processes via an "exec" facility. This bug has been fixed in containerd 1.6.6 and 1.5.13. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used. +Jenkins Pipeline: Groovy Plugin 2689.v434009a_31b_f1 and earlier allows loading any Groovy source files on the classpath of Jenkins and Jenkins plugins in sandboxed pipelines. -- [Live-Hack-CVE/CVE-2022-31030](https://github.com/Live-Hack-CVE/CVE-2022-31030) +- [Live-Hack-CVE/CVE-2022-30945](https://github.com/Live-Hack-CVE/CVE-2022-30945) -### CVE-2022-31033 (2022-06-09) +### CVE-2022-30952 (2022-05-17) -The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue. +Jenkins Pipeline SCM API for Blue Ocean Plugin 1.25.3 and earlier allows attackers with Job/Configure permission to access credentials with attacker-specified IDs stored in the private per-user credentials stores of any attacker-specified user in Jenkins. -- [Live-Hack-CVE/CVE-2022-31033](https://github.com/Live-Hack-CVE/CVE-2022-31033) +- [Live-Hack-CVE/CVE-2022-30952](https://github.com/Live-Hack-CVE/CVE-2022-30952) -### CVE-2022-31097 (2022-07-15) +### CVE-2022-31001 (2022-05-31) -Grafana is an open-source platform for monitoring and observability. Versions on the 8.x and 9.x branch prior to 9.0.3, 8.5.9, 8.4.10, and 8.3.10 are vulnerable to stored cross-site scripting via the Unified Alerting feature of Grafana. An attacker can exploit this vulnerability to escalate privilege from editor to admin by tricking an authenticated admin to click on a link. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch. As a workaround, it is possible to disable alerting or use legacy alerting. +Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when `IS_NON_WS(s[n])`. Version 1.13.8 contains a patch for this issue. -- [Live-Hack-CVE/CVE-2022-31097](https://github.com/Live-Hack-CVE/CVE-2022-31097) +- [Live-Hack-CVE/CVE-2022-31001](https://github.com/Live-Hack-CVE/CVE-2022-31001) + +### CVE-2022-31002 (2022-05-31) + + +Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue. + + +- [Live-Hack-CVE/CVE-2022-31002](https://github.com/Live-Hack-CVE/CVE-2022-31002) + +### CVE-2022-31008 (2022-10-06) + + +RabbitMQ is a multi-protocol messaging and streaming broker. In affected versions the shovel and federation plugins perform URI obfuscation in their worker (link) state. The encryption key used to encrypt the URI was seeded with a predictable secret. This means that in case of certain exceptions related to Shovel and Federation plugins, reasonably easily deobfuscatable data could appear in the node log. Patched versions correctly use a cluster-wide secret for that purpose. This issue has been addressed and Patched versions: `3.10.2`, `3.9.18`, `3.8.32` are available. Users unable to upgrade should disable the Shovel and Federation plugins. + + +- [Live-Hack-CVE/CVE-2022-31008](https://github.com/Live-Hack-CVE/CVE-2022-31008) + +### CVE-2022-31031 (2022-06-07) + + +PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue. + + +- [Live-Hack-CVE/CVE-2022-31031](https://github.com/Live-Hack-CVE/CVE-2022-31031) + +### CVE-2022-31116 (2022-07-05) + + +UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. From version 5.4.0, UltraJSON decodes lone surrogates in the same way as the standard library's `json` module does, preserving them in the parsed output. Users are advised to upgrade. There are no known workarounds for this issue. + + +- [Live-Hack-CVE/CVE-2022-31116](https://github.com/Live-Hack-CVE/CVE-2022-31116) + +### CVE-2022-31117 (2022-07-05) + + +UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workarounds for this issue. + + +- [Live-Hack-CVE/CVE-2022-31117](https://github.com/Live-Hack-CVE/CVE-2022-31117) + +### CVE-2022-31137 (2022-07-08) + + +Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-31137](https://github.com/Live-Hack-CVE/CVE-2022-31137) + +### CVE-2022-31199 (2022-11-07) + + +Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors. + + +- [Live-Hack-CVE/CVE-2022-31199](https://github.com/Live-Hack-CVE/CVE-2022-31199) ### CVE-2022-31243 (2022-11-14) @@ -5216,6 +5721,38 @@ mailcow before 2022-05d allows a remote authenticated user to inject OS commands - [ly1g3/Mailcow-CVE-2022-31245](https://github.com/ly1g3/Mailcow-CVE-2022-31245) +### CVE-2022-31250 (2022-07-20) + + +A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1. + + +- [Live-Hack-CVE/CVE-2022-31250](https://github.com/Live-Hack-CVE/CVE-2022-31250) + +### CVE-2022-31252 (2022-10-06) + + +A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location included in the path to a privileged binary to influence path resolution. This issue affects: SUSE Linux Enterprise Server 12-SP5 permissions versions prior to 20170707. openSUSE Leap 15.3 permissions versions prior to 20200127. openSUSE Leap 15.4 permissions versions prior to 20201225. openSUSE Leap Micro 5.2 permissions versions prior to 20181225. + + +- [Live-Hack-CVE/CVE-2022-31252](https://github.com/Live-Hack-CVE/CVE-2022-31252) + +### CVE-2022-31253 (2022-11-09) + + +A Untrusted Search Path vulnerability in openldap2 of openSUSE Factory allows local attackers with control of the ldap user or group to change ownership of arbitrary directory entries to this user/group, leading to escalation to root. This issue affects: openSUSE Factory openldap2 versions prior to 2.6.3-404.1. + + +- [Live-Hack-CVE/CVE-2022-31253](https://github.com/Live-Hack-CVE/CVE-2022-31253) + +### CVE-2022-31255 (2022-11-10) + + +An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomcat. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10. + + +- [Live-Hack-CVE/CVE-2022-31255](https://github.com/Live-Hack-CVE/CVE-2022-31255) + ### CVE-2022-31294 (2022-06-16) @@ -5275,14 +5812,6 @@ Haraj v3.7 was discovered to contain a stored cross-site scripting (XSS) vulnera - [bigzooooz/CVE-2022-31301](https://github.com/bigzooooz/CVE-2022-31301) -### CVE-2022-31325 (2022-06-08) - - -There is a SQL Injection vulnerability in ChurchCRM 4.4.5 via the 'PersonID' field in /churchcrm/WhyCameEditor.php. - - -- [Live-Hack-CVE/CVE-2022-31325](https://github.com/Live-Hack-CVE/CVE-2022-31325) - ### CVE-2022-31402 (2022-06-10) @@ -5299,120 +5828,112 @@ ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability - [IbrahimEkimIsik/CVE-2022-31403](https://github.com/IbrahimEkimIsik/CVE-2022-31403) -### CVE-2022-31606 (2022-11-18) +### CVE-2022-31500 (2022-05-31) -NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a failure to properly validate data might allow an attacker with basic user capabilities to cause an out-of-bounds access in kernel mode, which could lead to denial of service, information disclosure, escalation of privileges, or data tampering. +In KNIME Analytics Platform below 4.6.0, the Windows installer sets improper filesystem permissions. -- [Live-Hack-CVE/CVE-2022-31606](https://github.com/Live-Hack-CVE/CVE-2022-31606) +- [Live-Hack-CVE/CVE-2022-31500](https://github.com/Live-Hack-CVE/CVE-2022-31500) -### CVE-2022-31607 (2022-11-18) +### CVE-2022-31621 (2022-05-25) -NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where a local user with basic capabilities can cause improper input validation, which may lead to denial of service, escalation of privileges, data tampering, and limited information disclosure. +MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. -- [Live-Hack-CVE/CVE-2022-31607](https://github.com/Live-Hack-CVE/CVE-2022-31607) +- [Live-Hack-CVE/CVE-2022-31621](https://github.com/Live-Hack-CVE/CVE-2022-31621) -### CVE-2022-31608 (2022-11-18) +### CVE-2022-31622 (2022-05-25) -NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. +MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. -- [Live-Hack-CVE/CVE-2022-31608](https://github.com/Live-Hack-CVE/CVE-2022-31608) +- [Live-Hack-CVE/CVE-2022-31622](https://github.com/Live-Hack-CVE/CVE-2022-31622) -### CVE-2022-31610 (2022-11-18) +### CVE-2022-31623 (2022-05-25) -NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds write, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. +MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. -- [Live-Hack-CVE/CVE-2022-31610](https://github.com/Live-Hack-CVE/CVE-2022-31610) +- [Live-Hack-CVE/CVE-2022-31623](https://github.com/Live-Hack-CVE/CVE-2022-31623) -### CVE-2022-31612 (2022-11-18) +### CVE-2022-31624 (2022-05-25) -NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to a system crash or a leak of internal kernel information. +MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock. -- [Live-Hack-CVE/CVE-2022-31612](https://github.com/Live-Hack-CVE/CVE-2022-31612) +- [Live-Hack-CVE/CVE-2022-31624](https://github.com/Live-Hack-CVE/CVE-2022-31624) -### CVE-2022-31613 (2022-11-18) +### CVE-2022-31676 (2022-08-23) -NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where any local user can cause a null-pointer dereference, which may lead to a kernel panic. +VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine. -- [Live-Hack-CVE/CVE-2022-31613](https://github.com/Live-Hack-CVE/CVE-2022-31613) +- [Live-Hack-CVE/CVE-2022-31676](https://github.com/Live-Hack-CVE/CVE-2022-31676) -### CVE-2022-31615 (2022-11-18) +### CVE-2022-31685 (2022-11-09) -NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service. +VMware Workspace ONE Assist prior to 22.10 contains an Authentication Bypass vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application. -- [Live-Hack-CVE/CVE-2022-31615](https://github.com/Live-Hack-CVE/CVE-2022-31615) +- [Live-Hack-CVE/CVE-2022-31685](https://github.com/Live-Hack-CVE/CVE-2022-31685) -### CVE-2022-31616 (2022-11-18) +### CVE-2022-31686 (2022-11-09) -NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape, where a local user with basic capabilities can cause an out-of-bounds read, which may lead to denial of service, or information disclosure. +VMware Workspace ONE Assist prior to 22.10 contains a Broken Authentication Method vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application. -- [Live-Hack-CVE/CVE-2022-31616](https://github.com/Live-Hack-CVE/CVE-2022-31616) +- [Live-Hack-CVE/CVE-2022-31686](https://github.com/Live-Hack-CVE/CVE-2022-31686) -### CVE-2022-31617 (2022-11-18) +### CVE-2022-31687 (2022-11-09) -NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys), where a local user with basic capabilities can cause an out-of-bounds read, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. +VMware Workspace ONE Assist prior to 22.10 contains a Broken Access Control vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application. -- [Live-Hack-CVE/CVE-2022-31617](https://github.com/Live-Hack-CVE/CVE-2022-31617) +- [Live-Hack-CVE/CVE-2022-31687](https://github.com/Live-Hack-CVE/CVE-2022-31687) -### CVE-2022-31630 (2022-11-14) +### CVE-2022-31688 (2022-11-09) -In PHP versions prior to 7.4.33, 8.0.25 and 8.2.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. +VMware Workspace ONE Assist prior to 22.10 contains a Reflected cross-site scripting (XSS) vulnerability. Due to improper user input sanitization, a malicious actor with some user interaction may be able to inject javascript code in the target user's window. -- [Live-Hack-CVE/CVE-2022-31630](https://github.com/Live-Hack-CVE/CVE-2022-31630) +- [Live-Hack-CVE/CVE-2022-31688](https://github.com/Live-Hack-CVE/CVE-2022-31688) -### CVE-2022-31649 (2022-06-08) +### CVE-2022-31689 (2022-11-09) -ownCloud owncloud/core before 10.10.0 Improperly Removes Sensitive Information Before Storage or Transfer. +VMware Workspace ONE Assist prior to 22.10 contains a Session fixation vulnerability. A malicious actor who obtains a valid session token may be able to authenticate to the application using that token. -- [Live-Hack-CVE/CVE-2022-31649](https://github.com/Live-Hack-CVE/CVE-2022-31649) +- [Live-Hack-CVE/CVE-2022-31689](https://github.com/Live-Hack-CVE/CVE-2022-31689) -### CVE-2022-31694 (2022-11-18) +### CVE-2022-31691 (2022-11-04) -InstallBuilder Qt installers built with versions previous to 22.10 try to load DLLs from the installer binary parent directory when displaying popups. This may allow an attacker to plant a malicious DLL in the installer parent directory to allow executing code with the privileges of the installer (when the popup triggers the loading of the library). Exploiting these type of vulnerabilities generally require that an attacker has access to a vulnerable machine to plant the malicious DLL. +Spring Tools 4 for Eclipse version 4.16.0 and below as well as VSCode extensions such as Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor and Cloudfoundry Manifest YML Support version 1.39.0 and below all use Snakeyaml library for YAML editing support. This library allows for some special syntax in the YAML that under certain circumstances allows for potentially harmful remote code execution by the attacker. -- [Live-Hack-CVE/CVE-2022-31694](https://github.com/Live-Hack-CVE/CVE-2022-31694) +- [Live-Hack-CVE/CVE-2022-31691](https://github.com/Live-Hack-CVE/CVE-2022-31691) ### CVE-2022-31749 - [jbaines-r7/hook](https://github.com/jbaines-r7/hook) -### CVE-2022-31777 (2022-11-01) +### CVE-2022-31772 (2022-11-11) -A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI. +IBM MQ 8.0, 9.0 LTS, 9.1 CD, 9.1 LTS, 9.2 CD, and 9.2 LTS could allow an authenticated and authorized user to cause a denial of service to the MQTT channels. IBM X-Force ID: 228335. -- [Live-Hack-CVE/CVE-2022-31777](https://github.com/Live-Hack-CVE/CVE-2022-31777) - -### CVE-2022-31877 (2022-11-28) - - -An issue in the component MSI.TerminalServer.exe of MSI Center v1.0.41.0 allows attackers to escalate privileges via a crafted TCP packet. - - -- [Live-Hack-CVE/CVE-2022-31877](https://github.com/Live-Hack-CVE/CVE-2022-31877) +- [Live-Hack-CVE/CVE-2022-31772](https://github.com/Live-Hack-CVE/CVE-2022-31772) ### CVE-2022-31983 (2022-06-01) @@ -5430,14 +5951,6 @@ Complete Online Job Search System v1.0 is vulnerable to SQL Injection via eris/a - [heavenswill/CVE-2022-32013](https://github.com/heavenswill/CVE-2022-32013) -### CVE-2022-32060 (2022-07-07) - - -An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file. - - -- [Live-Hack-CVE/CVE-2022-32060](https://github.com/Live-Hack-CVE/CVE-2022-32060) - ### CVE-2022-32114 (2022-07-13) @@ -5462,37 +5975,53 @@ Arox School ERP Pro v1.0 was discovered to contain multiple arbitrary file uploa - [JC175/CVE-2022-32119](https://github.com/JC175/CVE-2022-32119) -### CVE-2022-32212 (2022-07-14) +### CVE-2022-32156 (2022-06-15) -A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.16.0, <18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks. +In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configure TLS host name validation for the Splunk CLI https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/EnableTLSCertHostnameValidation#Configure_TLS_host_name_validation_for_the_Splunk_CLI to enable the remediation. The vulnerability does not affect the Splunk Cloud Platform. At the time of publishing, we have no evidence of exploitation of this vulnerability by external parties. The issue requires conditions beyond the control of a potential bad actor such as a machine-in-the-middle attack. Hence, Splunk rates the complexity of the attack as High. -- [Live-Hack-CVE/CVE-2022-32212](https://github.com/Live-Hack-CVE/CVE-2022-32212) +- [Live-Hack-CVE/CVE-2022-32156](https://github.com/Live-Hack-CVE/CVE-2022-32156) -### CVE-2022-32213 (2022-07-14) +### CVE-2022-32166 (2022-09-28) -The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS). +In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. -- [Live-Hack-CVE/CVE-2022-32213](https://github.com/Live-Hack-CVE/CVE-2022-32213) +- [Live-Hack-CVE/CVE-2022-32166](https://github.com/Live-Hack-CVE/CVE-2022-32166) -### CVE-2022-32214 (2022-07-14) +### CVE-2022-32171 (2022-10-06) -The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). +In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete user functionality. When an authenticated user deletes a user having a XSS payload in the user id field, the javascript payload will be executed and allow an attacker to access the user’s credentials. -- [Live-Hack-CVE/CVE-2022-32214](https://github.com/Live-Hack-CVE/CVE-2022-32214) +- [Live-Hack-CVE/CVE-2022-32171](https://github.com/Live-Hack-CVE/CVE-2022-32171) -### CVE-2022-32215 (2022-07-14) +### CVE-2022-32172 (2022-10-06) -The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS). +In Zinc, versions v0.1.9 through v0.3.1 are vulnerable to Stored Cross-Site Scripting when using the delete template functionality. When an authenticated user deletes a template with a XSS payload in the name field, the Javascript payload will be executed and allow an attacker to access the user’s credentials. -- [Live-Hack-CVE/CVE-2022-32215](https://github.com/Live-Hack-CVE/CVE-2022-32215) +- [Live-Hack-CVE/CVE-2022-32172](https://github.com/Live-Hack-CVE/CVE-2022-32172) + +### CVE-2022-32177 (2022-10-14) + + +In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover. + + +- [Live-Hack-CVE/CVE-2022-32177](https://github.com/Live-Hack-CVE/CVE-2022-32177) + +### CVE-2022-32190 (2022-09-13) + + +JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result. + + +- [Live-Hack-CVE/CVE-2022-32190](https://github.com/Live-Hack-CVE/CVE-2022-32190) ### CVE-2022-32266 (2022-11-14) @@ -5510,13 +6039,21 @@ DMA transactions which are targeted at input buffers used for the SmmResourceChe - [Live-Hack-CVE/CVE-2022-32267](https://github.com/Live-Hack-CVE/CVE-2022-32267) -### CVE-2022-32511 (2022-06-06) +### CVE-2022-32268 (2022-06-03) -jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable. +StarWind SAN and NAS v0.2 build 1914 allow remote code execution. A flaw was found in REST API in StarWind Stack. REST command, which allows changing the hostname, doesn’t check a new hostname parameter. It goes directly to bash as part of a script. An attacker with non-root user access can inject arbitrary data into the command that will be executed with root privileges. -- [Live-Hack-CVE/CVE-2022-32511](https://github.com/Live-Hack-CVE/CVE-2022-32511) +- [Live-Hack-CVE/CVE-2022-32268](https://github.com/Live-Hack-CVE/CVE-2022-32268) + +### CVE-2022-32287 (2022-11-03) + + +A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR files should never be installed into an UIMA installation from untrusted sources because PEAR archives are executable plugins that will be able to perform any actions with the same privileges as the host Java Virtual Machine. + + +- [Live-Hack-CVE/CVE-2022-32287](https://github.com/Live-Hack-CVE/CVE-2022-32287) ### CVE-2022-32532 (2022-06-28) @@ -5526,45 +6063,221 @@ Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypa - [Lay0us1/CVE-2022-32532](https://github.com/Lay0us1/CVE-2022-32532) -### CVE-2022-32774 (2022-11-21) +### CVE-2022-32569 (2022-11-11) -A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely deleting objects associated with pages, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. +Improper buffer restrictions in BIOS firmware for some Intel(R) NUC M15 Laptop Kits before version BCTGL357.0074 may allow a privileged user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-32774](https://github.com/Live-Hack-CVE/CVE-2022-32774) +- [Live-Hack-CVE/CVE-2022-32569](https://github.com/Live-Hack-CVE/CVE-2022-32569) -### CVE-2022-32827 (2022-11-01) +### CVE-2022-32587 (2022-11-08) -A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 16, macOS Ventura 13. An app may be able to cause a denial-of-service. +Cross-Site Request Forgery (CSRF) vulnerability in CodeAndMore WP Page Widget plugin <= 3.9 on WordPress leading to plugin settings change. -- [Live-Hack-CVE/CVE-2022-32827](https://github.com/Live-Hack-CVE/CVE-2022-32827) +- [Live-Hack-CVE/CVE-2022-32587](https://github.com/Live-Hack-CVE/CVE-2022-32587) -### CVE-2022-32907 (2022-11-01) +### CVE-2022-32588 (2022-11-09) -This issue was addressed with improved checks. This issue is fixed in tvOS 16, iOS 16, watchOS 9. An app may be able to execute arbitrary code with kernel privileges. +An out-of-bounds write vulnerability exists in the PICT parsing pctwread_14841 functionality of Accusoft ImageGear 20.0. A specially-crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. -- [Live-Hack-CVE/CVE-2022-32907](https://github.com/Live-Hack-CVE/CVE-2022-32907) +- [Live-Hack-CVE/CVE-2022-32588](https://github.com/Live-Hack-CVE/CVE-2022-32588) -### CVE-2022-32966 (2022-11-28) +### CVE-2022-32601 (2022-11-08) -RTL8168FP-CG Dash remote management function has missing authorization. An unauthenticated attacker within the adjacent network can connect to DASH service port to disrupt service. +In telephony, there is a possible permission bypass due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319132; Issue ID: ALPS07319132. -- [Live-Hack-CVE/CVE-2022-32966](https://github.com/Live-Hack-CVE/CVE-2022-32966) +- [Live-Hack-CVE/CVE-2022-32601](https://github.com/Live-Hack-CVE/CVE-2022-32601) -### CVE-2022-32967 (2022-11-28) +### CVE-2022-32602 (2022-11-08) -RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information. +In keyinstall, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388790; Issue ID: ALPS07388790. -- [Live-Hack-CVE/CVE-2022-32967](https://github.com/Live-Hack-CVE/CVE-2022-32967) +- [Live-Hack-CVE/CVE-2022-32602](https://github.com/Live-Hack-CVE/CVE-2022-32602) + +### CVE-2022-32603 (2022-11-08) + + +In gpu drm, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310704; Issue ID: ALPS07310704. + + +- [Live-Hack-CVE/CVE-2022-32603](https://github.com/Live-Hack-CVE/CVE-2022-32603) + +### CVE-2022-32605 (2022-11-08) + + +In isp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07213898; Issue ID: ALPS07213898. + + +- [Live-Hack-CVE/CVE-2022-32605](https://github.com/Live-Hack-CVE/CVE-2022-32605) + +### CVE-2022-32607 (2022-11-08) + + +In aee, there is a possible use after free due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07202891; Issue ID: ALPS07202891. + + +- [Live-Hack-CVE/CVE-2022-32607](https://github.com/Live-Hack-CVE/CVE-2022-32607) + +### CVE-2022-32608 (2022-11-08) + + +In jpeg, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07388753; Issue ID: ALPS07388753. + + +- [Live-Hack-CVE/CVE-2022-32608](https://github.com/Live-Hack-CVE/CVE-2022-32608) + +### CVE-2022-32609 (2022-11-08) + + +In vcu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203410; Issue ID: ALPS07203410. + + +- [Live-Hack-CVE/CVE-2022-32609](https://github.com/Live-Hack-CVE/CVE-2022-32609) + +### CVE-2022-32610 (2022-11-08) + + +In vcu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203476; Issue ID: ALPS07203476. + + +- [Live-Hack-CVE/CVE-2022-32610](https://github.com/Live-Hack-CVE/CVE-2022-32610) + +### CVE-2022-32611 (2022-11-08) + + +In isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07340373; Issue ID: ALPS07340373. + + +- [Live-Hack-CVE/CVE-2022-32611](https://github.com/Live-Hack-CVE/CVE-2022-32611) + +### CVE-2022-32612 (2022-11-08) + + +In vcu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203500; Issue ID: ALPS07203500. + + +- [Live-Hack-CVE/CVE-2022-32612](https://github.com/Live-Hack-CVE/CVE-2022-32612) + +### CVE-2022-32613 (2022-11-08) + + +In vcu, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07206340; Issue ID: ALPS07206340. + + +- [Live-Hack-CVE/CVE-2022-32613](https://github.com/Live-Hack-CVE/CVE-2022-32613) + +### CVE-2022-32614 (2022-11-08) + + +In audio, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310571; Issue ID: ALPS07310571. + + +- [Live-Hack-CVE/CVE-2022-32614](https://github.com/Live-Hack-CVE/CVE-2022-32614) + +### CVE-2022-32615 (2022-11-08) + + +In ccd, there is a possible out of bounds write due to uninitialized data. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326559; Issue ID: ALPS07326559. + + +- [Live-Hack-CVE/CVE-2022-32615](https://github.com/Live-Hack-CVE/CVE-2022-32615) + +### CVE-2022-32616 (2022-11-08) + + +In isp, there is a possible out of bounds write due to uninitialized data. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07341258; Issue ID: ALPS07341258. + + +- [Live-Hack-CVE/CVE-2022-32616](https://github.com/Live-Hack-CVE/CVE-2022-32616) + +### CVE-2022-32617 (2022-11-08) + + +In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262364; Issue ID: ALPS07262364. + + +- [Live-Hack-CVE/CVE-2022-32617](https://github.com/Live-Hack-CVE/CVE-2022-32617) + +### CVE-2022-32618 (2022-11-08) + + +In typec, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262454; Issue ID: ALPS07262454. + + +- [Live-Hack-CVE/CVE-2022-32618](https://github.com/Live-Hack-CVE/CVE-2022-32618) + +### CVE-2022-32776 (2022-11-08) + + +Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Advanced Ads GmbH Advanced Ads – Ad Manager & AdSense plugin <= 1.31.1 on WordPress. + + +- [Live-Hack-CVE/CVE-2022-32776](https://github.com/Live-Hack-CVE/CVE-2022-32776) + +### CVE-2022-32814 (2022-09-23) + + +A type confusion issue was addressed with improved state handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges. + + +- [Live-Hack-CVE/CVE-2022-32814](https://github.com/Live-Hack-CVE/CVE-2022-32814) + +### CVE-2022-32849 (2022-09-23) + + +An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to access sensitive user information. + + +- [Live-Hack-CVE/CVE-2022-32849](https://github.com/Live-Hack-CVE/CVE-2022-32849) + +### CVE-2022-32854 (2022-09-20) + + +This issue was addressed with improved checks. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to bypass Privacy preferences. + + +- [Live-Hack-CVE/CVE-2022-32854](https://github.com/Live-Hack-CVE/CVE-2022-32854) + +### CVE-2022-32864 (2022-09-20) + + +The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to disclose kernel memory. + + +- [Live-Hack-CVE/CVE-2022-32864](https://github.com/Live-Hack-CVE/CVE-2022-32864) + +### CVE-2022-32888 (2022-11-01) + + +An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, watchOS 9, macOS Monterey 12.6, tvOS 16. Processing maliciously crafted web content may lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2022-32888](https://github.com/Live-Hack-CVE/CVE-2022-32888) + +### CVE-2022-32893 (2022-08-24) + + +An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. + + +- [Live-Hack-CVE/CVE-2022-32893](https://github.com/Live-Hack-CVE/CVE-2022-32893) + +### CVE-2022-32923 (2022-11-01) + + +A correctness issue in the JIT was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose internal states of the app. + + +- [Live-Hack-CVE/CVE-2022-32923](https://github.com/Live-Hack-CVE/CVE-2022-32923) ### CVE-2022-32988 (2022-06-30) @@ -5574,13 +6287,21 @@ Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805 - [FedericoHeichou/CVE-2022-32988](https://github.com/FedericoHeichou/CVE-2022-32988) -### CVE-2022-33012 (2022-11-22) +### CVE-2022-33099 (2022-07-01) -Microweber v1.2.15 was discovered to allow attackers to perform an account takeover via a host header injection attack. +An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs. -- [Live-Hack-CVE/CVE-2022-33012](https://github.com/Live-Hack-CVE/CVE-2022-33012) +- [Live-Hack-CVE/CVE-2022-33099](https://github.com/Live-Hack-CVE/CVE-2022-33099) + +### CVE-2022-33176 (2022-11-11) + + +Improper input validation in BIOS firmware for some Intel(R) NUC 11 Performance kits and Intel(R) NUC 11 Performance Mini PCs before version PATGL357.0042 may allow a privileged user to potentially enable escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2022-33176](https://github.com/Live-Hack-CVE/CVE-2022-33176) ### CVE-2022-33234 (2022-11-15) @@ -5614,21 +6335,45 @@ Transient DOS due to loop with unreachable exit condition in WLAN firmware while - [Live-Hack-CVE/CVE-2022-33239](https://github.com/Live-Hack-CVE/CVE-2022-33239) -### CVE-2022-33321 (2022-11-08) +### CVE-2022-33639 (2022-06-29) -Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section. +Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30192, CVE-2022-33638. -- [Live-Hack-CVE/CVE-2022-33321](https://github.com/Live-Hack-CVE/CVE-2022-33321) +- [Live-Hack-CVE/CVE-2022-33639](https://github.com/Live-Hack-CVE/CVE-2022-33639) -### CVE-2022-33322 (2022-11-08) +### CVE-2022-33684 (2022-11-04) -Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section. +The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET request that is sent to the ClientCredentialFlow 'issuer url'. The intercepted credentials can be used to acquire authentication data from the OAuth2.0 server to then authenticate with an Apache Pulsar cluster. An attacker can only take advantage of this vulnerability by taking control of a machine 'between' the client and the server. The attacker must then actively manipulate traffic to perform the attack. The Apache Pulsar Python Client wraps the C++ client, so it is also vulnerable in the same way. This issue affects Apache Pulsar C++ Client and Python Client versions 2.7.0 to 2.7.4; 2.8.0 to 2.8.3; 2.9.0 to 2.9.2; 2.10.0 to 2.10.1; 2.6.4 and earlier. Any users running affected versions of the C++ Client or the Python Client should rotate vulnerable OAuth2.0 credentials, including client_id and client_secret. 2.7 C++ and Python Client users should upgrade to 2.7.5 and rotate vulnerable OAuth2.0 credentials. 2.8 C++ and Python Client users should upgrade to 2.8.4 and rotate vulnerable OAuth2.0 credentials. 2.9 C++ and Python Client users should upgrade to 2.9.3 and rotate vulnerable OAuth2.0 credentials. 2.10 C++ and Python Client users should upgrade to 2.10.2 and rotate vulnerable OAuth2.0 credentials. 3.0 C++ users are unaffected and 3.0 Python Client users will be unaffected when it is released. Any users running the C++ and Python Client for 2.6 or less should upgrade to one of the above patched versions. -- [Live-Hack-CVE/CVE-2022-33322](https://github.com/Live-Hack-CVE/CVE-2022-33322) +- [Live-Hack-CVE/CVE-2022-33684](https://github.com/Live-Hack-CVE/CVE-2022-33684) + +### CVE-2022-33743 (2022-07-05) + + +network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed. + + +- [Live-Hack-CVE/CVE-2022-33743](https://github.com/Live-Hack-CVE/CVE-2022-33743) + +### CVE-2022-33870 (2022-11-02) + + +An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. + + +- [Live-Hack-CVE/CVE-2022-33870](https://github.com/Live-Hack-CVE/CVE-2022-33870) + +### CVE-2022-33878 (2022-11-02) + + +An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac versions 7.0.0 through 7.0.5 may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal. + + +- [Live-Hack-CVE/CVE-2022-33878](https://github.com/Live-Hack-CVE/CVE-2022-33878) ### CVE-2022-33905 (2022-11-14) @@ -5678,6 +6423,22 @@ Protection mechanism failure in the Intel(R) DCM software before version 5.0 may - [Live-Hack-CVE/CVE-2022-33942](https://github.com/Live-Hack-CVE/CVE-2022-33942) +### CVE-2022-33973 (2022-11-11) + + +Improper access control in the Intel(R) WAPI Security software for Windows 10/11 before version 22.2150.0.1 may allow an authenticated user to potentially enable information disclosure via local access. + + +- [Live-Hack-CVE/CVE-2022-33973](https://github.com/Live-Hack-CVE/CVE-2022-33973) + +### CVE-2022-33981 (2022-06-18) + + +drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function. + + +- [Live-Hack-CVE/CVE-2022-33981](https://github.com/Live-Hack-CVE/CVE-2022-33981) + ### CVE-2022-33982 (2022-11-14) @@ -5718,13 +6479,61 @@ DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI - [Live-Hack-CVE/CVE-2022-33986](https://github.com/Live-Hack-CVE/CVE-2022-33986) -### CVE-2022-34169 (2022-07-19) +### CVE-2022-34000 (2022-06-19) -The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan. +libjxl 0.6.1 has an assertion failure in LowMemoryRenderPipeline::Init() in render_pipeline/low_memory_render_pipeline.cc. -- [Live-Hack-CVE/CVE-2022-34169](https://github.com/Live-Hack-CVE/CVE-2022-34169) +- [Live-Hack-CVE/CVE-2022-34000](https://github.com/Live-Hack-CVE/CVE-2022-34000) + +### CVE-2022-34020 (2022-10-12) + + +Cross Site Request Forgery (CSRF) vulnerability in ResIOT ResIOT IOT Platform + LoRaWAN Network Server through 4.1.1000114 allows attackers to add new admin users to the platform or other unspecified impacts. + + +- [Live-Hack-CVE/CVE-2022-34020](https://github.com/Live-Hack-CVE/CVE-2022-34020) + +### CVE-2022-34152 (2022-11-11) + + +Improper input validation in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Kits before version TY0070 may allow a privileged user to potentially enable escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2022-34152](https://github.com/Live-Hack-CVE/CVE-2022-34152) + +### CVE-2022-34170 (2022-06-22) + + +In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. + + +- [Live-Hack-CVE/CVE-2022-34170](https://github.com/Live-Hack-CVE/CVE-2022-34170) + +### CVE-2022-34171 (2022-06-22) + + +In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability. + + +- [Live-Hack-CVE/CVE-2022-34171](https://github.com/Live-Hack-CVE/CVE-2022-34171) + +### CVE-2022-34172 (2022-06-22) + + +In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability. + + +- [Live-Hack-CVE/CVE-2022-34172](https://github.com/Live-Hack-CVE/CVE-2022-34172) + +### CVE-2022-34173 (2022-06-22) + + +In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. + + +- [Live-Hack-CVE/CVE-2022-34173](https://github.com/Live-Hack-CVE/CVE-2022-34173) ### CVE-2022-34298 (2022-06-22) @@ -5742,6 +6551,70 @@ In Apache Tomcat 10.1.0-M1 to 10.1.0-M16, 10.0.0-M1 to 10.0.22, 9.0.30 to 9.0.64 - [zeroc00I/CVE-2022-34305](https://github.com/zeroc00I/CVE-2022-34305) +### CVE-2022-34312 (2022-11-14) + + +IBM CICS TX 11.1 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 229447. + + +- [Live-Hack-CVE/CVE-2022-34312](https://github.com/Live-Hack-CVE/CVE-2022-34312) + +### CVE-2022-34313 (2022-11-14) + + +IBM CICS TX 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. X-Force ID: 229449. + + +- [Live-Hack-CVE/CVE-2022-34313](https://github.com/Live-Hack-CVE/CVE-2022-34313) + +### CVE-2022-34314 (2022-11-14) + + +IBM CICS TX 11.1 could disclose sensitive information to a local user due to insecure permission settings. IBM X-Force ID: 229450. + + +- [Live-Hack-CVE/CVE-2022-34314](https://github.com/Live-Hack-CVE/CVE-2022-34314) + +### CVE-2022-34315 (2022-11-14) + + +IBM CICS TX 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229451. + + +- [Live-Hack-CVE/CVE-2022-34315](https://github.com/Live-Hack-CVE/CVE-2022-34315) + +### CVE-2022-34316 (2022-11-14) + + +IBM CICS TX 11.1 does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web browser components that can process raw headers. IBM X-Force ID: 229452. + + +- [Live-Hack-CVE/CVE-2022-34316](https://github.com/Live-Hack-CVE/CVE-2022-34316) + +### CVE-2022-34317 (2022-11-14) + + +IBM CICS TX 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229459. + + +- [Live-Hack-CVE/CVE-2022-34317](https://github.com/Live-Hack-CVE/CVE-2022-34317) + +### CVE-2022-34319 (2022-11-14) + + +IBM CICS TX 11.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229463. + + +- [Live-Hack-CVE/CVE-2022-34319](https://github.com/Live-Hack-CVE/CVE-2022-34319) + +### CVE-2022-34320 (2022-11-14) + + +IBM CICS TX 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229464. + + +- [Live-Hack-CVE/CVE-2022-34320](https://github.com/Live-Hack-CVE/CVE-2022-34320) + ### CVE-2022-34325 (2022-11-14) @@ -5750,6 +6623,14 @@ DMA transactions which are targeted at input buffers used for the StorageSecurit - [Live-Hack-CVE/CVE-2022-34325](https://github.com/Live-Hack-CVE/CVE-2022-34325) +### CVE-2022-34329 (2022-11-14) + + +IBM CICS TX 11.7 could allow an attacker to obtain sensitive information from HTTP response headers. IBM X-Force ID: 229467. + + +- [Live-Hack-CVE/CVE-2022-34329](https://github.com/Live-Hack-CVE/CVE-2022-34329) + ### CVE-2022-34331 (2022-11-11) @@ -5758,6 +6639,14 @@ After performing a sequence of Power FW950, FW1010 maintenance operations a SRIO - [Live-Hack-CVE/CVE-2022-34331](https://github.com/Live-Hack-CVE/CVE-2022-34331) +### CVE-2022-34339 (2022-11-03) + + +"IBM Cognos Analytics 11.2.1, 11.2.0, 11.1.7 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 229963." + + +- [Live-Hack-CVE/CVE-2022-34339](https://github.com/Live-Hack-CVE/CVE-2022-34339) + ### CVE-2022-34354 (2022-11-16) @@ -5766,53 +6655,61 @@ IBM Sterling Partner Engagement Manager 2.0 allows encrypted storage of client d - [Live-Hack-CVE/CVE-2022-34354](https://github.com/Live-Hack-CVE/CVE-2022-34354) -### CVE-2022-34526 (2022-07-29) +### CVE-2022-34730 (2022-09-13) -A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities. +Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34732, CVE-2022-34734. -- [Live-Hack-CVE/CVE-2022-34526](https://github.com/Live-Hack-CVE/CVE-2022-34526) +- [Live-Hack-CVE/CVE-2022-34730](https://github.com/Live-Hack-CVE/CVE-2022-34730) -### CVE-2022-34665 (2022-11-18) +### CVE-2022-34732 (2022-09-13) -NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service. +Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34734. -- [Live-Hack-CVE/CVE-2022-34665](https://github.com/Live-Hack-CVE/CVE-2022-34665) +- [Live-Hack-CVE/CVE-2022-34732](https://github.com/Live-Hack-CVE/CVE-2022-34732) -### CVE-2022-34666 (2022-11-10) +### CVE-2022-34734 (2022-09-13) -NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a local user with basic capabilities can cause a null-pointer dereference, which may lead to denial of service. +Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34726, CVE-2022-34727, CVE-2022-34730, CVE-2022-34732. -- [Live-Hack-CVE/CVE-2022-34666](https://github.com/Live-Hack-CVE/CVE-2022-34666) +- [Live-Hack-CVE/CVE-2022-34734](https://github.com/Live-Hack-CVE/CVE-2022-34734) -### CVE-2022-34667 (2022-11-18) +### CVE-2022-34822 (2022-11-08) -NVIDIA CUDA Toolkit SDK contains a stack-based buffer overflow vulnerability in cuobjdump, where an unprivileged remote attacker could exploit this buffer overflow condition by persuading a local user to download a specially crafted corrupted file and execute cuobjdump against it locally, which may lead to a limited denial of service and some loss of data integrity for the local user. +Path traversal vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code. -- [Live-Hack-CVE/CVE-2022-34667](https://github.com/Live-Hack-CVE/CVE-2022-34667) +- [Live-Hack-CVE/CVE-2022-34822](https://github.com/Live-Hack-CVE/CVE-2022-34822) -### CVE-2022-34827 (2022-11-18) +### CVE-2022-34823 (2022-11-08) -Carel Boss Mini 1.5.0 has Improper Access Control. +Buffer overflow vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code. -- [Live-Hack-CVE/CVE-2022-34827](https://github.com/Live-Hack-CVE/CVE-2022-34827) +- [Live-Hack-CVE/CVE-2022-34823](https://github.com/Live-Hack-CVE/CVE-2022-34823) -### CVE-2022-34830 (2022-11-22) +### CVE-2022-34824 (2022-11-08) -An Arm product family through 2022-06-29 has a TOCTOU Race Condition that allows non-privileged user to make improper GPU processing operations to gain access to already freed memory. +Weak File and Folder Permissions vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code. -- [Live-Hack-CVE/CVE-2022-34830](https://github.com/Live-Hack-CVE/CVE-2022-34830) +- [Live-Hack-CVE/CVE-2022-34824](https://github.com/Live-Hack-CVE/CVE-2022-34824) + +### CVE-2022-34825 (2022-11-08) + + +Uncontrolled Search Path Element in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code. + + +- [Live-Hack-CVE/CVE-2022-34825](https://github.com/Live-Hack-CVE/CVE-2022-34825) ### CVE-2022-34961 (2022-07-25) @@ -5838,29 +6735,37 @@ OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contai - [bypazs/CVE-2022-34963](https://github.com/bypazs/CVE-2022-34963) -### CVE-2022-35407 (2022-11-21) +### CVE-2022-35276 (2022-11-11) -An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. A stack buffer overflow leads to arbitrary code execution in the SetupUtility driver on Intel platforms. An attacker can change the values of certain UEFI variables. If the size of the second variable exceeds the size of the first, then the buffer will be overwritten. This issue affects the SetupUtility driver of InsydeH2O. +Improper access control in BIOS firmware for some Intel(R) NUC 8 Compute Elements before version CBWHL357.0096 may allow a privileged user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-35407](https://github.com/Live-Hack-CVE/CVE-2022-35407) +- [Live-Hack-CVE/CVE-2022-35276](https://github.com/Live-Hack-CVE/CVE-2022-35276) -### CVE-2022-35500 (2022-11-22) +### CVE-2022-35279 (2022-11-03) -Amasty Blog 2.10.3 is vulnerable to Cross Site Scripting (XSS) via leave comment functionality. +"IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, and 22.0.1 could disclose sensitive version information to authenticated users which could be used in further attacks against the system. IBM X-Force ID: 230537." -- [Live-Hack-CVE/CVE-2022-35500](https://github.com/Live-Hack-CVE/CVE-2022-35500) +- [Live-Hack-CVE/CVE-2022-35279](https://github.com/Live-Hack-CVE/CVE-2022-35279) -### CVE-2022-35501 (2022-11-23) +### CVE-2022-35405 (2022-07-19) -Stored Cross-site Scripting (XSS) exists in the Amasty Blog Pro 2.10.3 and 2.10.4 plugin for Magento 2 because of the duplicate post function. +Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.) -- [Live-Hack-CVE/CVE-2022-35501](https://github.com/Live-Hack-CVE/CVE-2022-35501) +- [Live-Hack-CVE/CVE-2022-35405](https://github.com/Live-Hack-CVE/CVE-2022-35405) + +### CVE-2022-35411 (2022-07-08) + + +rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle. + + +- [Live-Hack-CVE/CVE-2022-35411](https://github.com/Live-Hack-CVE/CVE-2022-35411) ### CVE-2022-35613 (2022-11-14) @@ -5870,85 +6775,117 @@ Konker v2.3.9 was to discovered to contain a Cross-Site Request Forgery (CSRF). - [Live-Hack-CVE/CVE-2022-35613](https://github.com/Live-Hack-CVE/CVE-2022-35613) -### CVE-2022-35897 (2022-11-21) +### CVE-2022-35642 (2022-11-03) -An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code. +"IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 227592." -- [Live-Hack-CVE/CVE-2022-35897](https://github.com/Live-Hack-CVE/CVE-2022-35897) +- [Live-Hack-CVE/CVE-2022-35642](https://github.com/Live-Hack-CVE/CVE-2022-35642) -### CVE-2022-36111 (2022-11-23) +### CVE-2022-35717 (2022-11-03) -immudb is a database with built-in cryptographic proof and verification. In versions prior to 1.4.1, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. This issue has been patched in version 1.4.1. +"IBM InfoSphere Information Server 11.7 could allow a locally authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-"Force ID: 231361. -- [Live-Hack-CVE/CVE-2022-36111](https://github.com/Live-Hack-CVE/CVE-2022-36111) +- [Live-Hack-CVE/CVE-2022-35717](https://github.com/Live-Hack-CVE/CVE-2022-35717) -### CVE-2022-36133 (2022-11-25) +### CVE-2022-35719 (2022-11-14) -The WebConfig functionality of Epson TM-C3500 and TM-C7500 devices with firmware version WAM31500 allows authentication bypass. +IBM MQ Internet Pass-Thru 2.1, 9.2 LTS and 9.2 CD stores potentially sensitive information in trace files that could be read by a local user. -- [Live-Hack-CVE/CVE-2022-36133](https://github.com/Live-Hack-CVE/CVE-2022-36133) +- [Live-Hack-CVE/CVE-2022-35719](https://github.com/Live-Hack-CVE/CVE-2022-35719) -### CVE-2022-36136 (2022-11-28) +### CVE-2022-35737 (2022-08-03) -ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input Deposit Comment. +SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. -- [Live-Hack-CVE/CVE-2022-36136](https://github.com/Live-Hack-CVE/CVE-2022-36136) +- [Live-Hack-CVE/CVE-2022-35737](https://github.com/Live-Hack-CVE/CVE-2022-35737) -### CVE-2022-36137 (2022-11-28) +### CVE-2022-35740 (2022-11-10) -ChurchCRM Version 4.4.5 has XSS vulnerabilities that allow attackers to store XSS via location input sHeader. +dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS's path-based XSS prevention (such as "require login" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS. -- [Live-Hack-CVE/CVE-2022-36137](https://github.com/Live-Hack-CVE/CVE-2022-36137) +- [Live-Hack-CVE/CVE-2022-35740](https://github.com/Live-Hack-CVE/CVE-2022-35740) -### CVE-2022-36179 (2022-11-21) +### CVE-2022-35812 (2022-08-09) -Fusiondirectory 1.3 suffers from Improper Session Handling. +Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819. -- [Live-Hack-CVE/CVE-2022-36179](https://github.com/Live-Hack-CVE/CVE-2022-36179) +- [Live-Hack-CVE/CVE-2022-35812](https://github.com/Live-Hack-CVE/CVE-2022-35812) -### CVE-2022-36180 (2022-11-21) +### CVE-2022-35837 (2022-09-13) -Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /fusiondirectory/index.php?message=[injection], /fusiondirectory/index.php?message=invalidparameter&plug={Injection], /fusiondirectory/index.php?signout=1&message=[injection]&plug=106. +Windows Graphics Component Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34728, CVE-2022-38006. -- [Live-Hack-CVE/CVE-2022-36180](https://github.com/Live-Hack-CVE/CVE-2022-36180) +- [Live-Hack-CVE/CVE-2022-35837](https://github.com/Live-Hack-CVE/CVE-2022-35837) -### CVE-2022-36193 (2022-11-28) +### CVE-2022-35842 (2022-11-02) -SQL injection in School Management System 1.0 allows remote attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries. +An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiOS SSL-VPN versions 7.2.0, versions 7.0.0 through 7.0.6 and versions 6.4.0 through 6.4.9 may allow a remote unauthenticated attacker to gain information about LDAP and SAML settings configured in FortiOS. -- [Live-Hack-CVE/CVE-2022-36193](https://github.com/Live-Hack-CVE/CVE-2022-36193) +- [Live-Hack-CVE/CVE-2022-35842](https://github.com/Live-Hack-CVE/CVE-2022-35842) -### CVE-2022-36337 (2022-11-22) +### CVE-2022-35951 (2022-09-23) -An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. A stack buffer overflow vulnerability in the MebxConfiguration driver leads to arbitrary code execution. Control of a UEFI variable under the OS can cause this overflow when read by BIOS code. +Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been patched in Redis version 7.0.5. No known workarounds exist. -- [Live-Hack-CVE/CVE-2022-36337](https://github.com/Live-Hack-CVE/CVE-2022-36337) +- [Live-Hack-CVE/CVE-2022-35951](https://github.com/Live-Hack-CVE/CVE-2022-35951) -### CVE-2022-36357 (2022-11-17) +### CVE-2022-36022 (2022-11-10) -Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ULTIMATE TABLES plugin <= 1.6.5 on WordPress. +Deeplearning4J is a suite of tools for deploying and training deep learning models using the JVM. Packages org.deeplearning4j:dl4j-examples and org.deeplearning4j:platform-tests through version 1.0.0-M2.1 may use some unclaimed S3 buckets in tests in examples. This is likely affect people who use some older NLP examples that reference an old S3 bucket. The problem has been patched. Users should upgrade to snapshots as Deeplearning4J plan to publish a release with the fix at a later date. As a workaround, download a word2vec google news vector from a new source using git lfs from here. -- [Live-Hack-CVE/CVE-2022-36357](https://github.com/Live-Hack-CVE/CVE-2022-36357) +- [Live-Hack-CVE/CVE-2022-36022](https://github.com/Live-Hack-CVE/CVE-2022-36022) + +### CVE-2022-36067 (2022-09-06) + + +vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds. + + +- [Live-Hack-CVE/CVE-2022-36067](https://github.com/Live-Hack-CVE/CVE-2022-36067) + +### CVE-2022-36077 (2022-11-08) + + +The Electron framework enables writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions prior to 21.0.0-beta.1, 20.0.1, 19.0.11, and 18.3.7, Electron is vulnerable to Exposure of Sensitive Information. When following a redirect, Electron delays a check for redirecting to file:// URLs from other schemes. The contents of the file is not available to the renderer following the redirect, but if the redirect target is a SMB URL such as `file://some.website.com/`, then in some cases, Windows will connect to that server and attempt NTLM authentication, which can include sending hashed credentials.This issue has been patched in versions: 21.0.0-beta.1, 20.0.1, 19.0.11, and 18.3.7. Users are recommended to upgrade to the latest stable version of Electron. If upgrading isn't possible, this issue can be addressed without upgrading by preventing redirects to file:// URLs in the `WebContents.on('will-redirect')` event, for all WebContents as a workaround. + + +- [Live-Hack-CVE/CVE-2022-36077](https://github.com/Live-Hack-CVE/CVE-2022-36077) + +### CVE-2022-36087 (2022-09-09) + + +OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds. + + +- [Live-Hack-CVE/CVE-2022-36087](https://github.com/Live-Hack-CVE/CVE-2022-36087) + +### CVE-2022-36349 (2022-11-11) + + +Insecure default variable initialization in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow an authenticated user to potentially enable denial of service via local access. + + +- [Live-Hack-CVE/CVE-2022-36349](https://github.com/Live-Hack-CVE/CVE-2022-36349) ### CVE-2022-36367 (2022-11-11) @@ -5958,93 +6895,101 @@ Incorrect default permissions in the Intel(R) Support Android application before - [Live-Hack-CVE/CVE-2022-36367](https://github.com/Live-Hack-CVE/CVE-2022-36367) -### CVE-2022-36432 (2022-11-16) +### CVE-2022-36370 (2022-11-11) -The Preview functionality in the Amasty Blog Pro 2.10.3 plugin for Magento 2 uses eval unsafely. This allows attackers to perform Cross-site Scripting attacks on admin panel users by manipulating the generated preview application response. +Improper authentication in BIOS firmware for some Intel(R) NUC Boards and Intel(R) NUC Kits before version MYi30060 may allow a privileged user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-36432](https://github.com/Live-Hack-CVE/CVE-2022-36432) +- [Live-Hack-CVE/CVE-2022-36370](https://github.com/Live-Hack-CVE/CVE-2022-36370) -### CVE-2022-36433 (2022-11-29) +### CVE-2022-36377 (2022-11-11) -The blog-post creation functionality in the Amasty Blog Pro 2.10.3 plugin for Magento 2 allows injection of JavaScript code in the short_content and full_content fields, leading to XSS attacks against admin panel users via posts/preview or posts/save. +Incorrect default permissions in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-36433](https://github.com/Live-Hack-CVE/CVE-2022-36433) +- [Live-Hack-CVE/CVE-2022-36377](https://github.com/Live-Hack-CVE/CVE-2022-36377) -### CVE-2022-36784 (2022-11-17) +### CVE-2022-36380 (2022-11-11) -Elsight – Elsight Halo Remote Code Execution (RCE) Elsight Halo web panel allows us to perform connection validation. through the POST request : /api/v1/nics/wifi/wlan0/ping we can abuse DESTINATION parameter and leverage it to remote code execution. +Uncontrolled search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-36784](https://github.com/Live-Hack-CVE/CVE-2022-36784) +- [Live-Hack-CVE/CVE-2022-36380](https://github.com/Live-Hack-CVE/CVE-2022-36380) -### CVE-2022-36785 (2022-11-17) +### CVE-2022-36400 (2022-11-11) -D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure – file contains a URL with private IP at line 15 "login.asp" A. The window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ; "admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at *Authorization Bypass – URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface. +Path traversal in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-36785](https://github.com/Live-Hack-CVE/CVE-2022-36785) +- [Live-Hack-CVE/CVE-2022-36400](https://github.com/Live-Hack-CVE/CVE-2022-36400) -### CVE-2022-36786 (2022-11-17) +### CVE-2022-36404 (2022-11-03) -DLINK - DSL-224 Post-auth PCE. DLINK router has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on the router. +Auth. (subscriber+) Broken Access Control vulnerability in David Cole Simple SEO plugin <= 1.8.12 on WordPress allows attackers to create or delete sitemap. -- [Live-Hack-CVE/CVE-2022-36786](https://github.com/Live-Hack-CVE/CVE-2022-36786) +- [Live-Hack-CVE/CVE-2022-36404](https://github.com/Live-Hack-CVE/CVE-2022-36404) -### CVE-2022-36787 (2022-11-17) +### CVE-2022-36428 (2022-11-03) -Webvendome - Webvendome SQL Injection. SQL Injection in the Parameter " DocNumber" Request : Get Request : /webvendome/showfiles.aspx?jobnumber=nullDoc Number=HERE. +Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Stage Rock Convert plugin <= 2.11.0 on WordPress. -- [Live-Hack-CVE/CVE-2022-36787](https://github.com/Live-Hack-CVE/CVE-2022-36787) +- [Live-Hack-CVE/CVE-2022-36428](https://github.com/Live-Hack-CVE/CVE-2022-36428) -### CVE-2022-36924 (2022-11-17) +### CVE-2022-36776 (2022-11-11) -The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to the SYSTEM user. +IBM Cloud Pak for Security (CP4S) 1.10.0.0 79and 1.10.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 233663. -- [Live-Hack-CVE/CVE-2022-36924](https://github.com/Live-Hack-CVE/CVE-2022-36924) +- [Live-Hack-CVE/CVE-2022-36776](https://github.com/Live-Hack-CVE/CVE-2022-36776) -### CVE-2022-36960 (2022-11-29) +### CVE-2022-36781 (2022-09-28) -SolarWinds Platform was susceptible to Improper Input Validation. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges. +WiseConnect - ScreenConnect Session Code Bypass. An attacker would have to use a proxy to monitor the traffic, and perform a brute force on the session code in order to get in. Sensitive data about the company , get in a session. -- [Live-Hack-CVE/CVE-2022-36960](https://github.com/Live-Hack-CVE/CVE-2022-36960) +- [Live-Hack-CVE/CVE-2022-36781](https://github.com/Live-Hack-CVE/CVE-2022-36781) -### CVE-2022-36962 (2022-11-29) +### CVE-2022-36789 (2022-11-11) -SolarWinds Platform was susceptible to Command Injection. This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands. +Improper access control in BIOS firmware for some Intel(R) NUC 10 Performance Kits and Intel(R) NUC 10 Performance Mini PCs before version FNCML357.0053 may allow a privileged user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-36962](https://github.com/Live-Hack-CVE/CVE-2022-36962) +- [Live-Hack-CVE/CVE-2022-36789](https://github.com/Live-Hack-CVE/CVE-2022-36789) -### CVE-2022-36964 (2022-11-29) +### CVE-2022-36879 (2022-07-26) -SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands. +An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice. -- [Live-Hack-CVE/CVE-2022-36964](https://github.com/Live-Hack-CVE/CVE-2022-36964) +- [Live-Hack-CVE/CVE-2022-36879](https://github.com/Live-Hack-CVE/CVE-2022-36879) -### CVE-2022-37032 (2022-09-19) +### CVE-2022-36938 (2022-11-10) -An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c. +DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file. -- [Live-Hack-CVE/CVE-2022-37032](https://github.com/Live-Hack-CVE/CVE-2022-37032) +- [Live-Hack-CVE/CVE-2022-36938](https://github.com/Live-Hack-CVE/CVE-2022-36938) + +### CVE-2022-37015 (2022-11-08) + + +Symantec Endpoint Detection and Response (SEDR) Appliance, prior to 4.7.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. + + +- [Live-Hack-CVE/CVE-2022-37015](https://github.com/Live-Hack-CVE/CVE-2022-37015) ### CVE-2022-37109 (2022-11-14) @@ -6054,61 +6999,29 @@ patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d - [Live-Hack-CVE/CVE-2022-37109](https://github.com/Live-Hack-CVE/CVE-2022-37109) -### CVE-2022-37197 (2022-11-18) +### CVE-2022-37334 (2022-11-11) -IOBit IOTransfer V4 is vulnerable to Unquoted Service Path. +Improper initialization in BIOS firmware for some Intel(R) NUC 11 Pro Kits and Intel(R) NUC 11 Pro Boards before version TNTGL357.0064 may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-37197](https://github.com/Live-Hack-CVE/CVE-2022-37197) +- [Live-Hack-CVE/CVE-2022-37334](https://github.com/Live-Hack-CVE/CVE-2022-37334) -### CVE-2022-37290 (2022-11-14) +### CVE-2022-37345 (2022-11-11) -GNOME Nautilus 42.2 allows a NULL pointer dereference and get_basename application crash via a pasted ZIP archive. +Improper authentication in BIOS firmware[A1] for some Intel(R) NUC Kits before version RY0386 may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Live-Hack-CVE/CVE-2022-37290](https://github.com/Live-Hack-CVE/CVE-2022-37290) +- [Live-Hack-CVE/CVE-2022-37345](https://github.com/Live-Hack-CVE/CVE-2022-37345) -### CVE-2022-37301 (2022-11-22) +### CVE-2022-37434 (2022-08-05) -A CWE-191: Integer Underflow (Wrap or Wraparound) vulnerability exists that could cause a denial of service of the controller due to memory access violations when using the Modbus TCP protocol. Affected products: Modicon M340 CPU (part numbers BMXP34*)(V3.40 and prior), Modicon M580 CPU (part numbers BMEP* and BMEH*)(V3.22 and prior), Legacy Modicon Quantum/Premium(All Versions), Modicon Momentum MDI (171CBU*)(All Versions), Modicon MC80 (BMKC80)(V1.7 and prior) +zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference). -- [Live-Hack-CVE/CVE-2022-37301](https://github.com/Live-Hack-CVE/CVE-2022-37301) - -### CVE-2022-37332 (2022-11-21) - - -A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing media player API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. - - -- [Live-Hack-CVE/CVE-2022-37332](https://github.com/Live-Hack-CVE/CVE-2022-37332) - -### CVE-2022-37421 (2022-11-22) - - -Silverstripe silverstripe/cms through 4.11.0 allows XSS. - - -- [Live-Hack-CVE/CVE-2022-37421](https://github.com/Live-Hack-CVE/CVE-2022-37421) - -### CVE-2022-37430 (2022-11-22) - - -Silverstripe silverstripe/framework through 4.11 allows XSS vulnerability via href attribute of a link (issue 2 of 2). - - -- [Live-Hack-CVE/CVE-2022-37430](https://github.com/Live-Hack-CVE/CVE-2022-37430) - -### CVE-2022-37599 (2022-10-11) - - -A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js. - - -- [Live-Hack-CVE/CVE-2022-37599](https://github.com/Live-Hack-CVE/CVE-2022-37599) +- [Live-Hack-CVE/CVE-2022-37434](https://github.com/Live-Hack-CVE/CVE-2022-37434) ### CVE-2022-37601 (2022-10-12) @@ -6126,157 +7039,293 @@ A Regular expression denial of service (ReDoS) flaw was found in Function interp - [Live-Hack-CVE/CVE-2022-37603](https://github.com/Live-Hack-CVE/CVE-2022-37603) -### CVE-2022-37720 (2022-11-25) +### CVE-2022-37616 (2022-10-11) -Orchardproject Orchard CMS 1.10.3 is vulnerable to Cross Site Scripting (XSS). When a low privileged user such as an author or publisher, injects a crafted html and javascript payload in a blog post, leading to full admin account takeover or privilege escalation when the malicious blog post is loaded in the victim's browser. +** DISPUTED ** A prototype pollution vulnerability exists in the function copy in dom.js in the xmldom (published as @xmldom/xmldom) package before 0.8.3 for Node.js via the p variable. NOTE: the vendor states "we are in the process of marking this report as invalid." -- [Live-Hack-CVE/CVE-2022-37720](https://github.com/Live-Hack-CVE/CVE-2022-37720) +- [Live-Hack-CVE/CVE-2022-37616](https://github.com/Live-Hack-CVE/CVE-2022-37616) -### CVE-2022-37721 (2022-11-25) +### CVE-2022-37623 (2022-10-31) -PyroCMS 3.9 is vulnerable to a stored Cross Site Scripting (XSS_ when a low privileged user such as an author, injects a crafted html and javascript payload in a blog post, leading to full admin account takeover or privilege escalation. +Prototype pollution vulnerability in function resolveShims in resolve-shims.js in thlorenz browserify-shim 3.8.15 via the shimPath variable in resolve-shims.js. -- [Live-Hack-CVE/CVE-2022-37721](https://github.com/Live-Hack-CVE/CVE-2022-37721) +- [Live-Hack-CVE/CVE-2022-37623](https://github.com/Live-Hack-CVE/CVE-2022-37623) -### CVE-2022-37772 (2022-11-22) +### CVE-2022-37661 (2022-09-14) -Maarch RM 2.8.3 solution contains an improper restriction of excessive authentication attempts due to excessive verbose responses from the application. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to compromised accounts. +SmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature. -- [Live-Hack-CVE/CVE-2022-37772](https://github.com/Live-Hack-CVE/CVE-2022-37772) +- [Live-Hack-CVE/CVE-2022-37661](https://github.com/Live-Hack-CVE/CVE-2022-37661) -### CVE-2022-37773 (2022-11-22) +### CVE-2022-37680 (2022-08-29) -An authenticated SQL Injection vulnerability in the statistics page (/statistics/retrieve) of Maarch RM 2.8, via the filter parameter, allows the complete disclosure of all databases. +An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue. -- [Live-Hack-CVE/CVE-2022-37773](https://github.com/Live-Hack-CVE/CVE-2022-37773) +- [Live-Hack-CVE/CVE-2022-37680](https://github.com/Live-Hack-CVE/CVE-2022-37680) -### CVE-2022-37774 (2022-11-22) +### CVE-2022-37681 (2022-08-29) -There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication. +Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) and below allows attckers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue. -- [Live-Hack-CVE/CVE-2022-37774](https://github.com/Live-Hack-CVE/CVE-2022-37774) +- [Live-Hack-CVE/CVE-2022-37681](https://github.com/Live-Hack-CVE/CVE-2022-37681) -### CVE-2022-37931 (2022-11-21) +### CVE-2022-37710 (2022-11-06) -A vulnerability in NetBatch-Plus software allows unauthorized access to the application. HPE has provided a workaround and fix. Please refer to HPE Security Bulletin HPESBNS04388 for details. +Patterson Dental Eaglesoft 21 has AES-256 encryption but there are two ways to obtain a keyfile: (1) keybackup.data > License > Encryption Key or (2) Eaglesoft.Server.Configuration.data > DbEncryptKeyPrimary > Encryption Key. Applicable files are encrypted with keys and salt that are hardcoded into a DLL or EXE file. -- [Live-Hack-CVE/CVE-2022-37931](https://github.com/Live-Hack-CVE/CVE-2022-37931) +- [Live-Hack-CVE/CVE-2022-37710](https://github.com/Live-Hack-CVE/CVE-2022-37710) -### CVE-2022-38075 (2022-11-18) +### CVE-2022-37860 (2022-09-12) -Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in Mantenimiento web plugin <= 0.13 on WordPress. +The web configuration interface of the TP-Link M7350 V3 with firmware version 190531 is affected by a pre-authentication command injection vulnerability. -- [Live-Hack-CVE/CVE-2022-38075](https://github.com/Live-Hack-CVE/CVE-2022-38075) +- [Live-Hack-CVE/CVE-2022-37860](https://github.com/Live-Hack-CVE/CVE-2022-37860) -### CVE-2022-38097 (2022-11-21) +### CVE-2022-37865 (2022-11-07) -A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. +With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used pack200 or zip packaging. For artifacts using the "zip", "jar" or "war" packaging Ivy prior to 2.5.1 doesn't verify the target path when extracting the archive. An archive containing absolute paths or paths that try to traverse "upwards" using ".." sequences can then write files to any location on the local fie system that the user executing Ivy has write access to. Ivy users of version 2.4.0 to 2.5.0 should upgrade to Ivy 2.5.1. -- [Live-Hack-CVE/CVE-2022-38097](https://github.com/Live-Hack-CVE/CVE-2022-38097) +- [Live-Hack-CVE/CVE-2022-37865](https://github.com/Live-Hack-CVE/CVE-2022-37865) -### CVE-2022-38113 (2022-11-23) +### CVE-2022-37866 (2022-11-07) -This vulnerability discloses build and services versions in the server response header. +When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates in general - it is possible the artifacts are stored outside of Ivy's local cache or repository or can overwrite different artifacts inside of the local cache. In order to exploit this vulnerability an attacker needs collaboration by the remote repository as Ivy will issue http requests containing ".." sequences and a "normal" repository will not interpret them as part of the artifact coordinates. Users of Apache Ivy 2.0.0 to 2.5.1 should upgrade to Ivy 2.5.1. -- [Live-Hack-CVE/CVE-2022-38113](https://github.com/Live-Hack-CVE/CVE-2022-38113) +- [Live-Hack-CVE/CVE-2022-37866](https://github.com/Live-Hack-CVE/CVE-2022-37866) -### CVE-2022-38114 (2022-11-23) +### CVE-2022-37887 (2022-10-07) -This vulnerability occurs when a web server fails to correctly process the Content-Length of POST requests. This can lead to HTTP request smuggling or XSS. +There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. -- [Live-Hack-CVE/CVE-2022-38114](https://github.com/Live-Hack-CVE/CVE-2022-38114) +- [Live-Hack-CVE/CVE-2022-37887](https://github.com/Live-Hack-CVE/CVE-2022-37887) -### CVE-2022-38115 (2022-11-23) +### CVE-2022-37889 (2022-10-07) -Insecure method vulnerability in which allowed HTTP methods are disclosed. E.g., OPTIONS, DELETE, TRACE, and PUT +There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. -- [Live-Hack-CVE/CVE-2022-38115](https://github.com/Live-Hack-CVE/CVE-2022-38115) +- [Live-Hack-CVE/CVE-2022-37889](https://github.com/Live-Hack-CVE/CVE-2022-37889) -### CVE-2022-38145 (2022-11-22) +### CVE-2022-37890 (2022-10-07) -Silverstripe silverstripe/framework through 4.11 allows XSS (issue 1 of 3) via remote attackers adding a Javascript payload to a page's meta description and get it executed in the versioned history compare view. +Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. -- [Live-Hack-CVE/CVE-2022-38145](https://github.com/Live-Hack-CVE/CVE-2022-38145) +- [Live-Hack-CVE/CVE-2022-37890](https://github.com/Live-Hack-CVE/CVE-2022-37890) -### CVE-2022-38146 (2022-11-21) +### CVE-2022-37891 (2022-10-07) -Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3). +Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. -- [Live-Hack-CVE/CVE-2022-38146](https://github.com/Live-Hack-CVE/CVE-2022-38146) +- [Live-Hack-CVE/CVE-2022-37891](https://github.com/Live-Hack-CVE/CVE-2022-37891) -### CVE-2022-38147 (2022-11-22) +### CVE-2022-37893 (2022-10-07) -Silverstripe silverstripe/framework through 4.11 allows XSS (issue 3 of 3). +An authenticated command injection vulnerability exists in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability. -- [Live-Hack-CVE/CVE-2022-38147](https://github.com/Live-Hack-CVE/CVE-2022-38147) +- [Live-Hack-CVE/CVE-2022-37893](https://github.com/Live-Hack-CVE/CVE-2022-37893) -### CVE-2022-38148 (2022-11-21) +### CVE-2022-37894 (2022-10-07) -Silverstripe silverstripe/framework through 4.11 allows SQL Injection. +An unauthenticated Denial of Service (DoS) vulnerability exists in the handling of certain SSID strings by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected AP of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability. -- [Live-Hack-CVE/CVE-2022-38148](https://github.com/Live-Hack-CVE/CVE-2022-38148) +- [Live-Hack-CVE/CVE-2022-37894](https://github.com/Live-Hack-CVE/CVE-2022-37894) -### CVE-2022-38150 (2022-08-10) +### CVE-2022-37895 (2022-10-07) -In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1. +An unauthenticated Denial of Service (DoS) vulnerability exists in the handling of certain SSID strings by Aruba InstantOS and ArubaOS 10. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected AP of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability. -- [Live-Hack-CVE/CVE-2022-38150](https://github.com/Live-Hack-CVE/CVE-2022-38150) +- [Live-Hack-CVE/CVE-2022-37895](https://github.com/Live-Hack-CVE/CVE-2022-37895) -### CVE-2022-38163 (2022-11-07) +### CVE-2022-37896 (2022-10-07) -A Drag and Drop spoof vulnerability was discovered in F-Secure SAFE Browser for Android and iOS version 19.0 and below. Drag and drop operation by user on address bar could lead to a spoofing of the address bar. +A vulnerability in the Aruba InstantOS and ArubaOS 10 web management interface could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim’s browser in the context of the affected interface of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability. -- [Live-Hack-CVE/CVE-2022-38163](https://github.com/Live-Hack-CVE/CVE-2022-38163) +- [Live-Hack-CVE/CVE-2022-37896](https://github.com/Live-Hack-CVE/CVE-2022-37896) -### CVE-2022-38165 (2022-11-17) +### CVE-2022-37973 (2022-10-11) -Arbitrary file write in F-Secure Policy Manager through 2022-08-10 allows unauthenticated users to write the file with the contents in arbitrary locations on the F-Secure Policy Manager Server. +Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998. -- [Live-Hack-CVE/CVE-2022-38165](https://github.com/Live-Hack-CVE/CVE-2022-38165) +- [Live-Hack-CVE/CVE-2022-37973](https://github.com/Live-Hack-CVE/CVE-2022-37973) -### CVE-2022-38166 (2022-11-25) +### CVE-2022-37975 (2022-10-11) -In F-Secure Endpoint Protection for Windows and macOS before channel with Capricorn database 2022-11-22_07, the aerdl.dll unpacker handler crashes. This can lead to a scanning engine crash, triggerable remotely by an attacker for denial of service. +Windows Group Policy Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-38166](https://github.com/Live-Hack-CVE/CVE-2022-38166) +- [Live-Hack-CVE/CVE-2022-37975](https://github.com/Live-Hack-CVE/CVE-2022-37975) + +### CVE-2022-37991 (2022-10-11) + + +Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039. + + +- [Live-Hack-CVE/CVE-2022-37991](https://github.com/Live-Hack-CVE/CVE-2022-37991) + +### CVE-2022-37992 (2022-11-09) + + +Windows Group Policy Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41086. + + +- [Live-Hack-CVE/CVE-2022-37992](https://github.com/Live-Hack-CVE/CVE-2022-37992) + +### CVE-2022-38014 (2022-11-09) + + +Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-38014](https://github.com/Live-Hack-CVE/CVE-2022-38014) + +### CVE-2022-38015 (2022-11-09) + + +Windows Hyper-V Denial of Service Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-38015](https://github.com/Live-Hack-CVE/CVE-2022-38015) + +### CVE-2022-38022 (2022-10-11) + + +Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039. + + +- [Live-Hack-CVE/CVE-2022-38022](https://github.com/Live-Hack-CVE/CVE-2022-38022) + +### CVE-2022-38034 (2022-10-11) + + +Windows Workstation Service Elevation of Privilege Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-38034](https://github.com/Live-Hack-CVE/CVE-2022-38034) + +### CVE-2022-38037 (2022-10-11) + + +Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38038, CVE-2022-38039. + + +- [Live-Hack-CVE/CVE-2022-38037](https://github.com/Live-Hack-CVE/CVE-2022-38037) + +### CVE-2022-38038 (2022-10-11) + + +Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38039. + + +- [Live-Hack-CVE/CVE-2022-38038](https://github.com/Live-Hack-CVE/CVE-2022-38038) + +### CVE-2022-38043 (2022-10-11) + + +Windows Security Support Provider Interface Information Disclosure Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-38043](https://github.com/Live-Hack-CVE/CVE-2022-38043) + +### CVE-2022-38046 (2022-10-11) + + +Web Account Manager Information Disclosure Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-38046](https://github.com/Live-Hack-CVE/CVE-2022-38046) + +### CVE-2022-38099 (2022-11-11) + + +Improper input validation in BIOS firmware for some Intel(R) NUC 11 Compute Elements before version EBTGL357.0065 may allow a privileged user to potentially enable escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2022-38099](https://github.com/Live-Hack-CVE/CVE-2022-38099) + +### CVE-2022-38119 (2022-11-09) + + +UPSMON Pro login function has insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and get administrator privilege to access, control system or disrupt service. + + +- [Live-Hack-CVE/CVE-2022-38119](https://github.com/Live-Hack-CVE/CVE-2022-38119) + +### CVE-2022-38120 (2022-11-09) + + +UPSMON PRO’s has a path traversal vulnerability. A remote attacker with general user privilege can exploit this vulnerability to bypass authentication and access arbitrary system files. + + +- [Live-Hack-CVE/CVE-2022-38120](https://github.com/Live-Hack-CVE/CVE-2022-38120) + +### CVE-2022-38121 (2022-11-09) + + +UPSMON PRO configuration file stores user password in plaintext under public user directory. A remote attacker with general user privilege can access all users‘ and administrators' account names and passwords via this unprotected configuration file. + + +- [Live-Hack-CVE/CVE-2022-38121](https://github.com/Live-Hack-CVE/CVE-2022-38121) + +### CVE-2022-38122 (2022-11-09) + + +UPSMON PRO transmits sensitive data in cleartext over HTTP protocol. An unauthenticated remote attacker can exploit this vulnerability to access sensitive data. + + +- [Live-Hack-CVE/CVE-2022-38122](https://github.com/Live-Hack-CVE/CVE-2022-38122) + +### CVE-2022-38137 (2022-11-08) + + +Cross-Site Request Forgery (CSRF) vulnerability in Analytify plugin <= 4.2.2 on WordPress. + + +- [Live-Hack-CVE/CVE-2022-38137](https://github.com/Live-Hack-CVE/CVE-2022-38137) + +### CVE-2022-38164 (2022-11-07) + + +WithSecure through 2022-08-10 allows attackers to cause a denial of service (issue 3 of 5). + + +- [Live-Hack-CVE/CVE-2022-38164](https://github.com/Live-Hack-CVE/CVE-2022-38164) ### CVE-2022-38167 (2022-11-14) @@ -6286,77 +7335,93 @@ The Nintex Workflow plugin 5.2.2.30 for SharePoint allows XSS. - [Live-Hack-CVE/CVE-2022-38167](https://github.com/Live-Hack-CVE/CVE-2022-38167) -### CVE-2022-38201 (2022-11-15) +### CVE-2022-38168 (2022-11-03) -An unvalidated redirect vulnerability exists in Esri Portal for ArcGIS Quick Capture Web Designer versions 10.8.1 to 10.9.1. A remote, unauthenticated attacker can potentially induce an unsuspecting authenticated user to access an an attacker controlled domain. +** UNSUPPPORTED WHEN ASSIGNED **Broken Access Control in User Authentication in Avaya Scopia Pathfinder 10 and 20 PTS version 8.3.7.0.4 allows remote unauthenticated attackers to bypass the login page, access sensitive information, and reset user passwords via URL modification. -- [Live-Hack-CVE/CVE-2022-38201](https://github.com/Live-Hack-CVE/CVE-2022-38201) +- [Live-Hack-CVE/CVE-2022-38168](https://github.com/Live-Hack-CVE/CVE-2022-38168) -### CVE-2022-38334 (2022-09-15) +### CVE-2022-38183 (2022-08-12) -XPDF v4.04 and earlier was discovered to contain a stack overflow via the function Catalog::countPageTree() at Catalog.cc. +In Gitea before 1.16.9, it was possible for users to add existing issues to projects. Due to improper access controls, an attacker could assign any issue to any project in Gitea (there was no permission check for fetching the issue). As a result, the attacker would get access to private issue titles. -- [Live-Hack-CVE/CVE-2022-38334](https://github.com/Live-Hack-CVE/CVE-2022-38334) +- [Live-Hack-CVE/CVE-2022-38183](https://github.com/Live-Hack-CVE/CVE-2022-38183) -### CVE-2022-38377 (2022-11-25) +### CVE-2022-38372 (2022-11-02) -An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.0 through 6.0.12 may allow a remote and authenticated admin user assigned to a specific ADOM to access other ADOMs information such as device information and dashboard information. +A hidden functionality vulnerability [CWE-1242] in FortiTester CLI 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow a local, privileged user to obtain a root shell on the device via an undocumented command. -- [Live-Hack-CVE/CVE-2022-38377](https://github.com/Live-Hack-CVE/CVE-2022-38377) +- [Live-Hack-CVE/CVE-2022-38372](https://github.com/Live-Hack-CVE/CVE-2022-38372) -### CVE-2022-38385 (2022-11-15) +### CVE-2022-38380 (2022-11-02) -IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.2.0 could allow an authenticated user to obtain highly sensitive information or perform unauthorized actions due to improper input validation. IBM X-Force ID: 233777. +An improper access control [CWE-284] vulnerability in FortiOS version 7.2.0 and versions 7.0.0 through 7.0.7 may allow a remote authenticated read-only user to modify the interface settings via the API. -- [Live-Hack-CVE/CVE-2022-38385](https://github.com/Live-Hack-CVE/CVE-2022-38385) +- [Live-Hack-CVE/CVE-2022-38380](https://github.com/Live-Hack-CVE/CVE-2022-38380) -### CVE-2022-38390 (2022-11-17) +### CVE-2022-38381 (2022-11-02) -Multiple IBM Business Automation Workflow versions are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 233978. +An improper handling of malformed request vulnerability [CWE-228] exists in FortiADC 5.0 all versions, 6.0.0 all versions, 6.1.0 all versions, 6.2.0 through 6.2.3, and 7.0.0 through 7.0.2. This may allow a remote attacker without privileges to bypass some Web Application Firewall (WAF) protection such as the SQL Injection and XSS filters via a malformed HTTP request. -- [Live-Hack-CVE/CVE-2022-38390](https://github.com/Live-Hack-CVE/CVE-2022-38390) +- [Live-Hack-CVE/CVE-2022-38381](https://github.com/Live-Hack-CVE/CVE-2022-38381) -### CVE-2022-38461 (2022-11-17) +### CVE-2022-38387 (2022-11-11) -Broken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with a subscriber or higher user role to change plugin settings (selected language for legacy widgets, the default behavior for media content). +IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.2.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 233786. -- [Live-Hack-CVE/CVE-2022-38461](https://github.com/Live-Hack-CVE/CVE-2022-38461) +- [Live-Hack-CVE/CVE-2022-38387](https://github.com/Live-Hack-CVE/CVE-2022-38387) -### CVE-2022-38462 (2022-11-22) +### CVE-2022-38465 (2022-10-11) -Silverstripe silverstripe/framework through 4.11 is vulnerable to XSS by carefully crafting a return URL on a /dev/build or /Security/login request. +A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions < V21.9), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINUMERIK MC (All versions), SINUMERIK ONE (All versions). Affected products protect the built-in global private key in a way that cannot be considered sufficient any longer. The key is used for the legacy protection of confidential configuration data and the legacy PG/PC and HMI communication. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and HMI communication. -- [Live-Hack-CVE/CVE-2022-38462](https://github.com/Live-Hack-CVE/CVE-2022-38462) +- [Live-Hack-CVE/CVE-2022-38465](https://github.com/Live-Hack-CVE/CVE-2022-38465) -### CVE-2022-38538 (2022-09-13) +### CVE-2022-38537 (2022-09-13) -Archery v1.7.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the checksum parameter in the report module. +Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface. -- [Live-Hack-CVE/CVE-2022-38538](https://github.com/Live-Hack-CVE/CVE-2022-38538) +- [Live-Hack-CVE/CVE-2022-38537](https://github.com/Live-Hack-CVE/CVE-2022-38537) -### CVE-2022-38649 (2022-11-22) +### CVE-2022-38541 (2022-09-13) -Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pinot Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Apache Airflow Pinot Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Apache Airflow Pinot Provider is installed (Apache Airflow Pinot Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Pinot Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version. +Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface. -- [Live-Hack-CVE/CVE-2022-38649](https://github.com/Live-Hack-CVE/CVE-2022-38649) +- [Live-Hack-CVE/CVE-2022-38541](https://github.com/Live-Hack-CVE/CVE-2022-38541) + +### CVE-2022-38577 (2022-09-19) + + +ProcessMaker before v3.5.4 was discovered to contain insecure permissions in the user profile page. This vulnerability allows attackers to escalate normal users to Administrators. + + +- [Live-Hack-CVE/CVE-2022-38577](https://github.com/Live-Hack-CVE/CVE-2022-38577) + +### CVE-2022-38582 (2022-11-04) + + +Incorrect access control in the anti-virus driver wsdkd.sys of Watchdog Antivirus v1.4.158 allows attackers to write arbitrary files. + + +- [Live-Hack-CVE/CVE-2022-38582](https://github.com/Live-Hack-CVE/CVE-2022-38582) ### CVE-2022-38650 (2022-11-11) @@ -6382,189 +7447,165 @@ Improper Neutralization of Special Elements used in an OS Command ('OS Command I - [Live-Hack-CVE/CVE-2022-38652](https://github.com/Live-Hack-CVE/CVE-2022-38652) -### CVE-2022-38666 (2022-11-15) +### CVE-2022-38654 (2022-11-04) -Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features. +HCL Domino is susceptible to an information disclosure vulnerability. In some scenarios, local calls made on the server to search the Domino directory will ignore xACL read restrictions. An authenticated attacker could leverage this vulnerability to access attributes from a user's person record. -- [Live-Hack-CVE/CVE-2022-38666](https://github.com/Live-Hack-CVE/CVE-2022-38666) +- [Live-Hack-CVE/CVE-2022-38654](https://github.com/Live-Hack-CVE/CVE-2022-38654) -### CVE-2022-38724 (2022-11-22) +### CVE-2022-38660 (2022-11-04) -Silverstripe silverstripe/framework through 4.11.0, silverstripe/assets through 1.11.0, and silverstripe/asset-admin through 1.11.0 allow XSS. +HCL XPages applications are susceptible to a Cross Site Request Forgery (CSRF) vulnerability. An unauthenticated attacker could exploit this vulnerability to perform actions in the application on behalf of the logged in user. -- [Live-Hack-CVE/CVE-2022-38724](https://github.com/Live-Hack-CVE/CVE-2022-38724) +- [Live-Hack-CVE/CVE-2022-38660](https://github.com/Live-Hack-CVE/CVE-2022-38660) -### CVE-2022-38755 (2022-11-21) +### CVE-2022-38705 (2022-11-14) -A vulnerability has been identified in Micro Focus Filr in versions prior to 4.3.1.1. The vulnerability could be exploited to allow a remote unauthenticated attacker to enumerate valid users of the system. Remote unauthenticated user enumeration. This issue affects: Micro Focus Filr versions prior to 4.3.1.1. +IBM CICS TX 11.1 Standard and Advanced could allow a remote attacker to bypass security restrictions, caused by a reverse tabnabbing flaw. An attacker could exploit this vulnerability and redirect a victim to a phishing site. IBM X-Force ID: 234172. -- [Live-Hack-CVE/CVE-2022-38755](https://github.com/Live-Hack-CVE/CVE-2022-38755) +- [Live-Hack-CVE/CVE-2022-38705](https://github.com/Live-Hack-CVE/CVE-2022-38705) -### CVE-2022-38767 (2022-11-25) +### CVE-2022-38710 (2022-11-03) -An issue was discovered in Wind River VxWorks 6.9 and 7, that allows a specifically crafted packet sent by a Radius server, may cause Denial of Service during the IP Radius access procedure. +"IBM Robotic Process Automation 21.0.1 and 21.0.2 could disclose sensitive version information that could aid in further attacks against the system. IBM X-Force ID: 234292." -- [Live-Hack-CVE/CVE-2022-38767](https://github.com/Live-Hack-CVE/CVE-2022-38767) +- [Live-Hack-CVE/CVE-2022-38710](https://github.com/Live-Hack-CVE/CVE-2022-38710) -### CVE-2022-38813 (2022-11-25) +### CVE-2022-38712 (2022-11-03) -PHPGurukul Blood Donor Management System 1.0 does not properly restrict access to admin/dashboard.php, which allows attackers to access all data of users, delete the users, add and manage Blood Group, and Submit Report. +"IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Web services could allow a man-in-the-middle attacker to conduct SOAPAction spoofing to execute unwanted or unauthorized operations. IBM X-Force ID: 234762." -- [Live-Hack-CVE/CVE-2022-38813](https://github.com/Live-Hack-CVE/CVE-2022-38813) +- [Live-Hack-CVE/CVE-2022-38712](https://github.com/Live-Hack-CVE/CVE-2022-38712) -### CVE-2022-38871 (2022-11-18) +### CVE-2022-39037 (2022-11-09) -In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages. +Agentflow BPM file download function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files. -- [Live-Hack-CVE/CVE-2022-38871](https://github.com/Live-Hack-CVE/CVE-2022-38871) +- [Live-Hack-CVE/CVE-2022-39037](https://github.com/Live-Hack-CVE/CVE-2022-39037) -### CVE-2022-38890 (2022-09-15) +### CVE-2022-39038 (2022-11-09) -Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h +Agentflow BPM enterprise management system has improper authentication. A remote attacker with general user privilege can change the name of the user account to acquire arbitrary account privilege, and access, manipulate system or disrupt service. -- [Live-Hack-CVE/CVE-2022-38890](https://github.com/Live-Hack-CVE/CVE-2022-38890) +- [Live-Hack-CVE/CVE-2022-39038](https://github.com/Live-Hack-CVE/CVE-2022-39038) -### CVE-2022-38900 (2022-11-28) +### CVE-2022-39069 (2022-11-08) -decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS. +There is a SQL injection vulnerability in ZTE ZAIP-AIE. Due to lack of input verification by the server, an attacker could trigger an attack by building malicious requests. Exploitation of this vulnerability could cause the leakage of the current table content. -- [Live-Hack-CVE/CVE-2022-38900](https://github.com/Live-Hack-CVE/CVE-2022-38900) +- [Live-Hack-CVE/CVE-2022-39069](https://github.com/Live-Hack-CVE/CVE-2022-39069) -### CVE-2022-38974 (2022-11-18) +### CVE-2022-39157 (2022-11-08) -Broken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with subscriber or higher user roles to change the status of the translation jobs. +A vulnerability has been identified in Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.0 (All versions >= V34.0.252 < V34.0.254), Parasolid V34.1 (All versions < V34.1.242), Parasolid V34.1 (All versions >= V34.1.242 < V34.1.244), Parasolid V35.0 (All versions < V35.0.170), Parasolid V35.0 (All versions >= V35.0.170 < V35.0.184). The affected application contains an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17745) -- [Live-Hack-CVE/CVE-2022-38974](https://github.com/Live-Hack-CVE/CVE-2022-38974) +- [Live-Hack-CVE/CVE-2022-39157](https://github.com/Live-Hack-CVE/CVE-2022-39157) -### CVE-2022-39028 (2022-08-30) +### CVE-2022-39158 (2022-09-13) -telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8. +A vulnerability has been identified in RUGGEDCOM ROS RMC30 V4.X (All versions), RUGGEDCOM ROS RMC8388 V4.X (All versions), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RP110 V4.X (All versions), RUGGEDCOM ROS RS1600 V4.X (All versions), RUGGEDCOM ROS RS1600F V4.X (All versions), RUGGEDCOM ROS RS1600T V4.X (All versions), RUGGEDCOM ROS RS400 V4.X (All versions), RUGGEDCOM ROS RS401 V4.X (All versions), RUGGEDCOM ROS RS416Pv2 V4.X (All versions), RUGGEDCOM ROS RS416Pv2 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 V4.X (All versions), RUGGEDCOM ROS RS416v2 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RS8000 V4.X (All versions), RUGGEDCOM ROS RS8000A V4.X (All versions), RUGGEDCOM ROS RS8000H V4.X (All versions), RUGGEDCOM ROS RS8000T V4.X (All versions), RUGGEDCOM ROS RS900 (32M) V4.X (All versions), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RS900 V4.X (All versions), RUGGEDCOM ROS RS900G (32M) V4.X (All versions), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RS900G V4.X (All versions), RUGGEDCOM ROS RS900GP V4.X (All versions), RUGGEDCOM ROS RS900L V4.X (All versions), RUGGEDCOM ROS RS900M V4.X (All versions), RUGGEDCOM ROS RS900W V4.X (All versions), RUGGEDCOM ROS RS910 V4.X (All versions), RUGGEDCOM ROS RS910L V4.X (All versions), RUGGEDCOM ROS RS910W V4.X (All versions), RUGGEDCOM ROS RS920L V4.X (All versions), RUGGEDCOM ROS RS920W V4.X (All versions), RUGGEDCOM ROS RS930L V4.X (All versions), RUGGEDCOM ROS RS930W V4.X (All versions), RUGGEDCOM ROS RS940G V4.X (All versions), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 V4.X (All versions), RUGGEDCOM ROS RSG2100P V4.X (All versions), RUGGEDCOM ROS RSG2200 V4.X (All versions), RUGGEDCOM ROS RSG2288 V4.X (All versions), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 V4.X (All versions), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P V4.X (All versions), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 V4.X (All versions), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG907R V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG908C V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG909R V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG910C V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSG920P V4.X (All versions), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RSL910 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RST2228 V5.X (All versions < V5.6.0), RUGGEDCOM ROS RST2228P V5.X (All versions < V5.6.0), RUGGEDCOM ROS RST916C V5.X (All versions < V5.6.0), RUGGEDCOM ROS RST916P V5.X (All versions < V5.6.0), RUGGEDCOM ROS i800 V4.X (All versions), RUGGEDCOM ROS i801 V4.X (All versions), RUGGEDCOM ROS i802 V4.X (All versions), RUGGEDCOM ROS i803 V4.X (All versions). Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial of service condition that persists until the attack ends. -- [Live-Hack-CVE/CVE-2022-39028](https://github.com/Live-Hack-CVE/CVE-2022-39028) +- [Live-Hack-CVE/CVE-2022-39158](https://github.com/Live-Hack-CVE/CVE-2022-39158) -### CVE-2022-39066 (2022-11-22) +### CVE-2022-39176 (2022-09-01) -There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection. +BlueZ before 5.59 allows physically proximate attackers to obtain sensitive information because profiles/audio/avrcp.c does not validate params_len. -- [Live-Hack-CVE/CVE-2022-39066](https://github.com/Live-Hack-CVE/CVE-2022-39066) +- [Live-Hack-CVE/CVE-2022-39176](https://github.com/Live-Hack-CVE/CVE-2022-39176) -### CVE-2022-39067 (2022-11-22) +### CVE-2022-39177 (2022-09-01) -There is a buffer overflow vulnerability in ZTE MF286R. Due to lack of input validation on parameters of the wifi interface, an authenticated attacker could use the vulnerability to perform a denial of service attack. +BlueZ before 5.59 allows physically proximate attackers to cause a denial of service because malformed and invalid capabilities can be processed in profiles/audio/avdtp.c. -- [Live-Hack-CVE/CVE-2022-39067](https://github.com/Live-Hack-CVE/CVE-2022-39067) +- [Live-Hack-CVE/CVE-2022-39177](https://github.com/Live-Hack-CVE/CVE-2022-39177) -### CVE-2022-39070 (2022-11-22) +### CVE-2022-39209 (2022-09-15) -There is an access control vulnerability in some ZTE PON OLT products. Due to improper access control settings, remote attackers could use the vulnerability to log in to the device and execute any operation. +cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. In versions prior to 0.29.0.gfm.6 a polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. Users may verify the patch by running `python3 -c 'print("![l"* 100000 + "\n")' | ./cmark-gfm -e autolink`, which will resource exhaust on unpatched cmark-gfm but render correctly on patched cmark-gfm. This vulnerability has been patched in 0.29.0.gfm.6. Users are advised to upgrade. Users unable to upgrade should disable the use of the autolink extension. -- [Live-Hack-CVE/CVE-2022-39070](https://github.com/Live-Hack-CVE/CVE-2022-39070) +- [Live-Hack-CVE/CVE-2022-39209](https://github.com/Live-Hack-CVE/CVE-2022-39209) -### CVE-2022-39135 (2022-09-11) +### CVE-2022-39237 (2022-10-06) -In Apache Calcite prior to version 1.32.0 the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, which makes them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typically by using Oracle dialect (the first three) or MySQL dialect (the last one), is affected by this vulnerability (the extent of it will depend on the user under which the application is running). From Apache Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity resolution are disabled on the impacted operators. +syslabs/sif is the Singularity Image Format (SIF) reference implementation. In versions prior to 2.8.1the `github.com/sylabs/sif/v2/pkg/integrity` package did not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade. Users unable to upgrade may independently validate that the hash algorithm(s) used for metadata digest(s) and signature hash are cryptographically secure. -- [Live-Hack-CVE/CVE-2022-39135](https://github.com/Live-Hack-CVE/CVE-2022-39135) +- [Live-Hack-CVE/CVE-2022-39237](https://github.com/Live-Hack-CVE/CVE-2022-39237) -### CVE-2022-39178 (2022-11-17) +### CVE-2022-39241 (2022-11-02) -Webvendome - Webvendome Internal Server IP Disclosure. Send GET Request to the request which is shown in the picture. Internal Server IP and Full path disclosure. +Discourse is a platform for community discussion. A malicious admin could use this vulnerability to perform port enumeration on the local host or other hosts on the internal network, as well as against hosts on the Internet. Latest `stable`, `beta`, and `test-passed` versions are now patched. As a workaround, self-hosters can use `DISCOURSE_BLOCKED_IP_BLOCKS` env var (which overrides `blocked_ip_blocks` setting) to stop webhooks from accessing private IPs. -- [Live-Hack-CVE/CVE-2022-39178](https://github.com/Live-Hack-CVE/CVE-2022-39178) +- [Live-Hack-CVE/CVE-2022-39241](https://github.com/Live-Hack-CVE/CVE-2022-39241) -### CVE-2022-39179 (2022-11-17) +### CVE-2022-39244 (2022-10-06) -College Management System v1.0 - Authenticated remote code execution. An admin user (the authentication can be bypassed using SQL Injection that mentioned in my other report) can upload .php file that contains malicious code via student.php file. +PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue. -- [Live-Hack-CVE/CVE-2022-39179](https://github.com/Live-Hack-CVE/CVE-2022-39179) +- [Live-Hack-CVE/CVE-2022-39244](https://github.com/Live-Hack-CVE/CVE-2022-39244) -### CVE-2022-39180 (2022-11-17) +### CVE-2022-39269 (2022-10-06) -College Management System v1.0 - SQL Injection (SQLi). By inserting SQL commands to the username and password fields in the login.php page. +PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability. -- [Live-Hack-CVE/CVE-2022-39180](https://github.com/Live-Hack-CVE/CVE-2022-39180) +- [Live-Hack-CVE/CVE-2022-39269](https://github.com/Live-Hack-CVE/CVE-2022-39269) -### CVE-2022-39181 (2022-11-17) +### CVE-2022-39270 (2022-10-06) -GLPI - Reports plugin for GLPI Reflected Cross-Site-Scripting (RXSS). Type 1: Reflected XSS (or Non-Persistent) - The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or emailed directly to the victim. URLs constructed in this manner constitute the core of many phishing schemes, whereby an attacker convinces a victim to visit a URL that refers to a vulnerable site. After the site reflects the attacker's content back to the victim, the content is executed by the victim's browser. +DiscoTOC is a Discourse theme component that generates a table of contents for topics. Users that can create topics in TOC-enabled categories (and have sufficient trust level - configured in component's settings) are able to inject arbitrary HTML on that topic's page. The issue has been fixed on the `main` branch. Admins can update the theme component through the admin UI (Customize -> Themes -> Components -> DiscoTOC -> Check for Updates). Alternatively, admins can temporarily disable the DiscoTOC theme component. -- [Live-Hack-CVE/CVE-2022-39181](https://github.com/Live-Hack-CVE/CVE-2022-39181) +- [Live-Hack-CVE/CVE-2022-39270](https://github.com/Live-Hack-CVE/CVE-2022-39270) -### CVE-2022-39188 (2022-09-02) +### CVE-2022-39275 (2022-10-06) -An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs. +Saleor is a headless, GraphQL commerce platform. In affected versions some GraphQL mutations were not properly checking the ID type input which allowed to access database objects that the authenticated user may not be allowed to access. This vulnerability can be used to expose the following information: Estimating database row counts from tables with a sequential primary key or Exposing staff user and customer email addresses and full name through the `assignNavigation()` mutation. This issue has been patched in main and backported to multiple releases (3.7.17, 3.6.18, 3.5.23, 3.4.24, 3.3.26, 3.2.14, 3.1.24). Users are advised to upgrade. There are no known workarounds for this issue. -- [Live-Hack-CVE/CVE-2022-39188](https://github.com/Live-Hack-CVE/CVE-2022-39188) +- [Live-Hack-CVE/CVE-2022-39275](https://github.com/Live-Hack-CVE/CVE-2022-39275) -### CVE-2022-39190 (2022-09-02) +### CVE-2022-39280 (2022-10-06) -An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain. +dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. A patch has been applied in version `0.5.2`, all the users are advised to upgrade to `0.5.2` as soon as possible. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed. -- [Live-Hack-CVE/CVE-2022-39190](https://github.com/Live-Hack-CVE/CVE-2022-39190) - -### CVE-2022-39199 (2022-11-22) - - -immudb is a database with built-in cryptographic proof and verification. immudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the reported UUID tricking the client to treat it as a different server thus accepting a state completely irrelevant to the one previously retrieved from the server. This issue has been patched in version 1.4.1. As a workaround, when initializing an immudb client object a custom state handler can be used to store the state. Providing custom implementation that ignores the server UUID can be used to ensure that even if the server changes the UUID, client will still consider it to be the same server. - - -- [Live-Hack-CVE/CVE-2022-39199](https://github.com/Live-Hack-CVE/CVE-2022-39199) - -### CVE-2022-39261 (2022-09-28) - - -Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading. - - -- [Live-Hack-CVE/CVE-2022-39261](https://github.com/Live-Hack-CVE/CVE-2022-39261) - -### CVE-2022-39264 (2022-09-28) - - -nheko is a desktop client for the Matrix communication application. All versions below 0.10.2 are vulnerable homeservers inserting malicious secrets, which could lead to man-in-the-middle attacks. Users can upgrade to version 0.10.2 to protect against this issue. As a workaround, one may apply the patch manually, avoid doing verifications of one's own devices, and/or avoid pressing the request button in the settings menu. - - -- [Live-Hack-CVE/CVE-2022-39264](https://github.com/Live-Hack-CVE/CVE-2022-39264) +- [Live-Hack-CVE/CVE-2022-39280](https://github.com/Live-Hack-CVE/CVE-2022-39280) ### CVE-2022-39286 (2022-10-26) @@ -6574,69 +7615,53 @@ Jupyter Core is a package for the core common functionality of Jupyter projects. - [Live-Hack-CVE/CVE-2022-39286](https://github.com/Live-Hack-CVE/CVE-2022-39286) -### CVE-2022-39325 (2022-11-25) +### CVE-2022-39299 (2022-10-12) -BaserCMS is a content management system with a japanese language focus. In affected versions there is a cross-site scripting vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. Users of baserCMS are advised to upgrade as soon as possible. There are no known workarounds for this vulnerability. +Passport-SAML is a SAML 2.0 authentication provider for Passport, the Node.js authentication library. A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be feasible if generation of a signed message can be triggered. Users should upgrade to passport-saml version 3.2.2 or newer. The issue was also present in the beta releases of `node-saml` before version 4.0.0-beta.5. If you cannot upgrade, disabling SAML authentication may be done as a workaround. -- [Live-Hack-CVE/CVE-2022-39325](https://github.com/Live-Hack-CVE/CVE-2022-39325) +- [Live-Hack-CVE/CVE-2022-39299](https://github.com/Live-Hack-CVE/CVE-2022-39299) -### CVE-2022-39331 (2022-11-25) +### CVE-2022-39343 (2022-11-08) -Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application in the notifications. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue. +Azure RTOS FileX is a FAT-compatible file system that’s fully integrated with Azure RTOS ThreadX. In versions before 6.2.0, the Fault Tolerant feature of Azure RTOS FileX includes integer under and overflows which may be exploited to achieve buffer overflow and modify memory contents. When a valid log file with correct ID and checksum is detected by the `_fx_fault_tolerant_enable` function an attempt to recover the previous failed write operation is taken by call of `_fx_fault_tolerant_apply_logs`. This function iterates through the log entries and performs required recovery operations. When properly crafted a log including entries of type `FX_FAULT_TOLERANT_DIR_LOG_TYPE` may be utilized to introduce unexpected behavior. This issue has been patched in version 6.2.0. A workaround to fix line 218 in fx_fault_tolerant_apply_logs.c is documented in the GHSA. -- [Live-Hack-CVE/CVE-2022-39331](https://github.com/Live-Hack-CVE/CVE-2022-39331) +- [Live-Hack-CVE/CVE-2022-39343](https://github.com/Live-Hack-CVE/CVE-2022-39343) -### CVE-2022-39332 (2022-11-25) +### CVE-2022-39344 (2022-11-04) -Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue. +Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states. -- [Live-Hack-CVE/CVE-2022-39332](https://github.com/Live-Hack-CVE/CVE-2022-39332) +- [Live-Hack-CVE/CVE-2022-39344](https://github.com/Live-Hack-CVE/CVE-2022-39344) -### CVE-2022-39333 (2022-11-25) +### CVE-2022-39352 (2022-11-08) -Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue. +OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation. -- [Live-Hack-CVE/CVE-2022-39333](https://github.com/Live-Hack-CVE/CVE-2022-39333) +- [Live-Hack-CVE/CVE-2022-39352](https://github.com/Live-Hack-CVE/CVE-2022-39352) -### CVE-2022-39334 (2022-11-25) +### CVE-2022-39353 (2022-11-02) -Nextcloud desktop is the desktop sync client for Nextcloud. Versions prior to 3.6.1 would incorrectly trust invalid TLS certificates. A Man-in-the-middle attack is possible in case a user can be made running a nextcloudcmd CLI command locally. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this vulnerability. +xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This breaks the assumption that there is only a single root node in the tree, which led to issuance of CVE-2022-39299 as it is a potential issue for dependents. Update to @xmldom/xmldom@~0.7.7, @xmldom/xmldom@~0.8.4 (dist-tag latest) or @xmldom/xmldom@>=0.9.0-beta.4 (dist-tag next). As a workaround, please one of the following approaches depending on your use case: instead of searching for elements in the whole DOM, only search in the `documentElement`or reject a document with a document that has more then 1 `childNode`. -- [Live-Hack-CVE/CVE-2022-39334](https://github.com/Live-Hack-CVE/CVE-2022-39334) +- [Live-Hack-CVE/CVE-2022-39353](https://github.com/Live-Hack-CVE/CVE-2022-39353) -### CVE-2022-39338 (2022-11-25) +### CVE-2022-39356 (2022-11-02) -user_oidc is an OpenID Connect user backend for Nextcloud. Versions prior to 1.2.1 did not properly validate discovery urls which may lead to a stored cross site scripting attack vector. The impact is limited due to the restrictive CSP that is applied on this endpoint. Additionally this vulnerability has only been shown to be exploitable in the Safari web browser. This issue has been addressed in version 1.2.1. Users are advised to upgrade. Users unable to upgrade should urge their users to avoid using the Safari web browser. +Discourse is a platform for community discussion. Users who receive an invitation link that is not scoped to a single email address can enter any non-admin user's email and gain access to their account when accepting the invitation. All users should upgrade to the latest version. A workaround is temporarily disabling invitations with `SiteSetting.max_invites_per_day = 0` or scope them to individual email addresses. -- [Live-Hack-CVE/CVE-2022-39338](https://github.com/Live-Hack-CVE/CVE-2022-39338) - -### CVE-2022-39339 (2022-11-25) - - -user_oidc is an OpenID Connect user backend for Nextcloud. In versions prior to 1.2.1 sensitive information such as the OIDC client credentials and tokens are sent in plain text of HTTP without TLS. Any malicious actor with access to monitor user traffic may have been able to compromise account security. This issue has been addressed in in user_oidc v1.2.1. Users are advised to upgrade. Users unable to upgrade may use https to access Nextcloud. Set an HTTPS discovery URL in the provider settings (in Nextcloud OIDC admin settings). - - -- [Live-Hack-CVE/CVE-2022-39339](https://github.com/Live-Hack-CVE/CVE-2022-39339) - -### CVE-2022-39348 (2022-10-26) - - -Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response allowing HTML and script injection. In practice this should be very difficult to exploit as being able to modify the Host header of a normal HTTP request implies that one is already in a privileged position. This issue was fixed in version 22.10.0rc1. There are no known workarounds. - - -- [Live-Hack-CVE/CVE-2022-39348](https://github.com/Live-Hack-CVE/CVE-2022-39348) +- [Live-Hack-CVE/CVE-2022-39356](https://github.com/Live-Hack-CVE/CVE-2022-39356) ### CVE-2022-39368 (2022-11-09) @@ -6646,21 +7671,37 @@ Eclipse Californium is a Java implementation of RFC7252 - Constrained Applicatio - [Live-Hack-CVE/CVE-2022-39368](https://github.com/Live-Hack-CVE/CVE-2022-39368) -### CVE-2022-39377 (2022-11-08) +### CVE-2022-39369 (2022-11-01) -sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1. +phpCAS is an authentication library that allows PHP applications to easily authenticate users via a Central Authentication Service (CAS) server. The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authenticate to the service protected by phpCAS. Depending on the settings of the CAS server service registry in worst case this may be any other service URL (if the allowed URLs are configured to "^(https)://.*") or may be strictly limited to known and authorized services in the same SSO federation if proper URL service validation is applied. This vulnerability may allow an attacker to gain access to a victim's account on a vulnerable CASified service without victim's knowledge, when the victim visits attacker's website while being logged in to the same CAS server. phpCAS 1.6.0 is a major version upgrade that starts enforcing service URL discovery validation, because there is unfortunately no 100% safe default config to use in PHP. Starting this version, it is required to pass in an additional service base URL argument when constructing the client class. For more information, please refer to the upgrading doc. This vulnerability only impacts the CAS client that the phpCAS library protects against. The problematic service URL discovery behavior in phpCAS < 1.6.0 will only be disabled, and thus you are not impacted from it, if the phpCAS configuration has the following setup: 1. `phpCAS::setUrl()` is called (a reminder that you have to pass in the full URL of the current page, rather than your service base URL), and 2. `phpCAS::setCallbackURL()` is called, only when the proxy mode is enabled. 3. If your PHP's HTTP header input `X-Forwarded-Host`, `X-Forwarded-Server`, `Host`, `X-Forwarded-Proto`, `X-Forwarded-Protocol` is sanitized before reaching PHP (by a reverse proxy, for example), you will not be impacted by this vulnerability either. If your CAS server service registry is configured to only allow known and trusted service URLs the severity of the vulnerability is reduced substantially in its severity since an attacker must be in control of another authorized service. Otherwise, you should upgrade the library to get the safe service discovery behavior. -- [Live-Hack-CVE/CVE-2022-39377](https://github.com/Live-Hack-CVE/CVE-2022-39377) +- [Live-Hack-CVE/CVE-2022-39369](https://github.com/Live-Hack-CVE/CVE-2022-39369) -### CVE-2022-39383 (2022-11-16) +### CVE-2022-39378 (2022-11-02) -KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. There are no known workarounds for this issue. +Discourse is a platform for community discussion. Under certain conditions, a user badge may have been awarded based on a user's activity in a topic with restricted access. Before this vulnerability was disclosed, the topic title of the topic associated with the user badge may be viewed by any user. If there are sensitive information in the topic title, it will therefore have been exposed. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. There are currently no known workarounds available. -- [Live-Hack-CVE/CVE-2022-39383](https://github.com/Live-Hack-CVE/CVE-2022-39383) +- [Live-Hack-CVE/CVE-2022-39378](https://github.com/Live-Hack-CVE/CVE-2022-39378) + +### CVE-2022-39379 (2022-11-02) + + +Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability. This issue was patched in version 1.15.3. As a workaround do not use `FLUENT_OJ_OPTION_MODE=object`. + + +- [Live-Hack-CVE/CVE-2022-39379](https://github.com/Live-Hack-CVE/CVE-2022-39379) + +### CVE-2022-39382 (2022-11-03) + + +Keystone is a headless CMS for Node.js — built with GraphQL and React.`@keystone-6/core@3.0.0 || 3.0.1` users that use `NODE_ENV` to trigger security-sensitive functionality in their production builds are vulnerable to `NODE_ENV` being inlined to `"development"` for user code, irrespective of what your environment variables. If you do not use `NODE_ENV` in your user code to trigger security-sensitive functionality, you are not impacted by this vulnerability. Any dependencies that use `NODE_ENV` to trigger particular behaviors (optimizations, security or otherwise) should still respect your environment's configured `NODE_ENV` variable. The application's dependencies, as found in `node_modules` (including `@keystone-6/core`), are typically not compiled as part of this process, and thus should be unaffected. We have tested this assumption by verifying that `NODE_ENV=production yarn keystone start` still uses secure cookies when using `statelessSessions`. This vulnerability has been fixed in @keystone-6/core@3.0.2, regression tests have been added for this vulnerability in #8063. + + +- [Live-Hack-CVE/CVE-2022-39382](https://github.com/Live-Hack-CVE/CVE-2022-39382) ### CVE-2022-39385 (2022-11-14) @@ -6670,13 +7711,37 @@ Discourse is the an open source discussion platform. In some rare cases users re - [Live-Hack-CVE/CVE-2022-39385](https://github.com/Live-Hack-CVE/CVE-2022-39385) -### CVE-2022-39389 (2022-11-17) +### CVE-2022-39386 (2022-11-08) -Lightning Network Daemon (lnd) is an implementation of a lightning bitcoin overlay network node. All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction events will be undetected. This can cause loss of funds if a CSV expiry is researched during a breach attempt or a CLTV delta expires forgetting the funds in the HTLC. A patch is available in `lnd` version 0.15.4. Users are advised to upgrade. Users unable to upgrade may use the `lncli updatechanpolicy` RPC call to increase their CLTV value to a very high amount or increase their fee policies. This will prevent nodes from routing through your node, meaning that no pending HTLCs can be present. +@fastify/websocket provides WebSocket support for Fastify. Any application using @fastify/websocket could crash if a specific, malformed packet is sent. All versions of fastify-websocket are also impacted. That module is deprecated, so it will not be patched. This has been patched in version 7.1.1 (fastify v4) and version 5.0.1 (fastify v3). There are currently no known workarounds. However, it should be possible to attach the error handler manually. The recommended path is upgrading to the patched versions. -- [Live-Hack-CVE/CVE-2022-39389](https://github.com/Live-Hack-CVE/CVE-2022-39389) +- [Live-Hack-CVE/CVE-2022-39386](https://github.com/Live-Hack-CVE/CVE-2022-39386) + +### CVE-2022-39387 (2022-11-04) + + +XWiki OIDC has various tools to manipulate OpenID Connect protocol in XWiki. Prior to version 1.29.1, even if a wiki has an OpenID provider configured through its xwiki.properties, it is possible to provide a third party provider its details through request parameters. One can then bypass the XWiki authentication altogether by specifying its own provider through the oidc.endpoint.* request parameters (or by using an XWiki-based OpenID provider with oidc.xwikiprovider. With the same approach, one could also provide a specific group mapping through oidc.groups.mapping that would make his user automatically part of the XWikiAdminGroup. This issue has been patched, please upgrade to 1.29.1. There is no workaround, an upgrade of the authenticator is required. + + +- [Live-Hack-CVE/CVE-2022-39387](https://github.com/Live-Hack-CVE/CVE-2022-39387) + +### CVE-2022-39388 (2022-11-10) + + +Istio is an open platform to connect, manage, and secure microservices. In versions on the 1.15.x branch prior to 1.15.3, a user can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane. Version 1.15.3 contains a patch for this issue. There are no known workarounds. + + +- [Live-Hack-CVE/CVE-2022-39388](https://github.com/Live-Hack-CVE/CVE-2022-39388) + +### CVE-2022-39392 (2022-11-10) + + +Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration, the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requirements for safely executing WebAssembly modules. Wasmtime's default settings require virtual memory page faults to indicate that wasm reads/writes are out-of-bounds, but the pooling allocator's configuration would not create an appropriate virtual memory mapping for this meaning out of bounds reads/writes can successfully read/write memory unrelated to the wasm sandbox within range of the base address of the memory mapping created by the pooling allocator. This bug is not applicable with the default settings of the `wasmtime` crate. This bug can only be triggered by setting `InstanceLimits::memory_pages` to zero. This is expected to be a very rare configuration since this means that wasm modules cannot allocate any pages of linear memory. All wasm modules produced by all current toolchains are highly likely to use linear memory, so it's expected to be unlikely that this configuration is set to zero by any production embedding of Wasmtime. This bug has been patched and users should upgrade to Wasmtime 2.0.2. This bug can be worked around by increasing the `memory_pages` allotment when configuring the pooling allocator to a value greater than zero. If an embedding wishes to still prevent memory from actually being used then the `Store::limiter` method can be used to dynamically disallow growth of memory beyond 0 bytes large. Note that the default `memory_pages` value is greater than zero. + + +- [Live-Hack-CVE/CVE-2022-39392](https://github.com/Live-Hack-CVE/CVE-2022-39392) ### CVE-2022-39393 (2022-11-10) @@ -6686,6 +7751,14 @@ Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there - [Live-Hack-CVE/CVE-2022-39393](https://github.com/Live-Hack-CVE/CVE-2022-39393) +### CVE-2022-39394 (2022-11-10) + + +Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition of the `wasmtime_trap_code` does not match its declared signature in the `wasmtime/trap.h` header file. This discrepancy causes the function implementation to perform a 4-byte write into a 1-byte buffer provided by the caller. This can lead to three zero bytes being written beyond the 1-byte location provided by the caller. This bug has been patched and users should upgrade to Wasmtime 2.0.2. This bug can be worked around by providing a 4-byte buffer casted to a 1-byte buffer when calling `wasmtime_trap_code`. Users of the `wasmtime` crate are not affected by this issue, only users of the C API function `wasmtime_trap_code` are affected. + + +- [Live-Hack-CVE/CVE-2022-39394](https://github.com/Live-Hack-CVE/CVE-2022-39394) + ### CVE-2022-39395 (2022-11-10) @@ -6694,21 +7767,53 @@ Vela is a Pipeline Automation (CI/CD) framework built on Linux container technol - [Live-Hack-CVE/CVE-2022-39395](https://github.com/Live-Hack-CVE/CVE-2022-39395) -### CVE-2022-39397 (2022-11-22) +### CVE-2022-39396 (2022-11-09) -aliyun-oss-client is a rust client for Alibaba Cloud OSS. Users of this library will be affected, the incoming secret will be disclosed unintentionally. This issue has been patched in version 0.8.1. +Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.18, and prior to 5.3.1 on the 5.X branch, are vulnerable to Remote Code Execution via prototype pollution. An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. This issue is patched in version 5.3.1 and in 4.10.18. There are no known workarounds. -- [Live-Hack-CVE/CVE-2022-39397](https://github.com/Live-Hack-CVE/CVE-2022-39397) +- [Live-Hack-CVE/CVE-2022-39396](https://github.com/Live-Hack-CVE/CVE-2022-39396) -### CVE-2022-39833 (2022-11-23) +### CVE-2022-39398 (2022-11-09) -FileCloud Versions 20.2 and later allows remote attackers to potentially cause unauthorized remote code execution and access to reported API endpoints via a crafted HTTP request. +tasklists is a tasklists plugin for GLPI (Kanban). Versions prior to 2.0.3 are vulnerable to Cross-site Scripting. Cross-site Scripting (XSS) - Create XSS in task content (when add it). This issue is patched in version 2.0.3. There are no known workarounds. -- [Live-Hack-CVE/CVE-2022-39833](https://github.com/Live-Hack-CVE/CVE-2022-39833) +- [Live-Hack-CVE/CVE-2022-39398](https://github.com/Live-Hack-CVE/CVE-2022-39398) + +### CVE-2022-39400 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-39400](https://github.com/Live-Hack-CVE/CVE-2022-39400) + +### CVE-2022-39408 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-39408](https://github.com/Live-Hack-CVE/CVE-2022-39408) + +### CVE-2022-39410 (2022-10-18) + + +Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2022-39410](https://github.com/Live-Hack-CVE/CVE-2022-39410) + +### CVE-2022-39800 (2022-10-11) + + +SAP BusinessObjects BI LaunchPad - versions 420, 430, is susceptible to script execution attack by an unauthenticated attacker due to improper sanitization of the user inputs while interacting on the network. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application. + + +- [Live-Hack-CVE/CVE-2022-39800](https://github.com/Live-Hack-CVE/CVE-2022-39800) ### CVE-2022-39834 (2022-11-16) @@ -6718,93 +7823,253 @@ A stored XSS vulnerability was discovered in adminweb/ra/viewendentity.jsp in Pr - [Live-Hack-CVE/CVE-2022-39834](https://github.com/Live-Hack-CVE/CVE-2022-39834) -### CVE-2022-40129 (2022-11-21) +### CVE-2022-39879 (2022-11-09) -A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing Optional Content Group API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. +Improper authorization vulnerability in?CallBGProvider prior to SMR Nov-2022 Release 1 allows local attacker to grant permission for accessing information with phone uid. -- [Live-Hack-CVE/CVE-2022-40129](https://github.com/Live-Hack-CVE/CVE-2022-40129) +- [Live-Hack-CVE/CVE-2022-39879](https://github.com/Live-Hack-CVE/CVE-2022-39879) -### CVE-2022-40130 (2022-11-18) +### CVE-2022-39880 (2022-11-09) -Auth. (subscriber+) Race Condition vulnerability in WP-Polls plugin <= 2.76.0 on WordPress. +Improper input validation vulnerability in DualOutFocusViewer prior to SMR Nov-2022 Release 1 allows local attacker to perform an arbitrary code execution. -- [Live-Hack-CVE/CVE-2022-40130](https://github.com/Live-Hack-CVE/CVE-2022-40130) +- [Live-Hack-CVE/CVE-2022-39880](https://github.com/Live-Hack-CVE/CVE-2022-39880) -### CVE-2022-40152 (2022-09-16) +### CVE-2022-39881 (2022-11-09) -Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. +Improper input validation vulnerability for processing SIB12 PDU in Exynos modems prior to SMR Sep-2022 Release allows remote attacker to read out of bounds memory. -- [Live-Hack-CVE/CVE-2022-40152](https://github.com/Live-Hack-CVE/CVE-2022-40152) +- [Live-Hack-CVE/CVE-2022-39881](https://github.com/Live-Hack-CVE/CVE-2022-39881) -### CVE-2022-40189 (2022-11-22) +### CVE-2022-39882 (2022-11-09) -Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pig Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Pig Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Pig Provider is installed (Pig Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Pig Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version. +Heap overflow vulnerability in sflacf_fal_bytes_peek function in libsmat.so library prior to SMR Nov-2022 Release 1 allows local attacker to execute arbitrary code. -- [Live-Hack-CVE/CVE-2022-40189](https://github.com/Live-Hack-CVE/CVE-2022-40189) +- [Live-Hack-CVE/CVE-2022-39882](https://github.com/Live-Hack-CVE/CVE-2022-39882) -### CVE-2022-40192 (2022-11-17) +### CVE-2022-39883 (2022-11-09) -Cross-Site Request Forgery (CSRF) vulnerability in wpForo Forum plugin <= 2.0.9 on WordPress. +Improper authorization vulnerability in StorageManagerService prior to SMR Nov-2022 Release 1 allows local attacker to call privileged API. -- [Live-Hack-CVE/CVE-2022-40192](https://github.com/Live-Hack-CVE/CVE-2022-40192) +- [Live-Hack-CVE/CVE-2022-39883](https://github.com/Live-Hack-CVE/CVE-2022-39883) -### CVE-2022-40200 (2022-11-17) +### CVE-2022-39884 (2022-11-09) -Auth. (subscriber+) Arbitrary File Upload vulnerability in wpForo Forum plugin <= 2.0.9 on WordPress. +Improper access control vulnerability in IImsService prior to SMR Nov-2022 Release 1 allows local attacker to access to Call information. -- [Live-Hack-CVE/CVE-2022-40200](https://github.com/Live-Hack-CVE/CVE-2022-40200) +- [Live-Hack-CVE/CVE-2022-39884](https://github.com/Live-Hack-CVE/CVE-2022-39884) -### CVE-2022-40216 (2022-11-18) +### CVE-2022-39885 (2022-11-09) -Auth. (subscriber+) Messaging Block Bypass vulnerability in Better Messages plugin <= 1.9.10.69 on WordPress. +Improper access control vulnerability in BootCompletedReceiver_CMCC in DeviceManagement prior to SMR Nov-2022 Release 1 allows local attacker to access to Device information. -- [Live-Hack-CVE/CVE-2022-40216](https://github.com/Live-Hack-CVE/CVE-2022-40216) +- [Live-Hack-CVE/CVE-2022-39885](https://github.com/Live-Hack-CVE/CVE-2022-39885) -### CVE-2022-40228 (2022-11-22) +### CVE-2022-39886 (2022-11-09) -IBM DataPower Gateway 10.0.3.0 through 10.0.4.0, 10.0.1.0 through 10.0.1.9, 2018.4.1.0 through 2018.4.1.22, and 10.5.0.0 through 10.5.0.2 does not invalidate session after a password change which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235527. +Improper access control vulnerability in IpcRxServiceModeBigDataInfo in RIL prior to SMR Nov-2022 Release 1 allows local attacker to access Device information. -- [Live-Hack-CVE/CVE-2022-40228](https://github.com/Live-Hack-CVE/CVE-2022-40228) +- [Live-Hack-CVE/CVE-2022-39886](https://github.com/Live-Hack-CVE/CVE-2022-39886) -### CVE-2022-40266 (2022-11-24) +### CVE-2022-39887 (2022-11-09) -Improper Input Validation vulnerability in Mitsubishi Electric GOT2000 Series GT27 model FTP server versions 01.39.000 and prior, Mitsubishi Electric GOT2000 Series GT25 model FTP server versions 01.39.000 and prior and Mitsubishi Electric GOT2000 Series GT23 model FTP server versions 01.39.000 and prior allows a remote authenticated attacker to cause a Denial of Service condition by sending specially crafted command. +Improper access control vulnerability in clearAllGlobalProxy in MiscPolicy prior to SMR Nov-2022 Release 1 allows local attacker to configure EDM setting. -- [Live-Hack-CVE/CVE-2022-40266](https://github.com/Live-Hack-CVE/CVE-2022-40266) +- [Live-Hack-CVE/CVE-2022-39887](https://github.com/Live-Hack-CVE/CVE-2022-39887) -### CVE-2022-40282 (2022-11-24) +### CVE-2022-39889 (2022-11-09) -The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21. +Improper access control vulnerability in GalaxyWatch4Plugin prior to versions 2.2.11.22101351 and 2.2.12.22101351 allows attackers to access wearable device information. -- [Live-Hack-CVE/CVE-2022-40282](https://github.com/Live-Hack-CVE/CVE-2022-40282) +- [Live-Hack-CVE/CVE-2022-39889](https://github.com/Live-Hack-CVE/CVE-2022-39889) -### CVE-2022-40307 (2022-09-09) +### CVE-2022-39890 (2022-11-09) -An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free. +Improper Authorization in Samsung Billing prior to version 5.0.56.0 allows attacker to get sensitive information. -- [Live-Hack-CVE/CVE-2022-40307](https://github.com/Live-Hack-CVE/CVE-2022-40307) +- [Live-Hack-CVE/CVE-2022-39890](https://github.com/Live-Hack-CVE/CVE-2022-39890) + +### CVE-2022-39891 (2022-11-09) + + +Heap overflow vulnerability in parse_pce function in libsavsaudio.so in Editor Lite prior to version 4.0.41.3 allows attacker to get information. + + +- [Live-Hack-CVE/CVE-2022-39891](https://github.com/Live-Hack-CVE/CVE-2022-39891) + +### CVE-2022-39892 (2022-11-09) + + +Improper access control in Samsung Pass prior to version 4.0.05.1 allows attackers to unauthenticated access via keep open feature. + + +- [Live-Hack-CVE/CVE-2022-39892](https://github.com/Live-Hack-CVE/CVE-2022-39892) + +### CVE-2022-39893 (2022-11-09) + + +Sensitive information exposure vulnerability in FmmBaseModel in Galaxy Buds Pro Manage prior to version 4.1.22092751 allows local attackers with log access permission to get device identifier data through device log. + + +- [Live-Hack-CVE/CVE-2022-39893](https://github.com/Live-Hack-CVE/CVE-2022-39893) + +### CVE-2022-39955 (2022-09-20) + + +The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively. + + +- [Live-Hack-CVE/CVE-2022-39955](https://github.com/Live-Hack-CVE/CVE-2022-39955) + +### CVE-2022-39956 (2022-09-20) + + +The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass for HTTP multipart requests by submitting a payload that uses a character encoding scheme via the Content-Type or the deprecated Content-Transfer-Encoding multipart MIME header fields that will not be decoded and inspected by the web application firewall engine and the rule set. The multipart payload will therefore bypass detection. A vulnerable backend that supports these encoding schemes can potentially be exploited. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised upgrade to 3.2.2 and 3.3.3 respectively. The mitigation against these vulnerabilities depends on the installation of the latest ModSecurity version (v2.9.6 / v3.0.8). + + +- [Live-Hack-CVE/CVE-2022-39956](https://github.com/Live-Hack-CVE/CVE-2022-39956) + +### CVE-2022-39957 (2022-09-20) + + +The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset", this response can not be decoded by the web application firewall. A restricted resource, access to which would ordinarily be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively. + + +- [Live-Hack-CVE/CVE-2022-39957](https://github.com/Live-Hack-CVE/CVE-2022-39957) + +### CVE-2022-39958 (2022-09-20) + + +The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A restricted resource, access to which would ordinarily be detected, may be exfiltrated from the backend, despite being protected by a web application firewall that uses CRS. Short subsections of a restricted resource may bypass pattern matching techniques and allow undetected access. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher. + + +- [Live-Hack-CVE/CVE-2022-39958](https://github.com/Live-Hack-CVE/CVE-2022-39958) + +### CVE-2022-40127 (2022-11-14) + + +A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow Apache Airflow versions prior to 2.4.0. + + +- [Live-Hack-CVE/CVE-2022-40127](https://github.com/Live-Hack-CVE/CVE-2022-40127) + +### CVE-2022-40128 (2022-11-08) + + +Cross-Site Request Forgery (CSRF) vulnerability in Advanced Order Export For WooCommerce plugin <= 3.3.2 on WordPress leading to export file download. + + +- [Live-Hack-CVE/CVE-2022-40128](https://github.com/Live-Hack-CVE/CVE-2022-40128) + +### CVE-2022-40131 (2022-11-03) + + +Cross-Site Request Forgery (CSRF) vulnerability in a3rev Software Page View Count plugin <= 2.5.5 on WordPress allows an attacker to reset the plugin settings. + + +- [Live-Hack-CVE/CVE-2022-40131](https://github.com/Live-Hack-CVE/CVE-2022-40131) + +### CVE-2022-40159 (2022-10-06) + + +** DISPUTED ** This record was originally reported by the oss-fuzz project who failed to consider the security context in which JXPath is intended to be used and failed to contact the JXPath maintainers prior to requesting the CVE allocation. The CVE was then allocated by Google in breach of the CNA rules. After review by the JXPath maintainers, the original report was found to be invalid. + + +- [Live-Hack-CVE/CVE-2022-40159](https://github.com/Live-Hack-CVE/CVE-2022-40159) + +### CVE-2022-40160 (2022-10-06) + + +** DISPUTED ** This record was originally reported by the oss-fuzz project who failed to consider the security context in which JXPath is intended to be used and failed to contact the JXPath maintainers prior to requesting the CVE allocation. The CVE was then allocated by Google in breach of the CNA rules. After review by the JXPath maintainers, the original report was found to be invalid. + + +- [Live-Hack-CVE/CVE-2022-40160](https://github.com/Live-Hack-CVE/CVE-2022-40160) + +### CVE-2022-40186 (2022-09-21) + + +An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assigned to an entity. This may allow for unintended access to key/value paths using that metadata in Vault. + + +- [Live-Hack-CVE/CVE-2022-40186](https://github.com/Live-Hack-CVE/CVE-2022-40186) + +### CVE-2022-40205 (2022-11-08) + + +Insecure direct object references (IDOR) vulnerability in the wpForo Forum plugin <= 2.0.5 on WordPress allows attackers with subscriber or higher user roles to mark any forum post as solved/unsolved. + + +- [Live-Hack-CVE/CVE-2022-40205](https://github.com/Live-Hack-CVE/CVE-2022-40205) + +### CVE-2022-40206 (2022-11-08) + + +Insecure direct object references (IDOR) vulnerability in the wpForo Forum plugin <= 2.0.5 on WordPress allows attackers with subscriber or higher user roles to mark any forum post as private/public. + + +- [Live-Hack-CVE/CVE-2022-40206](https://github.com/Live-Hack-CVE/CVE-2022-40206) + +### CVE-2022-40223 (2022-11-08) + + +Nonce token leakage and missing authorization in SearchWP premium plugin <= 4.2.5 on WordPress leading to plugin settings change. + + +- [Live-Hack-CVE/CVE-2022-40223](https://github.com/Live-Hack-CVE/CVE-2022-40223) + +### CVE-2022-40230 (2022-11-03) + + +"IBM MQ Appliance 9.2 CD, 9.2 LTS, 9.3 CD, and LTS 9.3 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 235532." + + +- [Live-Hack-CVE/CVE-2022-40230](https://github.com/Live-Hack-CVE/CVE-2022-40230) + +### CVE-2022-40235 (2022-11-03) + + +"IBM InfoSphere Information Server 11.7 could allow a user to cause a denial of service by removing the ability to run jobs due to improper input validation. IBM X-Force ID: 235725." + + +- [Live-Hack-CVE/CVE-2022-40235](https://github.com/Live-Hack-CVE/CVE-2022-40235) + +### CVE-2022-40263 (2022-11-04) + + +BD Totalys MultiProcessor, versions 1.70 and earlier, contain hardcoded credentials. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII). Customers using BD Totalys MultiProcessor version 1.70 with Microsoft Windows 10 have additional operating system hardening configurations which increase the attack complexity required to exploit this vulnerability. + + +- [Live-Hack-CVE/CVE-2022-40263](https://github.com/Live-Hack-CVE/CVE-2022-40263) + +### CVE-2022-40276 (2022-11-03) + + +Zettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them. + + +- [Live-Hack-CVE/CVE-2022-40276](https://github.com/Live-Hack-CVE/CVE-2022-40276) ### CVE-2022-40308 (2022-11-15) @@ -6830,429 +8095,598 @@ WoWonder Social Network Platform v4.1.2 was discovered to contain a SQL injectio - [Live-Hack-CVE/CVE-2022-40405](https://github.com/Live-Hack-CVE/CVE-2022-40405) -### CVE-2022-40470 (2022-11-21) +### CVE-2022-40617 (2022-10-31) -Phpgurukul Blood Donor Management System 1.0 allows Cross Site Scripting via Add Blood Group Name Feature. +strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data. -- [Live-Hack-CVE/CVE-2022-40470](https://github.com/Live-Hack-CVE/CVE-2022-40470) +- [Live-Hack-CVE/CVE-2022-40617](https://github.com/Live-Hack-CVE/CVE-2022-40617) -### CVE-2022-40602 (2022-11-21) +### CVE-2022-40632 (2022-11-08) -A flaw in the Zyxel LTE3301-M209 firmware verisons prior to V1.00(ABLG.6)C0 could allow a remote attacker to access the device using an improper pre-configured password if the remote administration feature has been enabled by an authenticated administrator. +Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team wpForo Forum plugin <= 2.0.5 on WordPress leading to topic deletion. -- [Live-Hack-CVE/CVE-2022-40602](https://github.com/Live-Hack-CVE/CVE-2022-40602) +- [Live-Hack-CVE/CVE-2022-40632](https://github.com/Live-Hack-CVE/CVE-2022-40632) -### CVE-2022-40664 (2022-10-12) +### CVE-2022-40747 (2022-11-03) -Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher. +"IBM InfoSphere Information Server 11.7 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 236584." -- [Live-Hack-CVE/CVE-2022-40664](https://github.com/Live-Hack-CVE/CVE-2022-40664) +- [Live-Hack-CVE/CVE-2022-40747](https://github.com/Live-Hack-CVE/CVE-2022-40747) -### CVE-2022-40674 (2022-09-14) +### CVE-2022-40750 (2022-11-11) -libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c. +IBM WebSphere Application Server 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236588. -- [Live-Hack-CVE/CVE-2022-40674](https://github.com/Live-Hack-CVE/CVE-2022-40674) +- [Live-Hack-CVE/CVE-2022-40750](https://github.com/Live-Hack-CVE/CVE-2022-40750) -### CVE-2022-40686 (2022-11-18) +### CVE-2022-40768 (2022-09-18) -Cross-Site Request Forgery (CSRF) vulnerability in Creative Mail plugin <= 1.5.4 on WordPress. +drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case. -- [Live-Hack-CVE/CVE-2022-40686](https://github.com/Live-Hack-CVE/CVE-2022-40686) +- [Live-Hack-CVE/CVE-2022-40768](https://github.com/Live-Hack-CVE/CVE-2022-40768) -### CVE-2022-40687 (2022-11-18) +### CVE-2022-40773 (2022-11-11) -Cross-Site Request Forgery (CSRF) vulnerability in Creative Mail plugin <= 1.5.4 on WordPress. +Zoho ManageEngine ServiceDesk Plus MSP before 10609 and SupportCenter Plus before 11025 are vulnerable to privilege escalation. This allows users to obtain sensitive data during an exportMickeyList export of requests from the list view. -- [Live-Hack-CVE/CVE-2022-40687](https://github.com/Live-Hack-CVE/CVE-2022-40687) +- [Live-Hack-CVE/CVE-2022-40773](https://github.com/Live-Hack-CVE/CVE-2022-40773) -### CVE-2022-40694 (2022-11-17) +### CVE-2022-40981 (2022-11-10) -Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in News Announcement Scroll plugin <= 8.8.8 on WordPress. +All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device. -- [Live-Hack-CVE/CVE-2022-40694](https://github.com/Live-Hack-CVE/CVE-2022-40694) +- [Live-Hack-CVE/CVE-2022-40981](https://github.com/Live-Hack-CVE/CVE-2022-40981) -### CVE-2022-40695 (2022-11-18) +### CVE-2022-41035 (2022-10-11) -Multiple Cross-Site Scripting (CSRF) vulnerabilities in SEO Redirection Plugin plugin <= 8.9 on WordPress. +Microsoft Edge (Chromium-based) Spoofing Vulnerability. -- [Live-Hack-CVE/CVE-2022-40695](https://github.com/Live-Hack-CVE/CVE-2022-40695) +- [Live-Hack-CVE/CVE-2022-41035](https://github.com/Live-Hack-CVE/CVE-2022-41035) -### CVE-2022-40698 (2022-11-18) +### CVE-2022-41039 (2022-11-09) -Auth. (subscriber+) Cross-Site Scripting (XSS) vulnerability in Quiz And Survey Master plugin <= 7.3.10 on WordPress. +Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41044, CVE-2022-41088. -- [Live-Hack-CVE/CVE-2022-40698](https://github.com/Live-Hack-CVE/CVE-2022-40698) +- [Live-Hack-CVE/CVE-2022-41039](https://github.com/Live-Hack-CVE/CVE-2022-41039) -### CVE-2022-40735 (2022-11-14) +### CVE-2022-41044 (2022-11-09) -The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that "(appropriately) short exponents" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together. +Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41039, CVE-2022-41088. -- [Live-Hack-CVE/CVE-2022-40735](https://github.com/Live-Hack-CVE/CVE-2022-40735) +- [Live-Hack-CVE/CVE-2022-41044](https://github.com/Live-Hack-CVE/CVE-2022-41044) -### CVE-2022-40746 (2022-11-21) +### CVE-2022-41045 (2022-11-09) -IBM i Access Family 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.0 could allow a local authenticated attacker to execute arbitrary code on the system, caused by DLL search order hijacking vulnerability. By placing a specially crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 236581. +Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41093, CVE-2022-41100. -- [Live-Hack-CVE/CVE-2022-40746](https://github.com/Live-Hack-CVE/CVE-2022-40746) +- [Live-Hack-CVE/CVE-2022-41045](https://github.com/Live-Hack-CVE/CVE-2022-41045) -### CVE-2022-40751 (2022-11-17) +### CVE-2022-41047 (2022-11-09) -IBM UrbanCode Deploy (UCD) 6.2.7.0 through 6.2.7.17, 7.0.0.0 through 7.0.5.12, 7.1.0.0 through 7.1.2.8, and 7.2.0.0 through 7.2.3.1 could allow a user with administrative privileges including "Manage Security" permissions may be able to recover a credential previously saved for performing authenticated LDAP searches. IBM X-Force ID: 236601. +Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41048. -- [Live-Hack-CVE/CVE-2022-40751](https://github.com/Live-Hack-CVE/CVE-2022-40751) +- [Live-Hack-CVE/CVE-2022-41047](https://github.com/Live-Hack-CVE/CVE-2022-41047) -### CVE-2022-40752 (2022-11-16) +### CVE-2022-41048 (2022-11-09) -IBM InfoSphere DataStage 11.7 is vulnerable to a command injection vulnerability due to improper neutralization of special elements. IBM X-Force ID: 236687. +Microsoft ODBC Driver Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41047. -- [Live-Hack-CVE/CVE-2022-40752](https://github.com/Live-Hack-CVE/CVE-2022-40752) +- [Live-Hack-CVE/CVE-2022-41048](https://github.com/Live-Hack-CVE/CVE-2022-41048) -### CVE-2022-40753 (2022-11-15) +### CVE-2022-41049 (2022-11-09) -IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 236688. +Windows Mark of the Web Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-41091. -- [Live-Hack-CVE/CVE-2022-40753](https://github.com/Live-Hack-CVE/CVE-2022-40753) +- [Live-Hack-CVE/CVE-2022-41049](https://github.com/Live-Hack-CVE/CVE-2022-41049) -### CVE-2022-40765 (2022-11-21) +### CVE-2022-41050 (2022-11-09) -A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters. +Windows Extensible File Allocation Table Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-40765](https://github.com/Live-Hack-CVE/CVE-2022-40765) +- [Live-Hack-CVE/CVE-2022-41050](https://github.com/Live-Hack-CVE/CVE-2022-41050) -### CVE-2022-40770 (2022-11-22) +### CVE-2022-41051 (2022-11-09) -Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to authenticated command injection. This can be exploited by high-privileged users. +Azure RTOS GUIX Studio Remote Code Execution Vulnerability. -- [Live-Hack-CVE/CVE-2022-40770](https://github.com/Live-Hack-CVE/CVE-2022-40770) +- [Live-Hack-CVE/CVE-2022-41051](https://github.com/Live-Hack-CVE/CVE-2022-41051) -### CVE-2022-40771 (2022-11-23) +### CVE-2022-41052 (2022-11-09) -Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to an XML External Entity attack that leads to Information Disclosure. +Windows Graphics Component Remote Code Execution Vulnerability. -- [Live-Hack-CVE/CVE-2022-40771](https://github.com/Live-Hack-CVE/CVE-2022-40771) +- [Live-Hack-CVE/CVE-2022-41052](https://github.com/Live-Hack-CVE/CVE-2022-41052) -### CVE-2022-40772 (2022-11-23) +### CVE-2022-41053 (2022-11-09) -Zoho ManageEngine ServiceDesk Plus versions 13010 and prior are vulnerable to a validation bypass that allows users to access sensitive data via the report module. +Windows Kerberos Denial of Service Vulnerability. -- [Live-Hack-CVE/CVE-2022-40772](https://github.com/Live-Hack-CVE/CVE-2022-40772) +- [Live-Hack-CVE/CVE-2022-41053](https://github.com/Live-Hack-CVE/CVE-2022-41053) -### CVE-2022-40797 (2022-11-09) +### CVE-2022-41054 (2022-11-09) -Roxy Fileman 1.4.6 allows Remote Code Execution via a .phar upload, because the default FORBIDDEN_UPLOADS value in conf.json only blocks .php, .php4, and .php5 files. (Visiting any .phar file invokes the PHP interpreter in some realistic web-server configurations.) +Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-40797](https://github.com/Live-Hack-CVE/CVE-2022-40797) +- [Live-Hack-CVE/CVE-2022-41054](https://github.com/Live-Hack-CVE/CVE-2022-41054) -### CVE-2022-40799 (2022-11-28) +### CVE-2022-41055 (2022-11-09) -Data Integrity Failure in 'Backup Config' in D-Link DNR-322L <= 2.60B15 allows an authenticated attacker to execute OS level commands on the device. +Windows Human Interface Device Information Disclosure Vulnerability. -- [Live-Hack-CVE/CVE-2022-40799](https://github.com/Live-Hack-CVE/CVE-2022-40799) +- [Live-Hack-CVE/CVE-2022-41055](https://github.com/Live-Hack-CVE/CVE-2022-41055) -### CVE-2022-40842 (2022-11-21) +### CVE-2022-41056 (2022-11-09) -ndk design NdkAdvancedCustomizationFields 3.5.0 is vulnerable to Server-side request forgery (SSRF) via rotateimg.php. +Network Policy Server (NPS) RADIUS Protocol Denial of Service Vulnerability. -- [Live-Hack-CVE/CVE-2022-40842](https://github.com/Live-Hack-CVE/CVE-2022-40842) +- [Live-Hack-CVE/CVE-2022-41056](https://github.com/Live-Hack-CVE/CVE-2022-41056) -### CVE-2022-40843 (2022-11-14) +### CVE-2022-41058 (2022-11-09) -The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account. +Windows Network Address Translation (NAT) Denial of Service Vulnerability. -- [Live-Hack-CVE/CVE-2022-40843](https://github.com/Live-Hack-CVE/CVE-2022-40843) +- [Live-Hack-CVE/CVE-2022-41058](https://github.com/Live-Hack-CVE/CVE-2022-41058) -### CVE-2022-40844 (2022-11-14) +### CVE-2022-41060 (2022-11-09) -In Tenda (Shenzhen Tenda Technology Co., Ltd) AC1200 Router model W15Ev2 V15.11.0.10(1576), a Stored Cross Site Scripting (XSS) issue exists allowing an attacker to execute JavaScript code via the applications website filtering tab, specifically the URL body. +Microsoft Word Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-41103. -- [Live-Hack-CVE/CVE-2022-40844](https://github.com/Live-Hack-CVE/CVE-2022-40844) +- [Live-Hack-CVE/CVE-2022-41060](https://github.com/Live-Hack-CVE/CVE-2022-41060) -### CVE-2022-40845 (2022-11-14) +### CVE-2022-41061 (2022-11-09) -The Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576) is affected by a password exposure vulnerability. When combined with the improper authorization/improper session management vulnerability, an attacker with access to the router may be able to expose sensitive information which they're not explicitly authorized to have. +Microsoft Word Remote Code Execution Vulnerability. -- [Live-Hack-CVE/CVE-2022-40845](https://github.com/Live-Hack-CVE/CVE-2022-40845) +- [Live-Hack-CVE/CVE-2022-41061](https://github.com/Live-Hack-CVE/CVE-2022-41061) -### CVE-2022-40846 (2022-11-14) +### CVE-2022-41062 (2022-11-09) -In Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576), a Stored Cross Site Scripting (XSS) vulnerability exists allowing an attacker to execute JavaScript code via the applications stored hostname. +Microsoft SharePoint Server Remote Code Execution Vulnerability. -- [Live-Hack-CVE/CVE-2022-40846](https://github.com/Live-Hack-CVE/CVE-2022-40846) +- [Live-Hack-CVE/CVE-2022-41062](https://github.com/Live-Hack-CVE/CVE-2022-41062) -### CVE-2022-40847 (2022-11-14) +### CVE-2022-41063 (2022-11-09) -In Tenda AC1200 Router model W15Ev2 V15.11.0.10(1576), there exists a command injection vulnerability in the function formSetFixTools. This vulnerability allows attackers to run arbitrary commands on the server via the hostname parameter. +Microsoft Excel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41106. -- [Live-Hack-CVE/CVE-2022-40847](https://github.com/Live-Hack-CVE/CVE-2022-40847) +- [Live-Hack-CVE/CVE-2022-41063](https://github.com/Live-Hack-CVE/CVE-2022-41063) -### CVE-2022-40870 (2022-11-22) +### CVE-2022-41066 (2022-11-09) -The Web Client of Parallels Remote Application Server v18.0 is vulnerable to Host Header Injection attacks. This vulnerability allows attackers to execute arbitrary commands via a crafted payload injected into the Host header. +Microsoft Business Central Information Disclosure Vulnerability. -- [Live-Hack-CVE/CVE-2022-40870](https://github.com/Live-Hack-CVE/CVE-2022-40870) +- [Live-Hack-CVE/CVE-2022-41066](https://github.com/Live-Hack-CVE/CVE-2022-41066) -### CVE-2022-40881 (2022-11-16) +### CVE-2022-41073 (2022-11-09) -SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php +Windows Print Spooler Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-40881](https://github.com/Live-Hack-CVE/CVE-2022-40881) +- [Live-Hack-CVE/CVE-2022-41073](https://github.com/Live-Hack-CVE/CVE-2022-41073) -### CVE-2022-40903 (2022-11-14) +### CVE-2022-41080 (2022-11-09) -Aiphone GT-DMB-N 3-in-1 Video Entrance Station with NFC Reader 1.0.3 does not mitigate against repeated failed access attempts, which allows an attacker to gain administrative privileges. +Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41123. -- [Live-Hack-CVE/CVE-2022-40903](https://github.com/Live-Hack-CVE/CVE-2022-40903) +- [Live-Hack-CVE/CVE-2022-41080](https://github.com/Live-Hack-CVE/CVE-2022-41080) +- [ohnonoyesyes/CVE-2022-41080](https://github.com/ohnonoyesyes/CVE-2022-41080) -### CVE-2022-40954 (2022-11-22) +### CVE-2022-41085 (2022-11-09) -Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Spark Provider, Apache Airflow allows an attacker to read arbtrary files in the task execution context, without write access to DAG files. This issue affects Spark Provider versions prior to 4.0.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case Spark Provider is installed (Spark Provider 4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the Spark Provider version 4.0.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version that has lower version of the Spark Provider installed). +Azure CycleCloud Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-40954](https://github.com/Live-Hack-CVE/CVE-2022-40954) +- [Live-Hack-CVE/CVE-2022-41085](https://github.com/Live-Hack-CVE/CVE-2022-41085) -### CVE-2022-40963 (2022-11-18) +### CVE-2022-41086 (2022-11-09) -Multiple Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerabilities in WP Page Builder plugin <= 1.2.6 on WordPress. +Windows Group Policy Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37992. -- [Live-Hack-CVE/CVE-2022-40963](https://github.com/Live-Hack-CVE/CVE-2022-40963) +- [Live-Hack-CVE/CVE-2022-41086](https://github.com/Live-Hack-CVE/CVE-2022-41086) -### CVE-2022-40976 (2022-11-24) +### CVE-2022-41088 (2022-11-09) -A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability. +Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41039, CVE-2022-41044. -- [Live-Hack-CVE/CVE-2022-40976](https://github.com/Live-Hack-CVE/CVE-2022-40976) +- [Live-Hack-CVE/CVE-2022-41088](https://github.com/Live-Hack-CVE/CVE-2022-41088) -### CVE-2022-40977 (2022-11-24) +### CVE-2022-41090 (2022-11-09) -A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability. +Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-41116. -- [Live-Hack-CVE/CVE-2022-40977](https://github.com/Live-Hack-CVE/CVE-2022-40977) +- [Live-Hack-CVE/CVE-2022-41090](https://github.com/Live-Hack-CVE/CVE-2022-41090) -### CVE-2022-41064 (2022-11-09) +### CVE-2022-41091 (2022-11-09) -.NET Framework Information Disclosure Vulnerability. +Windows Mark of the Web Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-41049. -- [Live-Hack-CVE/CVE-2022-41064](https://github.com/Live-Hack-CVE/CVE-2022-41064) +- [Live-Hack-CVE/CVE-2022-41091](https://github.com/Live-Hack-CVE/CVE-2022-41091) -### CVE-2022-41131 (2022-11-22) +### CVE-2022-41092 (2022-11-09) -Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Hive Provider, Apache Airflow allows an attacker to execute arbtrary commands in the task execution context, without write access to DAG files. This issue affects Hive Provider versions prior to 4.1.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case HIve Provider is installed (Hive Provider 4.1.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the HIve Provider version 4.1.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version that has lower version of the Hive Provider installed). +Windows Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41109. -- [Live-Hack-CVE/CVE-2022-41131](https://github.com/Live-Hack-CVE/CVE-2022-41131) +- [Live-Hack-CVE/CVE-2022-41092](https://github.com/Live-Hack-CVE/CVE-2022-41092) -### CVE-2022-41132 (2022-11-17) +### CVE-2022-41093 (2022-11-09) -Unauthenticated Plugin Settings Change Leading To Stored XSS Vulnerability in Ezoic plugin <= 2.8.8 on WordPress. +Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41045, CVE-2022-41100. -- [Live-Hack-CVE/CVE-2022-41132](https://github.com/Live-Hack-CVE/CVE-2022-41132) +- [Live-Hack-CVE/CVE-2022-41093](https://github.com/Live-Hack-CVE/CVE-2022-41093) -### CVE-2022-41135 (2022-11-18) +### CVE-2022-41095 (2022-11-09) -Unauth. Plugin Settings Change vulnerability in Modula plugin <= 2.6.9 on WordPress. +Windows Digital Media Receiver Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-41135](https://github.com/Live-Hack-CVE/CVE-2022-41135) +- [Live-Hack-CVE/CVE-2022-41095](https://github.com/Live-Hack-CVE/CVE-2022-41095) -### CVE-2022-41155 (2022-11-18) +### CVE-2022-41096 (2022-11-09) -Block BYPASS vulnerability in iQ Block Country plugin <= 1.2.18 on WordPress. +Microsoft DWM Core Library Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-41155](https://github.com/Live-Hack-CVE/CVE-2022-41155) +- [Live-Hack-CVE/CVE-2022-41096](https://github.com/Live-Hack-CVE/CVE-2022-41096) -### CVE-2022-41156 (2022-11-25) +### CVE-2022-41097 (2022-11-09) -Remote code execution vulnerability due to insufficient verification of URLs, etc. in OndiskPlayerAgent. A remote attacker could exploit the vulnerability to cause remote code execution by causing an arbitrary user to download and execute malicious code. +Network Policy Server (NPS) RADIUS Protocol Information Disclosure Vulnerability. -- [Live-Hack-CVE/CVE-2022-41156](https://github.com/Live-Hack-CVE/CVE-2022-41156) +- [Live-Hack-CVE/CVE-2022-41097](https://github.com/Live-Hack-CVE/CVE-2022-41097) -### CVE-2022-41157 (2022-11-25) +### CVE-2022-41098 (2022-11-09) -A specific file on the sERP server if Kyungrinara(ERP solution) has a fixed password with the SYSTEM authority. This vulnerability could allow attackers to leak or steal sensitive information or execute malicious commands. +Windows GDI+ Information Disclosure Vulnerability. -- [Live-Hack-CVE/CVE-2022-41157](https://github.com/Live-Hack-CVE/CVE-2022-41157) +- [Live-Hack-CVE/CVE-2022-41098](https://github.com/Live-Hack-CVE/CVE-2022-41098) -### CVE-2022-41158 (2022-11-25) +### CVE-2022-41099 (2022-11-09) -Remote code execution vulnerability can be achieved by using cookie values as paths to a file by this builder program. A remote attacker could exploit the vulnerability to execute or inject malicious code. +BitLocker Security Feature Bypass Vulnerability. -- [Live-Hack-CVE/CVE-2022-41158](https://github.com/Live-Hack-CVE/CVE-2022-41158) +- [Live-Hack-CVE/CVE-2022-41099](https://github.com/Live-Hack-CVE/CVE-2022-41099) -### CVE-2022-41223 (2022-11-21) +### CVE-2022-41100 (2022-11-09) -The Director database component of MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker to conduct a code-injection attack via crafted data due to insufficient restrictions on the database data type. +Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41045, CVE-2022-41093. -- [Live-Hack-CVE/CVE-2022-41223](https://github.com/Live-Hack-CVE/CVE-2022-41223) +- [Live-Hack-CVE/CVE-2022-41100](https://github.com/Live-Hack-CVE/CVE-2022-41100) -### CVE-2022-41235 (2022-09-21) +### CVE-2022-41101 (2022-11-09) -Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system. +Windows Overlay Filter Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41102. -- [Live-Hack-CVE/CVE-2022-41235](https://github.com/Live-Hack-CVE/CVE-2022-41235) +- [Live-Hack-CVE/CVE-2022-41101](https://github.com/Live-Hack-CVE/CVE-2022-41101) -### CVE-2022-41315 (2022-11-17) +### CVE-2022-41102 (2022-11-09) -Auth. Stored Cross-Site Scripting (XSS) vulnerability in Ezoic plugin <= 2.8.8 on WordPress. +Windows Overlay Filter Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41101. -- [Live-Hack-CVE/CVE-2022-41315](https://github.com/Live-Hack-CVE/CVE-2022-41315) +- [Live-Hack-CVE/CVE-2022-41102](https://github.com/Live-Hack-CVE/CVE-2022-41102) -### CVE-2022-41319 (2022-09-23) +### CVE-2022-41103 (2022-11-09) -A Reflected Cross-Site Scripting (XSS) vulnerability affects the Veritas Desktop Laptop Option (DLO) application login page (aka the DLOServer/restore/login.jsp URI). This affects versions before 9.8 (e.g., 9.1 through 9.7). +Microsoft Word Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-41060. -- [Live-Hack-CVE/CVE-2022-41319](https://github.com/Live-Hack-CVE/CVE-2022-41319) +- [Live-Hack-CVE/CVE-2022-41103](https://github.com/Live-Hack-CVE/CVE-2022-41103) -### CVE-2022-41323 (2022-10-16) +### CVE-2022-41104 (2022-11-09) -In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. +Microsoft Excel Security Feature Bypass Vulnerability. -- [Live-Hack-CVE/CVE-2022-41323](https://github.com/Live-Hack-CVE/CVE-2022-41323) +- [Live-Hack-CVE/CVE-2022-41104](https://github.com/Live-Hack-CVE/CVE-2022-41104) -### CVE-2022-41326 (2022-11-21) +### CVE-2022-41105 (2022-11-09) -The web conferencing component of Mitel MiCollab through 9.6.0.13 could allow an unauthenticated attacker to upload arbitrary scripts due to improper authorization controls. A successful exploit could allow remote code execution within the context of the application. +Microsoft Excel Information Disclosure Vulnerability. -- [Live-Hack-CVE/CVE-2022-41326](https://github.com/Live-Hack-CVE/CVE-2022-41326) +- [Live-Hack-CVE/CVE-2022-41105](https://github.com/Live-Hack-CVE/CVE-2022-41105) -### CVE-2022-41343 (2022-09-25) +### CVE-2022-41106 (2022-11-09) -registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a @font-face rule. +Microsoft Excel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41063. -- [Live-Hack-CVE/CVE-2022-41343](https://github.com/Live-Hack-CVE/CVE-2022-41343) +- [Live-Hack-CVE/CVE-2022-41106](https://github.com/Live-Hack-CVE/CVE-2022-41106) -### CVE-2022-41395 (2022-11-14) +### CVE-2022-41107 (2022-11-09) -Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a command injection vulnerability via the dmzHost parameter in the setDMZ function. +Microsoft Office Graphics Remote Code Execution Vulnerability. -- [Live-Hack-CVE/CVE-2022-41395](https://github.com/Live-Hack-CVE/CVE-2022-41395) +- [Live-Hack-CVE/CVE-2022-41107](https://github.com/Live-Hack-CVE/CVE-2022-41107) -### CVE-2022-41396 (2022-11-14) +### CVE-2022-41109 (2022-11-09) -Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain multiple command injection vulnerabilities in the function setIPsecTunnelList via the IPsecLocalNet and IPsecRemoteNet parameters. +Windows Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41092. -- [Live-Hack-CVE/CVE-2022-41396](https://github.com/Live-Hack-CVE/CVE-2022-41396) +- [Live-Hack-CVE/CVE-2022-41109](https://github.com/Live-Hack-CVE/CVE-2022-41109) -### CVE-2022-41404 (2022-10-11) +### CVE-2022-41113 (2022-11-09) -An issue in the fetch() method in the BasicProfile class of org.ini4j before v0.5.4 allows attackers to cause a Denial of Service (DoS) via unspecified vectors. +Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-41404](https://github.com/Live-Hack-CVE/CVE-2022-41404) +- [Live-Hack-CVE/CVE-2022-41113](https://github.com/Live-Hack-CVE/CVE-2022-41113) -### CVE-2022-41445 (2022-11-22) +### CVE-2022-41114 (2022-11-09) -A cross-site scripting (XSS) vulnerability in Record Management System using CodeIgniter 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Add Subject page. +Windows Bind Filter Driver Elevation of Privilege Vulnerability. -- [Live-Hack-CVE/CVE-2022-41445](https://github.com/Live-Hack-CVE/CVE-2022-41445) +- [Live-Hack-CVE/CVE-2022-41114](https://github.com/Live-Hack-CVE/CVE-2022-41114) -### CVE-2022-41446 (2022-11-22) +### CVE-2022-41116 (2022-11-09) -An access control issue in /Admin/dashboard.php of Record Management System using CodeIgniter v1.0 allows attackers to access and modify user data. +Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-41090. -- [Live-Hack-CVE/CVE-2022-41446](https://github.com/Live-Hack-CVE/CVE-2022-41446) +- [Live-Hack-CVE/CVE-2022-41116](https://github.com/Live-Hack-CVE/CVE-2022-41116) + +### CVE-2022-41118 (2022-11-09) + + +Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41128. + + +- [Live-Hack-CVE/CVE-2022-41118](https://github.com/Live-Hack-CVE/CVE-2022-41118) + +### CVE-2022-41119 (2022-11-09) + + +Visual Studio Remote Code Execution Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41119](https://github.com/Live-Hack-CVE/CVE-2022-41119) + +### CVE-2022-41120 (2022-11-09) + + +Microsoft Windows Sysmon Elevation of Privilege Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41120](https://github.com/Live-Hack-CVE/CVE-2022-41120) + +### CVE-2022-41122 (2022-11-09) + + +Microsoft SharePoint Server Spoofing Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41122](https://github.com/Live-Hack-CVE/CVE-2022-41122) + +### CVE-2022-41123 (2022-11-09) + + +Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41080. + + +- [Live-Hack-CVE/CVE-2022-41123](https://github.com/Live-Hack-CVE/CVE-2022-41123) + +### CVE-2022-41125 (2022-11-09) + + +Windows CNG Key Isolation Service Elevation of Privilege Vulnerability. + + +- [Live-Hack-CVE/CVE-2022-41125](https://github.com/Live-Hack-CVE/CVE-2022-41125) + +### CVE-2022-41128 (2022-11-09) + + +Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118. + + +- [Live-Hack-CVE/CVE-2022-41128](https://github.com/Live-Hack-CVE/CVE-2022-41128) + +### CVE-2022-41136 (2022-11-08) + + +Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in Vladimir Anokhin's Shortcodes Ultimate plugin <= 5.12.0 on WordPress. + + +- [Live-Hack-CVE/CVE-2022-41136](https://github.com/Live-Hack-CVE/CVE-2022-41136) + +### CVE-2022-41203 (2022-11-08) + + +In some workflow of SAP BusinessObjects BI Platform (Central Management Console and BI LaunchPad), an authenticated attacker with low privileges can intercept a serialized object in the parameters and substitute with another malicious serialized object, which leads to deserialization of untrusted data vulnerability. This could highly compromise the Confidentiality, Integrity, and Availability of the system. + + +- [Live-Hack-CVE/CVE-2022-41203](https://github.com/Live-Hack-CVE/CVE-2022-41203) + +### CVE-2022-41207 (2022-11-08) + + +SAP Biller Direct allows an unauthenticated attacker to craft a legitimate looking URL. When clicked by an unsuspecting victim, it will use an unsensitized parameter to redirect the victim to a malicious site of the attacker's choosing which can result in disclosure or modification of the victim's information. + + +- [Live-Hack-CVE/CVE-2022-41207](https://github.com/Live-Hack-CVE/CVE-2022-41207) + +### CVE-2022-41212 (2022-11-08) + + +Due to insufficient input validation, SAP NetWeaver Application Server ABAP and ABAP Platform allows an attacker with high level privileges to use a remote enabled function to read a file which is otherwise restricted. On successful exploitation an attacker can completely compromise the confidentiality of the application. + + +- [Live-Hack-CVE/CVE-2022-41212](https://github.com/Live-Hack-CVE/CVE-2022-41212) + +### CVE-2022-41222 (2022-09-21) + + +mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move. + + +- [Live-Hack-CVE/CVE-2022-41222](https://github.com/Live-Hack-CVE/CVE-2022-41222) + +### CVE-2022-41259 (2022-11-08) + + +SAP SQL Anywhere - version 17.0, allows an authenticated attacker to prevent legitimate users from accessing a SQL Anywhere database server by crashing the server with some queries that use an ARRAY constructor. + + +- [Live-Hack-CVE/CVE-2022-41259](https://github.com/Live-Hack-CVE/CVE-2022-41259) + +### CVE-2022-41339 (2022-11-11) + + +In Zoho ManageEngine Mobile Device Manager Plus before 10.1.2207.5, the User Administration module allows privilege escalation. + + +- [Live-Hack-CVE/CVE-2022-41339](https://github.com/Live-Hack-CVE/CVE-2022-41339) + +### CVE-2022-41352 (2022-09-25) + + +An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavisd automatically prefers it over cpio. + + +- [Live-Hack-CVE/CVE-2022-41352](https://github.com/Live-Hack-CVE/CVE-2022-41352) + +### CVE-2022-41392 (2022-10-07) + + +A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings. + + +- [Live-Hack-CVE/CVE-2022-41392](https://github.com/Live-Hack-CVE/CVE-2022-41392) + +### CVE-2022-41432 (2022-11-07) + + +EyesOfNetwork Web Interface v5.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /module/report_event/index.php. + + +- [Live-Hack-CVE/CVE-2022-41432](https://github.com/Live-Hack-CVE/CVE-2022-41432) + +### CVE-2022-41433 (2022-11-07) + + +EyesOfNetwork Web Interface v5.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /module/admin_bp/add_application.php. + + +- [Live-Hack-CVE/CVE-2022-41433](https://github.com/Live-Hack-CVE/CVE-2022-41433) + +### CVE-2022-41434 (2022-11-07) + + +EyesOfNetwork Web Interface v5.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /lilac/main.php. + + +- [Live-Hack-CVE/CVE-2022-41434](https://github.com/Live-Hack-CVE/CVE-2022-41434) + +### CVE-2022-41435 (2022-11-03) + + +OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments. + + +- [Live-Hack-CVE/CVE-2022-41435](https://github.com/Live-Hack-CVE/CVE-2022-41435) + +### CVE-2022-41483 (2022-10-13) + + +Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 was discovered to contain a buffer overflow in the 0x4a12cc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. + + +- [Live-Hack-CVE/CVE-2022-41483](https://github.com/Live-Hack-CVE/CVE-2022-41483) ### CVE-2022-41540 (2022-10-18) @@ -7262,197 +8696,141 @@ The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic key - [efchatz/easy-exploits](https://github.com/efchatz/easy-exploits) -### CVE-2022-41558 (2022-11-15) +### CVE-2022-41607 (2022-11-10) -The Visualizations component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Desktop, TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute Stored Cross Site Scripting (XSS) on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 11.4.4 and below, TIBCO Spotfire Analyst: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Analyst: version 12.1.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 12.1.0 and below, TIBCO Spotfire Desktop: versions 11.4.4 and below, TIBCO Spotfire Desktop: versions 11.5.0, 11.6.0, 11.7.0, 11.8.0, 12.0.0, and 12.0.1, TIBCO Spotfire Desktop: version 12.1.0, TIBCO Spotfire Server: versions 11.4.8 and below, TIBCO Spotfire Server: versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.7.0, 11.8.0, 11.8.1, 12.0.0, and 12.0.1, and TIBCO Spotfire Server: version 12.1.0. +All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more. -- [Live-Hack-CVE/CVE-2022-41558](https://github.com/Live-Hack-CVE/CVE-2022-41558) +- [Live-Hack-CVE/CVE-2022-41607](https://github.com/Live-Hack-CVE/CVE-2022-41607) -### CVE-2022-41609 (2022-11-18) +### CVE-2022-41611 (2022-11-15) -Auth. (subscriber+) Server-Side Request Forgery (SSRF) vulnerability in Better Messages plugin 1.9.10.68 on WordPress. +Cross-site Scripting (XSS) vulnerability in BlueSpiceDiscovery skin of BlueSpice allows user with admin privileges to inject arbitrary HTML into the main navigation of the application. -- [Live-Hack-CVE/CVE-2022-41609](https://github.com/Live-Hack-CVE/CVE-2022-41609) +- [Live-Hack-CVE/CVE-2022-41611](https://github.com/Live-Hack-CVE/CVE-2022-41611) -### CVE-2022-41615 (2022-11-18) +### CVE-2022-41666 (2022-11-04) -Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) vulnerability in Store Locator plugin <= 1.4.5 on WordPress. +A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). -- [Live-Hack-CVE/CVE-2022-41615](https://github.com/Live-Hack-CVE/CVE-2022-41615) +- [Live-Hack-CVE/CVE-2022-41666](https://github.com/Live-Hack-CVE/CVE-2022-41666) -### CVE-2022-41618 (2022-11-18) +### CVE-2022-41667 (2022-11-04) -Unauthenticated Error Log Disclosure vulnerability in Media Library Assistant plugin <= 3.00 on WordPress. +A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that allows adversaries with local user privileges to load a malicious DLL which could lead to execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). -- [Live-Hack-CVE/CVE-2022-41618](https://github.com/Live-Hack-CVE/CVE-2022-41618) +- [Live-Hack-CVE/CVE-2022-41667](https://github.com/Live-Hack-CVE/CVE-2022-41667) -### CVE-2022-41634 (2022-11-18) +### CVE-2022-41668 (2022-11-04) -Cross-Site Request Forgery (CSRF) vulnerability in Media Library Folders plugin <= 7.1.1 on WordPress. +A CWE-704: Incorrect Project Conversion vulnerability exists that allows adversaries with local user privileges to load a project file from an adversary-controlled network share which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). -- [Live-Hack-CVE/CVE-2022-41634](https://github.com/Live-Hack-CVE/CVE-2022-41634) +- [Live-Hack-CVE/CVE-2022-41668](https://github.com/Live-Hack-CVE/CVE-2022-41668) -### CVE-2022-41643 (2022-11-18) +### CVE-2022-41669 (2022-11-04) -Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Accessibility plugin <= 1.0.3 on WordPress. +A CWE-347: Improper Verification of Cryptographic Signature vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load a malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). -- [Live-Hack-CVE/CVE-2022-41643](https://github.com/Live-Hack-CVE/CVE-2022-41643) +- [Live-Hack-CVE/CVE-2022-41669](https://github.com/Live-Hack-CVE/CVE-2022-41669) -### CVE-2022-41652 (2022-11-18) +### CVE-2022-41670 (2022-11-04) -Bypass vulnerability in Quiz And Survey Master plugin <= 7.3.10 on WordPress. +A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in the SGIUtility component that allows adversaries with local user privileges to load malicious DLL which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). -- [Live-Hack-CVE/CVE-2022-41652](https://github.com/Live-Hack-CVE/CVE-2022-41652) +- [Live-Hack-CVE/CVE-2022-41670](https://github.com/Live-Hack-CVE/CVE-2022-41670) -### CVE-2022-41655 (2022-11-18) +### CVE-2022-41671 (2022-11-04) -Auth. (subscriber+) Sensitive Data Exposure vulnerability in Phone Orders for WooCommerce plugin <= 3.7.1 on WordPress. +A CWE-89: Improper Neutralization of Special Elements used in SQL Command (‘SQL Injection’) vulnerability exists that allows adversaries with local user privileges to craft a malicious SQL query and execute as part of project migration which could result in execution of malicious code. Affected Products: EcoStruxure Operator Terminal Expert(V3.3 Hotfix 1 or prior), Pro-face BLUE(V3.3 Hotfix1 or prior). -- [Live-Hack-CVE/CVE-2022-41655](https://github.com/Live-Hack-CVE/CVE-2022-41655) +- [Live-Hack-CVE/CVE-2022-41671](https://github.com/Live-Hack-CVE/CVE-2022-41671) -### CVE-2022-41674 (2022-10-13) +### CVE-2022-41710 (2022-11-03) -An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c. +Markdownify version 1.4.1 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Markdownify. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them. -- [Live-Hack-CVE/CVE-2022-41674](https://github.com/Live-Hack-CVE/CVE-2022-41674) +- [Live-Hack-CVE/CVE-2022-41710](https://github.com/Live-Hack-CVE/CVE-2022-41710) -### CVE-2022-41675 (2022-11-28) +### CVE-2022-41713 (2022-11-03) -A remote attacker with general user privilege can inject malicious code in the form content of Raiden MAILD Mail Server website. Other users export form content as CSV file can trigger arbitrary code execution and allow the attacker to perform arbitrary system operation or disrupt service on the user side. +deep-object-diff version 1.1.0 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the '__proto__' property to be edited. -- [Live-Hack-CVE/CVE-2022-41675](https://github.com/Live-Hack-CVE/CVE-2022-41675) +- [Live-Hack-CVE/CVE-2022-41713](https://github.com/Live-Hack-CVE/CVE-2022-41713) -### CVE-2022-41676 (2022-11-28) +### CVE-2022-41714 (2022-11-03) -Raiden MAILD Mail Server website mail field has insufficient filtering for user input. A remote attacker with general user privilege can send email using the website with malicious JavaScript in the input field, which triggers XSS (Reflected Cross-Site Scripting) attack to the mail recipient. +fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited. -- [Live-Hack-CVE/CVE-2022-41676](https://github.com/Live-Hack-CVE/CVE-2022-41676) +- [Live-Hack-CVE/CVE-2022-41714](https://github.com/Live-Hack-CVE/CVE-2022-41714) -### CVE-2022-41685 (2022-11-18) +### CVE-2022-41716 (2022-11-02) -Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Viszt Péter's Integration for Szamlazz.hu & WooCommerce plugin <= 5.6.3.2 and Csomagpontok és szállítási címkék WooCommerce-hez plugin <= 1.9.0.2 on WordPress. +Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D". -- [Live-Hack-CVE/CVE-2022-41685](https://github.com/Live-Hack-CVE/CVE-2022-41685) +- [Live-Hack-CVE/CVE-2022-41716](https://github.com/Live-Hack-CVE/CVE-2022-41716) -### CVE-2022-41692 (2022-11-18) +### CVE-2022-41719 (2022-11-10) -Missing Authorization vulnerability in Appointment Hour Booking plugin <= 1.3.71 on WordPress. +Unmarshal can panic on some inputs, possibly allowing for denial of service attacks. -- [Live-Hack-CVE/CVE-2022-41692](https://github.com/Live-Hack-CVE/CVE-2022-41692) +- [Live-Hack-CVE/CVE-2022-41719](https://github.com/Live-Hack-CVE/CVE-2022-41719) -### CVE-2022-41705 (2022-11-25) +### CVE-2022-41757 (2022-11-08) -Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users. +An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to obtain write access to read-only memory, or obtain access to already freed memory. This affects Valhall r29p0 through r38p1 before r38p2, and r39p0 before r40p0. -- [Live-Hack-CVE/CVE-2022-41705](https://github.com/Live-Hack-CVE/CVE-2022-41705) +- [Live-Hack-CVE/CVE-2022-41757](https://github.com/Live-Hack-CVE/CVE-2022-41757) -### CVE-2022-41706 (2022-11-25) +### CVE-2022-41789 (2022-11-15) -Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method. +Cross-site Scripting (XSS) vulnerability in BlueSpiceDiscovery skin of BlueSpice allows logged in user with edit permissions to inject arbitrary HTML into the default page header of a wikipage. -- [Live-Hack-CVE/CVE-2022-41706](https://github.com/Live-Hack-CVE/CVE-2022-41706) +- [Live-Hack-CVE/CVE-2022-41789](https://github.com/Live-Hack-CVE/CVE-2022-41789) -### CVE-2022-41712 (2022-11-25) +### CVE-2022-41814 (2022-11-15) -Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter. +Cross-site Scripting (XSS) vulnerability in BlueSpiceFoundation extension of BlueSpice allows user with regular account and edit permissions to inject arbitrary HTML into the history view of a wikipage. -- [Live-Hack-CVE/CVE-2022-41712](https://github.com/Live-Hack-CVE/CVE-2022-41712) +- [Live-Hack-CVE/CVE-2022-41814](https://github.com/Live-Hack-CVE/CVE-2022-41814) -### CVE-2022-41742 (2022-10-19) +### CVE-2022-41828 (2022-09-29) -NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted audio or video file. The issue affects only NGINX products that are built with the module ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module. +In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name. -- [Live-Hack-CVE/CVE-2022-41742](https://github.com/Live-Hack-CVE/CVE-2022-41742) - -### CVE-2022-41775 (2022-11-17) - - -SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network - - -- [Live-Hack-CVE/CVE-2022-41775](https://github.com/Live-Hack-CVE/CVE-2022-41775) - -### CVE-2022-41781 (2022-11-18) - - -Broken Access Control vulnerability in Permalink Manager Lite plugin <= 2.2.20 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-41781](https://github.com/Live-Hack-CVE/CVE-2022-41781) - -### CVE-2022-41788 (2022-11-18) - - -Auth. (subscriber+) Cross-Site Scripting (XSS) vulnerability in Soledad premium theme <= 8.2.5 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-41788](https://github.com/Live-Hack-CVE/CVE-2022-41788) - -### CVE-2022-41791 (2022-11-17) - - -Auth. (subscriber+) CSV Injection vulnerability in ProfileGrid plugin <= 5.1.6 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-41791](https://github.com/Live-Hack-CVE/CVE-2022-41791) - -### CVE-2022-41805 (2022-11-18) - - -Cross-Site Request Forgery (CSRF) vulnerability in Booster for WooCommerce plugin <= 5.6.6 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-41805](https://github.com/Live-Hack-CVE/CVE-2022-41805) - -### CVE-2022-41839 (2022-11-18) - - -Broken Access Control vulnerability in WordPress LoginPress plugin <= 1.6.2 on WordPress leading to unauth. changing of Opt-In or Opt-Out tracking settings. - - -- [Live-Hack-CVE/CVE-2022-41839](https://github.com/Live-Hack-CVE/CVE-2022-41839) - -### CVE-2022-41840 (2022-11-18) - - -Unauth. Directory Traversal vulnerability in Welcart eCommerce plugin <= 2.7.7 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-41840](https://github.com/Live-Hack-CVE/CVE-2022-41840) +- [Live-Hack-CVE/CVE-2022-41828](https://github.com/Live-Hack-CVE/CVE-2022-41828) ### CVE-2022-41873 (2022-11-10) @@ -7462,205 +8840,77 @@ Contiki-NG is an open-source, cross-platform operating system for Next-Generatio - [Live-Hack-CVE/CVE-2022-41873](https://github.com/Live-Hack-CVE/CVE-2022-41873) -### CVE-2022-41875 (2022-11-23) +### CVE-2022-41874 (2022-11-09) -A remote code execution (RCE) vulnerability in Optica allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Specially crafted JSON payloads may lead to RCE (remote code execution) on the attacked system running Optica. The vulnerability was patched in v. 0.10.2, where the call to the function `oj.load` was changed to `oj.safe_load`. +Tauri is a framework for building binaries for all major desktop platforms. In versions prior to 1.0.7 and 1.1.2, Tauri is vulnerable to an Incorrectly-Resolved Name. Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it is possible to partially bypass the `fs` scope definition. It is not possible to traverse into arbitrary paths, as the issue is limited to neighboring files and sub folders of already allowed paths. The impact differs on Windows, MacOS and Linux due to different specifications of valid path characters. This bypass depends on the file picker dialog or dragged files, as user selected paths are automatically added to the allow list at runtime. A successful bypass requires the user to select a pre-existing malicious file or directory during the file picker dialog and an adversary controlled logic to access these files. The issue has been patched in versions 1.0.7, 1.1.2 and 1.2.0. As a workaround, disable the dialog and fileDropEnabled component inside the tauri.conf.json. -- [Live-Hack-CVE/CVE-2022-41875](https://github.com/Live-Hack-CVE/CVE-2022-41875) +- [Live-Hack-CVE/CVE-2022-41874](https://github.com/Live-Hack-CVE/CVE-2022-41874) -### CVE-2022-41880 (2022-11-18) +### CVE-2022-41876 (2022-11-10) -TensorFlow is an open source platform for machine learning. When the `BaseCandidateSamplerOp` function receives a value in `true_classes` larger than `range_max`, a heap oob read occurs. We have patched the issue in GitHub commit b389f5c944cadfdfe599b3f1e4026e036f30d2d4. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +ezplatform-graphql is a GraphQL server implementation for Ibexa DXP and Ibexa Open Source. Versions prior to 2.3.12 and 1.0.13 are subject to Insecure Storage of Sensitive Information. Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically administrators and editors. This issue has been patched in versions 2.3.12, and 1.0.13 on the 1.X branch. Users unable to upgrade can remove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer. -- [Live-Hack-CVE/CVE-2022-41880](https://github.com/Live-Hack-CVE/CVE-2022-41880) +- [Live-Hack-CVE/CVE-2022-41876](https://github.com/Live-Hack-CVE/CVE-2022-41876) -### CVE-2022-41883 (2022-11-18) +### CVE-2022-41878 (2022-11-10) -TensorFlow is an open source platform for machine learning. When ops that have specified input sizes receive a differing number of inputs, the executor will crash. We have patched the issue in GitHub commit f5381e0e10b5a61344109c1b7c174c68110f7629. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.2 or 4.10.19, keywords that are specified in the Parse Server option `requestKeywordDenylist` can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the `requestKeywordDenylist` option. This issue is fixed in versions 4.10.19, and 5.3.2. If upgrade is not possible, the following Workarounds may be applied: Configure your firewall to only allow trusted servers to make request to the Parse Server Cloud Code Webhooks API, or block the API completely if you are not using the feature. -- [Live-Hack-CVE/CVE-2022-41883](https://github.com/Live-Hack-CVE/CVE-2022-41883) +- [Live-Hack-CVE/CVE-2022-41878](https://github.com/Live-Hack-CVE/CVE-2022-41878) -### CVE-2022-41884 (2022-11-18) +### CVE-2022-41879 (2022-11-10) -TensorFlow is an open source platform for machine learning. If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. We have patched the issue in GitHub commit 2b56169c16e375c521a3bc8ea658811cc0793784. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.3 or 4.10.20, a compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option. This issue has been patched in versions 5.3.3 and 4.10.20. There are no known workarounds. -- [Live-Hack-CVE/CVE-2022-41884](https://github.com/Live-Hack-CVE/CVE-2022-41884) +- [Live-Hack-CVE/CVE-2022-41879](https://github.com/Live-Hack-CVE/CVE-2022-41879) -### CVE-2022-41885 (2022-11-18) +### CVE-2022-41882 (2022-11-11) -TensorFlow is an open source platform for machine learning. When `tf.raw_ops.FusedResizeAndPadConv2D` is given a large tensor shape, it overflows. We have patched the issue in GitHub commit d66e1d568275e6a2947de97dca7a102a211e01ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. In version 3.6.0, if a user received a malicious file share and has it synced locally or the virtual filesystem enabled and clicked a nc://open/ link it will open the default editor for the file type of the shared file, which on Windows can also sometimes mean that a file depending on the type, e.g. "vbs", is being executed. It is recommended that the Nextcloud Desktop client is upgraded to version 3.6.1. As a workaround, users can block the Nextcloud Desktop client 3.6.0 by setting the `minimum.supported.desktop.version` system config to `3.6.1` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing files can still be used. Another workaround would be to enforce shares to be accepted by setting the `sharing.force_share_accept` system config to `true` on the server, so new files designed to use this attack vector are not downloaded anymore. Already existing shares can still be abused. -- [Live-Hack-CVE/CVE-2022-41885](https://github.com/Live-Hack-CVE/CVE-2022-41885) +- [Live-Hack-CVE/CVE-2022-41882](https://github.com/Live-Hack-CVE/CVE-2022-41882) -### CVE-2022-41886 (2022-11-18) +### CVE-2022-41892 (2022-11-10) -TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ImageProjectiveTransformV2` is given a large output shape, it overflows. We have patched the issue in GitHub commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +Arches is a web platform for creating, managing, & visualizing geospatial data. Versions prior to 6.1.2, 6.2.1, and 7.1.2 are vulnerable to SQL Injection. With a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database. This issue is fixed in version 7.12, 6.2.1, and 6.1.2. Users are recommended to upgrade as soon as possible. There are no workarounds. -- [Live-Hack-CVE/CVE-2022-41886](https://github.com/Live-Hack-CVE/CVE-2022-41886) +- [Live-Hack-CVE/CVE-2022-41892](https://github.com/Live-Hack-CVE/CVE-2022-41892) -### CVE-2022-41887 (2022-11-18) +### CVE-2022-41904 (2022-11-11) -TensorFlow is an open source platform for machine learning. `tf.keras.losses.poisson` receives a `y_pred` and `y_true` that are passed through `functor::mul` in `BinaryOp`. If the resulting dimensions overflow an `int32`, TensorFlow will crash due to a size mismatch during broadcast assignment. We have patched the issue in GitHub commit c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 and 2.9.3, as these are also affected and still in supported range. However, we will not cherrypick this commit into TensorFlow 2.8.x, as it depends on Eigen behavior that changed between 2.8 and 2.9. +Element iOS is an iOS Matrix client provided by Element. It is based on MatrixSDK. Prior to version 1.9.7, events encrypted using Megolm for which trust could not be established did not get decorated accordingly (with warning shields). Therefore a malicious homeserver could inject messages into the room without the user being alerted that the messages were not sent by a verified group member, even if the user has previously verified all group members. This issue has been patched in Element iOS 1.9.7. There are currently no known workarounds. -- [Live-Hack-CVE/CVE-2022-41887](https://github.com/Live-Hack-CVE/CVE-2022-41887) +- [Live-Hack-CVE/CVE-2022-41904](https://github.com/Live-Hack-CVE/CVE-2022-41904) -### CVE-2022-41888 (2022-11-18) +### CVE-2022-41905 (2022-11-11) -TensorFlow is an open source platform for machine learning. When running on GPU, `tf.image.generate_bounding_box_proposals` receives a `scores` input that must be of rank 4 but is not checked. We have patched the issue in GitHub commit cf35502463a88ca7185a99daa7031df60b3c1c98. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +WsgiDAV is a generic and extendable WebDAV server based on WSGI. Implementations using this library with directory browsing enabled may be susceptible to Cross Site Scripting (XSS) attacks. This issue has been patched, users can upgrade to version 4.1.0. As a workaround, set `dir_browser.enable = False` in the configuration. -- [Live-Hack-CVE/CVE-2022-41888](https://github.com/Live-Hack-CVE/CVE-2022-41888) +- [Live-Hack-CVE/CVE-2022-41905](https://github.com/Live-Hack-CVE/CVE-2022-41905) -### CVE-2022-41889 (2022-11-18) +### CVE-2022-41906 (2022-11-11) -TensorFlow is an open source platform for machine learning. If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in `tf.compat.v1.extract_volume_patches` by passing in quantized tensors as input `ksizes`. We have patched the issue in GitHub commit e9e95553e5411834d215e6770c81a83a3d0866ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. +OpenSearch Notifications is a notifications plugin for OpenSearch that enables other plugins to send notifications via Email, Slack, Amazon Chime, Custom web-hook etc channels. A potential SSRF issue in OpenSearch Notifications Plugin 2.2.0 and below could allow an existing privileged user to enumerate listening services or interact with configured resources via HTTP requests exceeding the Notification plugin's intended scope. OpenSearch 2.2.1+ contains the fix for this issue. There are currently no recommended workarounds. -- [Live-Hack-CVE/CVE-2022-41889](https://github.com/Live-Hack-CVE/CVE-2022-41889) - -### CVE-2022-41890 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `BCast::ToShape` is given input larger than an `int32`, it will crash, despite being supposed to handle up to an `int64`. An example can be seen in `tf.experimental.numpy.outer` by passing in large input to the input `b`. We have patched the issue in GitHub commit 8310bf8dd188ff780e7fc53245058215a05bdbe5. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41890](https://github.com/Live-Hack-CVE/CVE-2022-41890) - -### CVE-2022-41891 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41891](https://github.com/Live-Hack-CVE/CVE-2022-41891) - -### CVE-2022-41893 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListResize` is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41893](https://github.com/Live-Hack-CVE/CVE-2022-41893) - -### CVE-2022-41894 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. The reference kernel of the `CONV_3D_TRANSPOSE` TensorFlow Lite operator wrongly increments the data_ptr when adding the bias to the result. Instead of `data_ptr += num_channels;` it should be `data_ptr += output_num_channels;` as if the number of input channels is different than the number of output channels, the wrong result will be returned and a buffer overflow will occur if num_channels > output_num_channels. An attacker can craft a model with a specific number of input channels. It is then possible to write specific values through the bias of the layer outside the bounds of the buffer. This attack only works if the reference kernel resolver is used in the interpreter. We have patched the issue in GitHub commit 72c0bdcb25305b0b36842d746cc61d72658d2941. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41894](https://github.com/Live-Hack-CVE/CVE-2022-41894) - -### CVE-2022-41895 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `MirrorPadGrad` is given outsize input `paddings`, TensorFlow will give a heap OOB error. We have patched the issue in GitHub commit 717ca98d8c3bba348ff62281fdf38dcb5ea1ec92. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41895](https://github.com/Live-Hack-CVE/CVE-2022-41895) - -### CVE-2022-41896 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `ThreadUnsafeUnigramCandidateSampler` is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash. We have patched the issue in GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41896](https://github.com/Live-Hack-CVE/CVE-2022-41896) - -### CVE-2022-41897 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `FractionMaxPoolGrad` is given outsize inputs `row_pooling_sequence` and `col_pooling_sequence`, TensorFlow will crash. We have patched the issue in GitHub commit d71090c3e5ca325bdf4b02eb236cfb3ee823e927. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41897](https://github.com/Live-Hack-CVE/CVE-2022-41897) - -### CVE-2022-41898 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. If `SparseFillEmptyRowsGrad` is given empty inputs, TensorFlow will crash. We have patched the issue in GitHub commit af4a6a3c8b95022c351edae94560acc61253a1b8. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41898](https://github.com/Live-Hack-CVE/CVE-2022-41898) - -### CVE-2022-41899 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in `SdcaOptimizer`. We have patched the issue in GitHub commit 80ff197d03db2a70c6a111f97dcdacad1b0babfa. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41899](https://github.com/Live-Hack-CVE/CVE-2022-41899) - -### CVE-2022-41900 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. The security vulnerability results in FractionalMax(AVG)Pool with illegal pooling_ratio. Attackers using Tensorflow can exploit the vulnerability. They can access heap memory which is not in the control of user, leading to a crash or remote code execution. We have patched the issue in GitHub commit 216525144ee7c910296f5b05d214ca1327c9ce48. The fix will be included in TensorFlow 2.11.0. We will also cherry pick this commit on TensorFlow 2.10.1. - - -- [Live-Hack-CVE/CVE-2022-41900](https://github.com/Live-Hack-CVE/CVE-2022-41900) - -### CVE-2022-41901 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in `tf.raw_ops.SparseMatrixNNZ`. We have patched the issue in GitHub commit f856d02e5322821aad155dad9b3acab1e9f5d693. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41901](https://github.com/Live-Hack-CVE/CVE-2022-41901) - -### CVE-2022-41907 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ResizeNearestNeighborGrad` is given a large `size` input, it overflows. We have patched the issue in GitHub commit 00c821af032ba9e5f5fa3fe14690c8d28a657624. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41907](https://github.com/Live-Hack-CVE/CVE-2022-41907) - -### CVE-2022-41908 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in `tf.raw_ops.PyFunc`. We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41908](https://github.com/Live-Hack-CVE/CVE-2022-41908) - -### CVE-2022-41909 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. An input `encoded` that is not a valid `CompositeTensorVariant` tensor will trigger a segfault in `tf.raw_ops.CompositeTensorVariantToComponents`. We have patched the issue in GitHub commits bf594d08d377dc6a3354d9fdb494b32d45f91971 and 660ce5a89eb6766834bdc303d2ab3902aef99d3d. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41909](https://github.com/Live-Hack-CVE/CVE-2022-41909) - -### CVE-2022-41911 (2022-11-18) - - -TensorFlow is an open source platform for machine learning. When printing a tensor, we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions from `char` to `bool` are undefined if the `char` is not `0` or `1`, so sanitizers/fuzzers will crash. The issue has been patched in GitHub commit `1be74370327`. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, TensorFlow 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. - - -- [Live-Hack-CVE/CVE-2022-41911](https://github.com/Live-Hack-CVE/CVE-2022-41911) - -### CVE-2022-41912 (2022-11-28) - - -The crewjam/saml go library prior to version 0.4.9 is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. This issue has been corrected in version 0.4.9. There are no workarounds other than upgrading to a fixed version. - - -- [Live-Hack-CVE/CVE-2022-41912](https://github.com/Live-Hack-CVE/CVE-2022-41912) +- [Live-Hack-CVE/CVE-2022-41906](https://github.com/Live-Hack-CVE/CVE-2022-41906) ### CVE-2022-41913 (2022-11-14) @@ -7670,357 +8920,45 @@ Discourse-calendar is a plugin for the Discourse messaging platform which adds t - [Live-Hack-CVE/CVE-2022-41913](https://github.com/Live-Hack-CVE/CVE-2022-41913) -### CVE-2022-41914 (2022-11-16) +### CVE-2022-41978 (2022-11-09) -Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constant time. Therefore, it might theoretically be possible for an attacker to infer the value of the token by performing a sophisticated timing analysis on a large number of failing requests. If successful, this would allow the attacker to impersonate the SCIM client for its abilities to read and update user accounts in the Zulip organization. Organizations where SCIM account management has not been enabled are not affected. +Auth. (subscriber+) Arbitrary Options Update vulnerability in Zoho CRM Lead Magnet plugin <= 1.7.5.8 on WordPress. -- [Live-Hack-CVE/CVE-2022-41914](https://github.com/Live-Hack-CVE/CVE-2022-41914) +- [Live-Hack-CVE/CVE-2022-41978](https://github.com/Live-Hack-CVE/CVE-2022-41978) -### CVE-2022-41916 (2022-11-15) +### CVE-2022-41980 (2022-11-08) -Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue. +Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Mantenimiento web plugin <= 0.13 on WordPress. -- [Live-Hack-CVE/CVE-2022-41916](https://github.com/Live-Hack-CVE/CVE-2022-41916) +- [Live-Hack-CVE/CVE-2022-41980](https://github.com/Live-Hack-CVE/CVE-2022-41980) -### CVE-2022-41917 (2022-11-15) +### CVE-2022-42000 (2022-11-15) -OpenSearch is a community-driven, open source fork of Elasticsearch and Kibana. OpenSearch allows users to specify a local file when defining text analyzers to process data for text analysis. An issue in the implementation of this feature allows certain specially crafted queries to return a response containing the first line of text from arbitrary files. The list of potentially impacted files is limited to text files with read permissions allowed in the Java Security Manager policy configuration. OpenSearch version 1.3.7 and 2.4.0 contain a fix for this issue. Users are advised to upgrade. There are no known workarounds for this issue. +Cross-site Scripting (XSS) vulnerability in BlueSpiceSocialProfile extension of BlueSpice allows user with comment permissions to inject arbitrary HTML into the comment section of a wikipage. -- [Live-Hack-CVE/CVE-2022-41917](https://github.com/Live-Hack-CVE/CVE-2022-41917) +- [Live-Hack-CVE/CVE-2022-42000](https://github.com/Live-Hack-CVE/CVE-2022-42000) -### CVE-2022-41919 (2022-11-22) +### CVE-2022-42001 (2022-11-15) -Fastify is a web framework with minimal overhead and plugin architecture. The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s essence as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used to invoke routes that only accepts `application/json` content type, thus bypassing any CORS protection, and therefore they could lead to a Cross-Site Request Forgery attack. This issue has been patched in version 4.10.2 and 3.29.4. As a workaround, implement Cross-Site Request Forgery protection using `@fastify/csrf'. +Cross-site Scripting (XSS) vulnerability in BlueSpiceBookshelf extension of BlueSpice allows user with regular account and edit permissions to inject arbitrary HTML into the book navigation. -- [Live-Hack-CVE/CVE-2022-41919](https://github.com/Live-Hack-CVE/CVE-2022-41919) +- [Live-Hack-CVE/CVE-2022-42001](https://github.com/Live-Hack-CVE/CVE-2022-42001) -### CVE-2022-41920 (2022-11-17) +### CVE-2022-42075 (2022-10-07) -Lancet is a general utility library for the go programming language. Affected versions are subject to a ZipSlip issue when using the fileutil package to unzip files. This issue has been addressed and a fix will be included in versions 2.1.10 and 1.3.4. Users are advised to upgrade. There are no known workarounds for this issue. +Wedding Planner v1.0 is vulnerable to arbitrary code execution. -- [Live-Hack-CVE/CVE-2022-41920](https://github.com/Live-Hack-CVE/CVE-2022-41920) - -### CVE-2022-41921 (2022-11-28) - - -Discourse is an open-source discussion platform. Prior to version 2.9.0.beta13, users can post chat messages of an unlimited length, which can cause a denial of service for other users when posting huge amounts of text. Users should upgrade to version 2.9.0.beta13, where a limit has been introduced. No known workarounds are available. - - -- [Live-Hack-CVE/CVE-2022-41921](https://github.com/Live-Hack-CVE/CVE-2022-41921) - -### CVE-2022-41922 (2022-11-23) - - -`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27. - - -- [Live-Hack-CVE/CVE-2022-41922](https://github.com/Live-Hack-CVE/CVE-2022-41922) - -### CVE-2022-41923 (2022-11-23) - - -Grails Spring Security Core plugin is vulnerable to privilege escalation. The vulnerability allows an attacker access to one endpoint (i.e. the targeted endpoint) using the authorization requirements of a different endpoint (i.e. the donor endpoint). In some Grails framework applications, access to the targeted endpoint will be granted based on meeting the authorization requirements of the donor endpoint, which can result in a privilege escalation attack. This vulnerability has been patched in grails-spring-security-core versions 3.3.2, 4.0.5 and 5.1.1. Impacted Applications: Grails Spring Security Core plugin versions: 1.x 2.x >=3.0.0 <3.3.2 >=4.0.0 <4.0.5 >=5.0.0 <5.1.1 We strongly suggest that all Grails framework applications using the Grails Spring Security Core plugin be updated to a patched release of the plugin. Workarounds: Users should create a subclass extending one of the following classes from the `grails.plugin.springsecurity.web.access.intercept` package, depending on their security configuration: * `AnnotationFilterInvocationDefinition` * `InterceptUrlMapFilterInvocationDefinition` * `RequestmapFilterInvocationDefinition` In each case, the subclass should override the `calculateUri` method like so: ``` @Override protected String calculateUri(HttpServletRequest request) { UrlPathHelper.defaultInstance.getRequestUri(request) } ``` This should be considered a temporary measure, as the patched versions of grails-spring-security-core deprecates the `calculateUri` method. Once upgraded to a patched version of the plugin, this workaround is no longer needed. The workaround is especially important for version 2.x, as no patch is available version 2.x of the GSSC plugin. - - -- [Live-Hack-CVE/CVE-2022-41923](https://github.com/Live-Hack-CVE/CVE-2022-41923) - -### CVE-2022-41924 (2022-11-23) - - -A vulnerability identified in the Tailscale Windows client allows a malicious website to reconfigure the Tailscale daemon `tailscaled`, which can then be used to remotely execute code. In the Tailscale Windows client, the local API was bound to a local TCP socket, and communicated with the Windows client GUI in cleartext with no Host header verification. This allowed an attacker-controlled website visited by the node to rebind DNS to an attacker-controlled DNS server, and then make local API requests in the client, including changing the coordination server to an attacker-controlled coordination server. An attacker-controlled coordination server can send malicious URL responses to the client, including pushing executables or installing an SMB share. These allow the attacker to remotely execute code on the node. All Windows clients prior to version v.1.32.3 are affected. If you are running Tailscale on Windows, upgrade to v1.32.3 or later to remediate the issue. - - -- [Live-Hack-CVE/CVE-2022-41924](https://github.com/Live-Hack-CVE/CVE-2022-41924) - -### CVE-2022-41925 (2022-11-23) - - -A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node’s Tailscale environment variables. An attacker with access to the peer API on a node could use that access to read the node’s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user’s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop. All Tailscale clients prior to version v1.32.3 are affected. Upgrade to v1.32.3 or later to remediate the issue. - - -- [Live-Hack-CVE/CVE-2022-41925](https://github.com/Live-Hack-CVE/CVE-2022-41925) - -### CVE-2022-41926 (2022-11-25) - - -Nextcould talk android is the android OS implementation of the nextcloud talk chat system. In affected versions the receiver is not protected by broadcastPermission allowing malicious apps to monitor communication. It is recommended that the Nextcloud Talk Android is upgraded to 14.1.0. There are no known workarounds for this issue. - - -- [Live-Hack-CVE/CVE-2022-41926](https://github.com/Live-Hack-CVE/CVE-2022-41926) - -### CVE-2022-41927 (2022-11-23) - - -XWiki Platform is vulnerable to Cross-Site Request Forgery (CSRF) that may allow attackers to delete or rename tags without needing any confirmation. The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1. Workarounds: It's possible to patch existing instances directly by editing the page Main.Tags and add this kind of check, in the code for renaming and for deleting: ``` #if (!$services.csrf.isTokenValid($request.get('form_token'))) #set ($discard = $response.sendError(401, "Wrong CSRF token")) #end ``` - - -- [Live-Hack-CVE/CVE-2022-41927](https://github.com/Live-Hack-CVE/CVE-2022-41927) - -### CVE-2022-41928 (2022-11-23) - - -XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangerous payload in the `height` or `alt` macro properties. This has been patched in versions 13.10.7, 14.4.2, and 14.5. The issue can be fixed on a running wiki by updating `XWiki.AttachmentSelector` with the versions below: - 14.5-rc-1+: https://github.com/xwiki/xwiki-platform/commit/eb15147adf94bddb92626f862c1710d45bcd64a7#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 14.4.2+: https://github.com/xwiki/xwiki-platform/commit/c02f8eb1f3c953d124f2c097021536f8bc00fa8d#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 13.10.7+: https://github.com/xwiki/xwiki-platform/commit/efd0df0468d46149ba68b66660b93f31b6318515#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - - -- [Live-Hack-CVE/CVE-2022-41928](https://github.com/Live-Hack-CVE/CVE-2022-41928) - -### CVE-2022-41929 (2022-11-23) - - -org.xwiki.platform:xwiki-platform-oldcore is missing authorization in User#setDisabledStatus, which may allow an incorrectly authorized user with only Script rights to enable or disable a user. This operation is meant to only be available for users with admin rights. This problem has been patched in XWiki 13.10.7, 14.4.2 and 14.5RC1. - - -- [Live-Hack-CVE/CVE-2022-41929](https://github.com/Live-Hack-CVE/CVE-2022-41929) - -### CVE-2022-41930 (2022-11-23) - - -org.xwiki.platform:xwiki-platform-user-profile-ui is missing authorization to enable or disable users. Any user (logged in or not) with access to the page XWiki.XWikiUserProfileSheet can enable or disable any user profile. This might allow to a disabled user to re-enable themselves, or to an attacker to disable any user of the wiki. The problem has been patched in XWiki 13.10.7, 14.5RC1 and 14.4.2. Workarounds: The problem can be patched immediately by editing the page `XWiki.XWikiUserProfileSheet` in the wiki and by performing the changes contained in https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa. - - -- [Live-Hack-CVE/CVE-2022-41930](https://github.com/Live-Hack-CVE/CVE-2022-41930) - -### CVE-2022-41931 (2022-11-23) - - -xwiki-platform-icon-ui is vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'). Any user with view rights on commonly accessible documents including the icon picker macro can execute arbitrary Groovy, Python or Velocity code in XWiki due to improper neutralization of the macro parameters of the icon picker macro. The problem has been patched in XWiki 13.10.7, 14.5 and 14.4.2. Workarounds: The [patch](https://github.com/xwiki/xwiki-platform/commit/47eb8a5fba550f477944eb6da8ca91b87eaf1d01) can be manually applied by editing `IconThemesCode.IconPickerMacro` in the object editor. The whole document can also be replaced by the current version by importing the document from the XAR archive of a fixed version as the only changes to the document have been security fixes and small formatting changes. - - -- [Live-Hack-CVE/CVE-2022-41931](https://github.com/Live-Hack-CVE/CVE-2022-41931) - -### CVE-2022-41932 (2022-11-23) - - -XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to make XWiki create many new schemas and fill them with tables just by using a crafted user identifier in the login form. This may lead to degraded database performance. The problem has been patched in XWiki 13.10.8, 14.6RC1 and 14.4.2. Users are advised to upgrade. There are no known workarounds for this issue. - - -- [Live-Hack-CVE/CVE-2022-41932](https://github.com/Live-Hack-CVE/CVE-2022-41932) - -### CVE-2022-41934 (2022-11-23) - - -XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights on commonly accessible documents including the menu macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation due to improper escaping of the macro content and parameters of the menu macro. The problem has been patched in XWiki 14.6RC1, 13.10.8 and 14.4.3. The patch (commit `2fc20891`) for the document `Menu.MenuMacro` can be manually applied or a XAR archive of a patched version can be imported. The menu macro was basically unchanged since XWiki 11.6 so on XWiki 11.6 or later the patch for version of 13.10.8 (commit `59ccca24a`) can most likely be applied, on XWiki version 14.0 and later the versions in XWiki 14.6 and 14.4.3 should be appropriate. - - -- [Live-Hack-CVE/CVE-2022-41934](https://github.com/Live-Hack-CVE/CVE-2022-41934) - -### CVE-2022-41935 (2022-11-23) - - -XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users without the right to view documents can deduce their existence by repeated Livetable queries. The issue has been patched in XWiki 14.6RC1, 13.10.8, and 14.4.3, the response is not properly cleaned up of obfuscated entries. As a workaround, The patch for the document `XWiki.LiveTableResultsMacros` can be manually applied or a XAR archive of a patched version can be imported, on versions 12.10.11, 13.9-rc-1, and 13.4.4. There are no known workarounds for this issue. - - -- [Live-Hack-CVE/CVE-2022-41935](https://github.com/Live-Hack-CVE/CVE-2022-41935) - -### CVE-2022-41936 (2022-11-21) - - -XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The `modifications` rest endpoint does not filter out entries according to the user's rights. Therefore, information hidden from unauthorized users are exposed though the `modifications` rest endpoint (comments and page names etc). Users should upgrade to XWiki 14.6+, 14.4.3+, or 13.10.8+. Older versions have not been patched. There are no known workarounds. - - -- [Live-Hack-CVE/CVE-2022-41936](https://github.com/Live-Hack-CVE/CVE-2022-41936) - -### CVE-2022-41937 (2022-11-21) - - -XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The application allows anyone with view access to modify any page of the wiki by importing a crafted XAR package. The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. As a workaround, setting the right of the page Filter.WebHome and making sure only the main wiki administrators can view the application installed on main wiki or edit the page and apply the changed described in commit fb49b4f. - - -- [Live-Hack-CVE/CVE-2022-41937](https://github.com/Live-Hack-CVE/CVE-2022-41937) - -### CVE-2022-41938 (2022-11-18) - - -Flarum is an open source discussion platform. Flarum's page title system allowed for page titles to be converted into HTML DOM nodes when pages were rendered. The change was made after `v1.5` and was not noticed. This allowed an attacker to inject malicious HTML markup using a discussion title input, either by creating a new discussion or renaming one. The XSS attack occurs after a visitor opens the relevant discussion page. All communities running Flarum from `v1.5.0` to `v1.6.1` are impacted. The vulnerability has been fixed and published as flarum/core `v1.6.2`. All communities running Flarum from `v1.5.0` to `v1.6.1` have to upgrade as soon as possible to v1.6.2. There are no known workarounds for this issue. - - -- [Live-Hack-CVE/CVE-2022-41938](https://github.com/Live-Hack-CVE/CVE-2022-41938) - -### CVE-2022-41939 (2022-11-18) - - -knative.dev/func is is a client library and CLI enabling the development and deployment of Kubernetes functions. Developers using a malicious or compromised third-party buildpack could expose their registry credentials or local docker socket to a malicious `lifecycle` container. This issues has been patched in PR #1442, and is part of release 1.8.1. This issue only affects users who are using function buildpacks from third-parties; pinning the builder image to a specific content-hash with a valid `lifecycle` image will also mitigate the attack. - - -- [Live-Hack-CVE/CVE-2022-41939](https://github.com/Live-Hack-CVE/CVE-2022-41939) - -### CVE-2022-41940 (2022-11-21) - - -Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the engine.io package, including those who uses depending packages like socket.io. There is no known workaround except upgrading to a safe version. There are patches for this issue released in versions 3.6.1 and 6.2.1. - - -- [Live-Hack-CVE/CVE-2022-41940](https://github.com/Live-Hack-CVE/CVE-2022-41940) - -### CVE-2022-41942 (2022-11-22) - - -Sourcegraph is a code intelligence platform. In versions prior to 4.1.0 a command Injection vulnerability existed in the gitserver service, present in all Sourcegraph deployments. This vulnerability was caused by a lack of input validation on the host parameter of the `/list-gitolite` endpoint. It was possible to send a crafted request to gitserver that would execute commands inside the container. Successful exploitation requires the ability to send local requests to gitserver. The issue is patched in version 4.1.0. - - -- [Live-Hack-CVE/CVE-2022-41942](https://github.com/Live-Hack-CVE/CVE-2022-41942) - -### CVE-2022-41943 (2022-11-22) - - -sourcegraph is a code intelligence platform. As a site admin it was possible to execute arbitrary commands on Gitserver when the experimental `customGitFetch` feature was enabled. This experimental feature has now been disabled by default. This issue has been patched in version 4.1.0. - - -- [Live-Hack-CVE/CVE-2022-41943](https://github.com/Live-Hack-CVE/CVE-2022-41943) - -### CVE-2022-41944 (2022-11-28) - - -Discourse is an open-source discussion platform. In stable versions prior to 2.8.12 and beta or tests-passed versions prior to 2.9.0.beta.13, under certain conditions, a user can see notifications for topics they no longer have access to. If there is sensitive information in the topic title, it will therefore have been exposed. This issue is patched in stable version 2.8.12, beta version 2.9.0.beta13, and tests-passed version 2.9.0.beta13. There are no workarounds available. - - -- [Live-Hack-CVE/CVE-2022-41944](https://github.com/Live-Hack-CVE/CVE-2022-41944) - -### CVE-2022-41945 (2022-11-21) - - -super-xray is a vulnerability scanner (xray) GUI launcher. In version 0.1-beta, the URL is not filtered and directly spliced ​​into the command, resulting in a possible RCE vulnerability. Users should upgrade to super-xray 0.2-beta. - - -- [Live-Hack-CVE/CVE-2022-41945](https://github.com/Live-Hack-CVE/CVE-2022-41945) - -### CVE-2022-41950 (2022-11-22) - - -super-xray is the GUI alternative for vulnerability scanning tool xray. In 0.2-beta, a privilege escalation vulnerability was discovered. This caused inaccurate default xray permissions. Note: this vulnerability only affects Linux and Mac OS systems. Users should upgrade to super-xray 0.3-beta. - - -- [Live-Hack-CVE/CVE-2022-41950](https://github.com/Live-Hack-CVE/CVE-2022-41950) - -### CVE-2022-41952 (2022-11-22) - - -Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-lived connections towards the streaming media server (for instance, Icecast). This can cause excessive traffic and connections toward such servers if their stream URL is, for example, posted to a large room with many Synapse instances with URL preview enabled. Version 1.52.0 implements a timeout mechanism which will terminate URL preview connections after 30 seconds. Since generating URL previews for media streams is not supported and always fails, 1.53.0 additionally implements an allow list for content types for which Synapse will even attempt to generate a URL preview. Upgrade to 1.53.0 to fully resolve the issue. As a workaround, turn off URL preview functionality by setting `url_preview_enabled: false` in the Synapse configuration file. - - -- [Live-Hack-CVE/CVE-2022-41952](https://github.com/Live-Hack-CVE/CVE-2022-41952) - -### CVE-2022-41954 (2022-11-25) - - -MPXJ is an open source library to read and write project plans from a variety of file formats and databases. On Unix-like operating systems (not Windows or macos), MPXJ's use of `File.createTempFile(..)` results in temporary files being created with the permissions `-rw-r--r--`. This means that any other user on the system can read the contents of this file. When MPXJ is reading a schedule file which requires the creation of a temporary file or directory, a knowledgeable local user could locate these transient files while they are in use and would then be able to read the schedule being processed by MPXJ. The problem has been patched, MPXJ version 10.14.1 and later includes the necessary changes. Users unable to upgrade may set `java.io.tmpdir` to a directory to which only the user running the application has access will prevent other users from accessing these temporary files. - - -- [Live-Hack-CVE/CVE-2022-41954](https://github.com/Live-Hack-CVE/CVE-2022-41954) - -### CVE-2022-41957 (2022-11-28) - - -Muhammara is a node module with c/cpp bindings to modify PDF with JavaScript for node or electron. The package muhammara before 2.6.2 and from 3.0.0 and before 3.3.0, as well as all versions of muhammara's predecessor package hummus, are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed. The issue has been patched in muhammara version 3.4.0 and the fix has been backported to version 2.6.2. As a workaround, do not process files from untrusted sources. If using hummus, replace the package with muhammara. - - -- [Live-Hack-CVE/CVE-2022-41957](https://github.com/Live-Hack-CVE/CVE-2022-41957) - -### CVE-2022-41958 (2022-11-25) - - -super-xray is a web vulnerability scanning tool. Versions prior to 0.7 assumed trusted input for the program config which is stored in a yaml file. An attacker with local access to the file could exploit this and compromise the program. This issue has been addressed in commit `4d0d5966` and will be included in future releases. Users are advised to upgrade. There are no known workarounds for this issue. - - -- [Live-Hack-CVE/CVE-2022-41958](https://github.com/Live-Hack-CVE/CVE-2022-41958) - -### CVE-2022-42053 (2022-11-14) - - -Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a command injection vulnerability via the PortMappingServer parameter in the setPortMapping function. - - -- [Live-Hack-CVE/CVE-2022-42053](https://github.com/Live-Hack-CVE/CVE-2022-42053) - -### CVE-2022-42058 (2022-11-14) - - -Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a stack overflow via the setRemoteWebManage function. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data. - - -- [Live-Hack-CVE/CVE-2022-42058](https://github.com/Live-Hack-CVE/CVE-2022-42058) - -### CVE-2022-42060 (2022-11-14) - - -Tenda AC1200 Router Model W15Ev2 V15.11.0.10(1576) was discovered to contain a stack overflow via the setWanPpoe function. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data. - - -- [Live-Hack-CVE/CVE-2022-42060](https://github.com/Live-Hack-CVE/CVE-2022-42060) - -### CVE-2022-42094 (2022-11-22) - - -Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content. - - -- [Live-Hack-CVE/CVE-2022-42094](https://github.com/Live-Hack-CVE/CVE-2022-42094) - -### CVE-2022-42095 (2022-11-22) - - -Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Page content. - - -- [Live-Hack-CVE/CVE-2022-42095](https://github.com/Live-Hack-CVE/CVE-2022-42095) - -### CVE-2022-42096 (2022-11-21) - - -Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content. - - -- [Live-Hack-CVE/CVE-2022-42096](https://github.com/Live-Hack-CVE/CVE-2022-42096) - -### CVE-2022-42097 (2022-11-22) - - -Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via 'Comment.' . - - -- [Live-Hack-CVE/CVE-2022-42097](https://github.com/Live-Hack-CVE/CVE-2022-42097) - -### CVE-2022-42098 (2022-11-22) - - -KLiK SocialMediaWebsite version v1.0.1 is vulnerable to SQL Injection via the profile.php. - - -- [Live-Hack-CVE/CVE-2022-42098](https://github.com/Live-Hack-CVE/CVE-2022-42098) - -### CVE-2022-42099 (2022-11-28) - - -KLiK SocialMediaWebsite Version 1.0.1 has XSS vulnerabilities that allow attackers to store XSS via location Forum Subject input. - - -- [Live-Hack-CVE/CVE-2022-42099](https://github.com/Live-Hack-CVE/CVE-2022-42099) - -### CVE-2022-42100 (2022-11-28) - - -KLiK SocialMediaWebsite Version 1.0.1 has XSS vulnerabilities that allow attackers to store XSS via location input reply-form. - - -- [Live-Hack-CVE/CVE-2022-42100](https://github.com/Live-Hack-CVE/CVE-2022-42100) - -### CVE-2022-42109 (2022-11-28) - - -Online-shopping-system-advanced 1.0 was discovered to contain a SQL injection vulnerability via the p parameter at /shopping/product.php. - - -- [Live-Hack-CVE/CVE-2022-42109](https://github.com/Live-Hack-CVE/CVE-2022-42109) +- [Live-Hack-CVE/CVE-2022-42075](https://github.com/Live-Hack-CVE/CVE-2022-42075) ### CVE-2022-42110 (2022-11-14) @@ -8086,46 +9024,6 @@ A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 - [Live-Hack-CVE/CVE-2022-42123](https://github.com/Live-Hack-CVE/CVE-2022-42123) -### CVE-2022-42124 (2022-11-14) - - -ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype. - - -- [Live-Hack-CVE/CVE-2022-42124](https://github.com/Live-Hack-CVE/CVE-2022-42124) - -### CVE-2022-42125 (2022-11-14) - - -Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module. - - -- [Live-Hack-CVE/CVE-2022-42125](https://github.com/Live-Hack-CVE/CVE-2022-42125) - -### CVE-2022-42126 (2022-11-14) - - -The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI. - - -- [Live-Hack-CVE/CVE-2022-42126](https://github.com/Live-Hack-CVE/CVE-2022-42126) - -### CVE-2022-42127 (2022-11-14) - - -The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page. - - -- [Live-Hack-CVE/CVE-2022-42127](https://github.com/Live-Hack-CVE/CVE-2022-42127) - -### CVE-2022-42128 (2022-11-14) - - -The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API. - - -- [Live-Hack-CVE/CVE-2022-42128](https://github.com/Live-Hack-CVE/CVE-2022-42128) - ### CVE-2022-42129 (2022-11-14) @@ -8158,6 +9056,14 @@ The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and L - [Live-Hack-CVE/CVE-2022-42132](https://github.com/Live-Hack-CVE/CVE-2022-42132) +### CVE-2022-42176 (2022-10-20) + + +In PCTechSoft PCSecure V5.0.8.xw, use of Hard-coded Credentials in configuration files leads to admin panel access. + + +- [Live-Hack-CVE/CVE-2022-42176](https://github.com/Live-Hack-CVE/CVE-2022-42176) + ### CVE-2022-42187 (2022-11-16) @@ -8182,237 +9088,117 @@ Doufox 0.0.4 contains a CSRF vulnerability that can add system administrator acc - [Live-Hack-CVE/CVE-2022-42246](https://github.com/Live-Hack-CVE/CVE-2022-42246) -### CVE-2022-42309 (2022-11-01) +### CVE-2022-42442 (2022-11-03) -Xenstore: Guests can crash xenstored Due to a bug in the fix of XSA-115 a malicious guest can cause xenstored to use a wrong pointer during node creation in an error path, resulting in a crash of xenstored or a memory corruption in xenstored causing further damage. Entering the error path can be controlled by the guest e.g. by exceeding the quota value of maximum nodes per domain. +"IBM Robotic Process Automation for Cloud Pak 21.0.1, 21.0.2, 21.0.3, 21.0.4, and 21.0.5 is vulnerable to exposure of the first tenant owner e-mail address to users with access to the container platform. IBM X-Force ID: 238214." -- [Live-Hack-CVE/CVE-2022-42309](https://github.com/Live-Hack-CVE/CVE-2022-42309) +- [Live-Hack-CVE/CVE-2022-42442](https://github.com/Live-Hack-CVE/CVE-2022-42442) -### CVE-2022-42318 (2022-11-01) +### CVE-2022-42457 (2022-10-06) -Xenstore: guests can let run xenstored out of memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Malicious guests can cause xenstored to allocate vast amounts of memory, eventually resulting in a Denial of Service (DoS) of xenstored. There are multiple ways how guests can cause large memory allocations in xenstored: - - by issuing new requests to xenstored without reading the responses, causing the responses to be buffered in memory - - by causing large number of watch events to be generated via setting up multiple xenstore watches and then e.g. deleting many xenstore nodes below the watched path - - by creating as many nodes as allowed with the maximum allowed size and path length in as many transactions as possible - - by accessing many nodes inside a transaction +Generex CS141 through 2.10 allows remote command execution by administrators via a web interface that reaches run_update in /usr/bin/gxserve-update.sh (e.g., command execution can occur via a reverse shell installed by install.sh). -- [Live-Hack-CVE/CVE-2022-42318](https://github.com/Live-Hack-CVE/CVE-2022-42318) +- [Live-Hack-CVE/CVE-2022-42457](https://github.com/Live-Hack-CVE/CVE-2022-42457) -### CVE-2022-42319 (2022-11-01) +### CVE-2022-42460 (2022-11-10) -Xenstore: Guests can cause Xenstore to not free temporary memory When working on a request of a guest, xenstored might need to allocate quite large amounts of memory temporarily. This memory is freed only after the request has been finished completely. A request is regarded to be finished only after the guest has read the response message of the request from the ring page. Thus a guest not reading the response can cause xenstored to not free the temporary memory. This can result in memory shortages causing Denial of Service (DoS) of xenstored. +Broken Access Control vulnerability leading to Stored Cross-Site Scripting (XSS) in Traffic Manager plugin <= 1.4.5 on WordPress. -- [Live-Hack-CVE/CVE-2022-42319](https://github.com/Live-Hack-CVE/CVE-2022-42319) +- [Live-Hack-CVE/CVE-2022-42460](https://github.com/Live-Hack-CVE/CVE-2022-42460) -### CVE-2022-42320 (2022-11-01) +### CVE-2022-42494 (2022-11-08) -Xenstore: Guests can get access to Xenstore nodes of deleted domains Access rights of Xenstore nodes are per domid. When a domain is gone, there might be Xenstore nodes left with access rights containing the domid of the removed domain. This is normally no problem, as those access right entries will be corrected when such a node is written later. There is a small time window when a new domain is created, where the access rights of a past domain with the same domid as the new one will be regarded to be still valid, leading to the new domain being able to get access to a node which was meant to be accessible by the removed domain. For this to happen another domain needs to write the node before the newly created domain is being introduced to Xenstore by dom0. +Server Side Request Forgery (SSRF) vulnerability in All in One SEO Pro plugin <= 4.2.5.1 on WordPress. -- [Live-Hack-CVE/CVE-2022-42320](https://github.com/Live-Hack-CVE/CVE-2022-42320) +- [Live-Hack-CVE/CVE-2022-42494](https://github.com/Live-Hack-CVE/CVE-2022-42494) -### CVE-2022-42321 (2022-11-01) +### CVE-2022-42707 (2022-11-06) -Xenstore: Guests can crash xenstored via exhausting the stack Xenstored is using recursion for some Xenstore operations (e.g. for deleting a sub-tree of Xenstore nodes). With sufficiently deep nesting levels this can result in stack exhaustion on xenstored, leading to a crash of xenstored. +In Mahara 21.04 before 21.04.7, 21.10 before 21.10.5, 22.04 before 22.04.3, and 22.10 before 22.10.0, embedded images are accessible without a sufficient permission check under certain conditions. -- [Live-Hack-CVE/CVE-2022-42321](https://github.com/Live-Hack-CVE/CVE-2022-42321) +- [Live-Hack-CVE/CVE-2022-42707](https://github.com/Live-Hack-CVE/CVE-2022-42707) -### CVE-2022-42322 (2022-11-01) +### CVE-2022-42719 (2022-10-13) -Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota. +A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code. -- [Live-Hack-CVE/CVE-2022-42322](https://github.com/Live-Hack-CVE/CVE-2022-42322) +- [Live-Hack-CVE/CVE-2022-42719](https://github.com/Live-Hack-CVE/CVE-2022-42719) -### CVE-2022-42323 (2022-11-01) +### CVE-2022-42725 (2022-10-10) -Xenstore: Cooperating guests can create arbitrary numbers of nodes T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Since the fix of XSA-322 any Xenstore node owned by a removed domain will be modified to be owned by Dom0. This will allow two malicious guests working together to create an arbitrary number of Xenstore nodes. This is possible by domain A letting domain B write into domain A's local Xenstore tree. Domain B can then create many nodes and reboot. The nodes created by domain B will now be owned by Dom0. By repeating this process over and over again an arbitrary number of nodes can be created, as Dom0's number of nodes isn't limited by Xenstore quota. +Warpinator through 1.2.14 allows access outside of an intended directory, as demonstrated by symbolic directory links. -- [Live-Hack-CVE/CVE-2022-42323](https://github.com/Live-Hack-CVE/CVE-2022-42323) +- [Live-Hack-CVE/CVE-2022-42725](https://github.com/Live-Hack-CVE/CVE-2022-42725) -### CVE-2022-42325 (2022-11-01) +### CVE-2022-42743 (2022-11-03) -Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes. +deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited. -- [Live-Hack-CVE/CVE-2022-42325](https://github.com/Live-Hack-CVE/CVE-2022-42325) +- [Live-Hack-CVE/CVE-2022-42743](https://github.com/Live-Hack-CVE/CVE-2022-42743) -### CVE-2022-42326 (2022-11-01) +### CVE-2022-42744 (2022-11-03) -Xenstore: Guests can create arbitrary number of nodes via transactions T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] In case a node has been created in a transaction and it is later deleted in the same transaction, the transaction will be terminated with an error. As this error is encountered only when handling the deleted node at transaction finalization, the transaction will have been performed partially and without updating the accounting information. This will enable a malicious guest to create arbitrary number of nodes. +CandidATS version 3.0.0 allows an external attacker to perform CRUD operations on the application databases. This is possible because the application does not correctly validate the entriesPerPage parameter against SQLi attacks. -- [Live-Hack-CVE/CVE-2022-42326](https://github.com/Live-Hack-CVE/CVE-2022-42326) +- [Live-Hack-CVE/CVE-2022-42744](https://github.com/Live-Hack-CVE/CVE-2022-42744) -### CVE-2022-42327 (2022-11-01) +### CVE-2022-42745 (2022-11-03) -x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests. +CandidATS version 3.0.0 allows an external attacker to read arbitrary files from the server. This is possible because the application is vulnerable to XXE. -- [Live-Hack-CVE/CVE-2022-42327](https://github.com/Live-Hack-CVE/CVE-2022-42327) +- [Live-Hack-CVE/CVE-2022-42745](https://github.com/Live-Hack-CVE/CVE-2022-42745) -### CVE-2022-42459 (2022-11-18) +### CVE-2022-42750 (2022-11-03) -Auth. WordPress Options Change vulnerability in Image Hover Effects Ultimate plugin <= 9.7.1 on WordPress. +CandidATS version 3.0.0 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the files uploaded by the user. -- [Live-Hack-CVE/CVE-2022-42459](https://github.com/Live-Hack-CVE/CVE-2022-42459) +- [Live-Hack-CVE/CVE-2022-42750](https://github.com/Live-Hack-CVE/CVE-2022-42750) -### CVE-2022-42461 (2022-11-18) +### CVE-2022-42751 (2022-11-03) -Broken Access Control vulnerability in miniOrange's Google Authenticator plugin <= 5.6.1 on WordPress. +CandidATS version 3.0.0 allows an external attacker to elevate privileges in the application. This is possible because the application suffers from CSRF. This allows to persuade an administrator to create a new account with administrative permissions. -- [Live-Hack-CVE/CVE-2022-42461](https://github.com/Live-Hack-CVE/CVE-2022-42461) +- [Live-Hack-CVE/CVE-2022-42751](https://github.com/Live-Hack-CVE/CVE-2022-42751) -### CVE-2022-42497 (2022-11-18) +### CVE-2022-42753 (2022-11-03) -Arbitrary Code Execution vulnerability in Api2Cart Bridge Connector plugin <= 1.1.0 on WordPress. +SalonERP version 3.0.2 allows an external attacker to steal the cookie of arbitrary users. This is possible because the application does not correctly validate the page parameter against XSS attacks. -- [Live-Hack-CVE/CVE-2022-42497](https://github.com/Live-Hack-CVE/CVE-2022-42497) +- [Live-Hack-CVE/CVE-2022-42753](https://github.com/Live-Hack-CVE/CVE-2022-42753) -### CVE-2022-42533 (2022-11-17) +### CVE-2022-42786 (2022-11-10) -In shared_metadata_init of SharedMetadata.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239415718References: N/A +Multiple W&T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage -- [Live-Hack-CVE/CVE-2022-42533](https://github.com/Live-Hack-CVE/CVE-2022-42533) - -### CVE-2022-42698 (2022-11-18) - - -Unauth. Arbitrary File Upload vulnerability in WordPress Api2Cart Bridge Connector plugin <= 1.1.0 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-42698](https://github.com/Live-Hack-CVE/CVE-2022-42698) - -### CVE-2022-42720 (2022-10-13) - - -Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code. - - -- [Live-Hack-CVE/CVE-2022-42720](https://github.com/Live-Hack-CVE/CVE-2022-42720) - -### CVE-2022-42721 (2022-10-13) - - -A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code. - - -- [Live-Hack-CVE/CVE-2022-42721](https://github.com/Live-Hack-CVE/CVE-2022-42721) - -### CVE-2022-42722 (2022-10-13) - - -In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices. - - -- [Live-Hack-CVE/CVE-2022-42722](https://github.com/Live-Hack-CVE/CVE-2022-42722) - -### CVE-2022-42732 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper read access control that could allow files to be retrieved from any folder accessible to the account assigned to the website’s application pool. - - -- [Live-Hack-CVE/CVE-2022-42732](https://github.com/Live-Hack-CVE/CVE-2022-42732) - -### CVE-2022-42733 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper read access control that could allow files to be retrieved from any folder accessible to the account assigned to the website’s application pool. - - -- [Live-Hack-CVE/CVE-2022-42733](https://github.com/Live-Hack-CVE/CVE-2022-42733) - -### CVE-2022-42734 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow to write data in any folder accessible to the account assigned to the website’s application pool. - - -- [Live-Hack-CVE/CVE-2022-42734](https://github.com/Live-Hack-CVE/CVE-2022-42734) - -### CVE-2022-42785 (2022-11-15) - - -Multiple W&T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request. - - -- [Live-Hack-CVE/CVE-2022-42785](https://github.com/Live-Hack-CVE/CVE-2022-42785) - -### CVE-2022-42883 (2022-11-18) - - -Sensitive Information Disclosure vulnerability discovered by Quiz And Survey Master plugin <= 7.3.10 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-42883](https://github.com/Live-Hack-CVE/CVE-2022-42883) - -### CVE-2022-42889 (2022-10-13) - - -Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. - - -- [Live-Hack-CVE/CVE-2022-42889](https://github.com/Live-Hack-CVE/CVE-2022-42889) - -### CVE-2022-42891 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow to write data in any folder accessible to the account assigned to the website’s application pool. - - -- [Live-Hack-CVE/CVE-2022-42891](https://github.com/Live-Hack-CVE/CVE-2022-42891) - -### CVE-2022-42892 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow directory listing in any folder accessible to the account assigned to the website’s application pool. - - -- [Live-Hack-CVE/CVE-2022-42892](https://github.com/Live-Hack-CVE/CVE-2022-42892) - -### CVE-2022-42893 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow to write data in any folder accessible to the account assigned to the website’s application pool. - - -- [Live-Hack-CVE/CVE-2022-42893](https://github.com/Live-Hack-CVE/CVE-2022-42893) - -### CVE-2022-42894 (2022-11-17) - - -A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). An unauthenticated Server-Side Request Forgery (SSRF) vulnerability was identified in one of the web services exposed on the syngo Dynamics application that could allow for the leaking of NTLM credentials as well as local service enumeration. - - -- [Live-Hack-CVE/CVE-2022-42894](https://github.com/Live-Hack-CVE/CVE-2022-42894) - -### CVE-2022-42895 (2022-11-23) - - -There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url - - -- [Live-Hack-CVE/CVE-2022-42895](https://github.com/Live-Hack-CVE/CVE-2022-42895) +- [Live-Hack-CVE/CVE-2022-42786](https://github.com/Live-Hack-CVE/CVE-2022-42786) ### CVE-2022-42902 (2022-10-12) @@ -8422,30 +9208,6 @@ In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dyna - [Live-Hack-CVE/CVE-2022-42902](https://github.com/Live-Hack-CVE/CVE-2022-42902) -### CVE-2022-42903 (2022-11-17) - - -Zoho ManageEngine SupportCenter Plus through 11024 allows low-privileged users to view the organization users list. - - -- [Live-Hack-CVE/CVE-2022-42903](https://github.com/Live-Hack-CVE/CVE-2022-42903) - -### CVE-2022-42904 (2022-11-18) - - -Zoho ManageEngine ADManager Plus through 7151 allows authenticated admin users to execute the commands in proxy settings. - - -- [Live-Hack-CVE/CVE-2022-42904](https://github.com/Live-Hack-CVE/CVE-2022-42904) - -### CVE-2022-42905 (2022-11-06) - - -In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.) - - -- [Live-Hack-CVE/CVE-2022-42905](https://github.com/Live-Hack-CVE/CVE-2022-42905) - ### CVE-2022-42954 (2022-11-16) @@ -8454,13 +9216,37 @@ Keyfactor EJBCA before 7.10.0 allows XSS. - [Live-Hack-CVE/CVE-2022-42954](https://github.com/Live-Hack-CVE/CVE-2022-42954) -### CVE-2022-42960 (2022-11-16) +### CVE-2022-42955 (2022-11-07) -EqualWeb Accessibility Widget 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.10, 3.0.0, 3.0.1, 3.0.2, 4.0.0, and 4.0.1 allows DOM XSS due to improper validation of message events to accessibility.js. +The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain cleartext cached credentials. -- [Live-Hack-CVE/CVE-2022-42960](https://github.com/Live-Hack-CVE/CVE-2022-42960) +- [Live-Hack-CVE/CVE-2022-42955](https://github.com/Live-Hack-CVE/CVE-2022-42955) + +### CVE-2022-42956 (2022-11-07) + + +The PassWork extension 5.0.9 for Chrome and other browsers allows an attacker to obtain the cleartext master password. + + +- [Live-Hack-CVE/CVE-2022-42956](https://github.com/Live-Hack-CVE/CVE-2022-42956) + +### CVE-2022-42964 (2022-11-09) + + +An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the pymatgen PyPI package, when an attacker is able to supply arbitrary input to the GaussianInput.from_string method + + +- [Live-Hack-CVE/CVE-2022-42964](https://github.com/Live-Hack-CVE/CVE-2022-42964) + +### CVE-2022-42966 (2022-11-09) + + +An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method + + +- [Live-Hack-CVE/CVE-2022-42966](https://github.com/Live-Hack-CVE/CVE-2022-42966) ### CVE-2022-42977 (2022-11-14) @@ -8478,14 +9264,6 @@ In the Netic User Export add-on before 1.3.5 for Atlassian Confluence, authoriza - [Live-Hack-CVE/CVE-2022-42978](https://github.com/Live-Hack-CVE/CVE-2022-42978) -### CVE-2022-42982 (2022-11-16) - - -BKG Professional NtripCaster 2.0.39 allows querying information over the UDP protocol without authentication. The NTRIP sourcetable is typically quite long (tens of kBs) and can be requested with a packet of only 30 bytes. This presents a vector that can be used for UDP amplification attacks. Normally, only authenticated streaming data will be provided over UDP and not the sourcetable. - - -- [Live-Hack-CVE/CVE-2022-42982](https://github.com/Live-Hack-CVE/CVE-2022-42982) - ### CVE-2022-42984 (2022-11-14) @@ -8502,13 +9280,13 @@ The ScratchLogin extension through 1.1 for MediaWiki does not escape verificatio - [Live-Hack-CVE/CVE-2022-42985](https://github.com/Live-Hack-CVE/CVE-2022-42985) -### CVE-2022-42989 (2022-11-22) +### CVE-2022-42990 (2022-11-07) -ERP Sankhya before v4.11b81 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Caixa de Entrada. +Food Ordering Management System v1.0 was discovered to contain a SQL injection vulnerability via the component /foms/all-orders.php?status=Cancelled%20by%20Customer. -- [Live-Hack-CVE/CVE-2022-42989](https://github.com/Live-Hack-CVE/CVE-2022-42989) +- [Live-Hack-CVE/CVE-2022-42990](https://github.com/Live-Hack-CVE/CVE-2022-42990) ### CVE-2022-43030 (2022-11-14) @@ -8518,29 +9296,133 @@ Siyucms v6.1.7 was discovered to contain a remote code execution (RCE) vulnerabi - [Live-Hack-CVE/CVE-2022-43030](https://github.com/Live-Hack-CVE/CVE-2022-43030) -### CVE-2022-43071 (2022-11-15) +### CVE-2022-43031 (2022-11-09) -A stack overflow in the Catalog::readPageLabelTree2(Object*) function of XPDF v4.04 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. +DedeCMS v6.1.9 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add Administrator accounts and modify Admin passwords. -- [Live-Hack-CVE/CVE-2022-43071](https://github.com/Live-Hack-CVE/CVE-2022-43071) +- [Live-Hack-CVE/CVE-2022-43031](https://github.com/Live-Hack-CVE/CVE-2022-43031) -### CVE-2022-43096 (2022-11-17) +### CVE-2022-43046 (2022-11-07) -Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via the UART port. +Food Ordering Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /foms/place-order.php. -- [Live-Hack-CVE/CVE-2022-43096](https://github.com/Live-Hack-CVE/CVE-2022-43096) +- [Live-Hack-CVE/CVE-2022-43046](https://github.com/Live-Hack-CVE/CVE-2022-43046) -### CVE-2022-43117 (2022-11-21) +### CVE-2022-43049 (2022-11-07) -Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Name, Username, Description and Site Feature parameters. +Canteen Management System Project v1.0 was discovered to contain a SQL injection vulnerability via the component /youthappam/add-food.php. -- [Live-Hack-CVE/CVE-2022-43117](https://github.com/Live-Hack-CVE/CVE-2022-43117) +- [Live-Hack-CVE/CVE-2022-43049](https://github.com/Live-Hack-CVE/CVE-2022-43049) + +### CVE-2022-43050 (2022-11-07) + + +Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability in the component update_profile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. + + +- [Live-Hack-CVE/CVE-2022-43050](https://github.com/Live-Hack-CVE/CVE-2022-43050) + +### CVE-2022-43051 (2022-11-07) + + +Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/classes/Users.php?f=delete_test. + + +- [Live-Hack-CVE/CVE-2022-43051](https://github.com/Live-Hack-CVE/CVE-2022-43051) + +### CVE-2022-43052 (2022-11-07) + + +Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms/classes/Users.php?f=delete. + + +- [Live-Hack-CVE/CVE-2022-43052](https://github.com/Live-Hack-CVE/CVE-2022-43052) + +### CVE-2022-43058 (2022-11-09) + + +Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms//classes/Master.php?f=delete_activity. + + +- [Live-Hack-CVE/CVE-2022-43058](https://github.com/Live-Hack-CVE/CVE-2022-43058) + +### CVE-2022-43061 (2022-11-03) + + +Online Tours & Travels Management System v1.0 was discovered to contain an arbitrary file upload vulnerability in the component /operations/travellers.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. + + +- [Live-Hack-CVE/CVE-2022-43061](https://github.com/Live-Hack-CVE/CVE-2022-43061) + +### CVE-2022-43062 (2022-11-03) + + +Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_appointment. + + +- [Live-Hack-CVE/CVE-2022-43062](https://github.com/Live-Hack-CVE/CVE-2022-43062) + +### CVE-2022-43063 (2022-11-03) + + +Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Users.php?f=delete_client. + + +- [Live-Hack-CVE/CVE-2022-43063](https://github.com/Live-Hack-CVE/CVE-2022-43063) + +### CVE-2022-43074 (2022-11-10) + + +AyaCMS v3.1.2 was discovered to contain an arbitrary file upload vulnerability via the component /admin/fst_upload.inc.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. + + +- [Live-Hack-CVE/CVE-2022-43074](https://github.com/Live-Hack-CVE/CVE-2022-43074) + +### CVE-2022-43109 (2022-11-03) + + +D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via a crafted packet. + + +- [Live-Hack-CVE/CVE-2022-43109](https://github.com/Live-Hack-CVE/CVE-2022-43109) + +### CVE-2022-43118 (2022-11-09) + + +A cross-site scripting (XSS) vulnerability in flatCore-CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username text field. + + +- [Live-Hack-CVE/CVE-2022-43118](https://github.com/Live-Hack-CVE/CVE-2022-43118) + +### CVE-2022-43119 (2022-11-09) + + +A cross-site scripting (XSS) vulnerability in Clansphere CMS v2011.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username parameter. + + +- [Live-Hack-CVE/CVE-2022-43119](https://github.com/Live-Hack-CVE/CVE-2022-43119) + +### CVE-2022-43120 (2022-11-09) + + +A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field. + + +- [Live-Hack-CVE/CVE-2022-43120](https://github.com/Live-Hack-CVE/CVE-2022-43120) + +### CVE-2022-43121 (2022-11-09) + + +A cross-site scripting (XSS) vulnerability in the CMS Field Add page of Intelliants Subrion CMS v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tooltip text field. + + +- [Live-Hack-CVE/CVE-2022-43121](https://github.com/Live-Hack-CVE/CVE-2022-43121) ### CVE-2022-43135 (2022-11-16) @@ -8550,37 +9432,13 @@ Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL inj - [Live-Hack-CVE/CVE-2022-43135](https://github.com/Live-Hack-CVE/CVE-2022-43135) -### CVE-2022-43138 (2022-11-17) +### CVE-2022-43144 (2022-11-08) -Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API. +A cross-site scripting (XSS) vulnerability in Canteen Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. -- [Live-Hack-CVE/CVE-2022-43138](https://github.com/Live-Hack-CVE/CVE-2022-43138) - -### CVE-2022-43140 (2022-11-17) - - -kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter. - - -- [Live-Hack-CVE/CVE-2022-43140](https://github.com/Live-Hack-CVE/CVE-2022-43140) - -### CVE-2022-43142 (2022-11-17) - - -A cross-site scripting (XSS) vulnerability in the add-fee.php component of Password Storage Application v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the cmddept parameter. - - -- [Live-Hack-CVE/CVE-2022-43142](https://github.com/Live-Hack-CVE/CVE-2022-43142) - -### CVE-2022-43143 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container. - - -- [Live-Hack-CVE/CVE-2022-43143](https://github.com/Live-Hack-CVE/CVE-2022-43143) +- [Live-Hack-CVE/CVE-2022-43144](https://github.com/Live-Hack-CVE/CVE-2022-43144) ### CVE-2022-43146 (2022-11-14) @@ -8590,94 +9448,6 @@ An arbitrary file upload vulnerability in the image upload function of Canteen M - [Live-Hack-CVE/CVE-2022-43146](https://github.com/Live-Hack-CVE/CVE-2022-43146) -### CVE-2022-43162 (2022-11-17) - - -Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tests/view_test.php. - - -- [Live-Hack-CVE/CVE-2022-43162](https://github.com/Live-Hack-CVE/CVE-2022-43162) - -### CVE-2022-43163 (2022-11-17) - - -Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /clients/view_client.php. - - -- [Live-Hack-CVE/CVE-2022-43163](https://github.com/Live-Hack-CVE/CVE-2022-43163) - -### CVE-2022-43171 (2022-11-17) - - -A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind function of LIEF v0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted MachO file. - - -- [Live-Hack-CVE/CVE-2022-43171](https://github.com/Live-Hack-CVE/CVE-2022-43171) - -### CVE-2022-43179 (2022-11-17) - - -Online Leave Management System v1.0 was discovered to contain a SQL injection vulnerability via the component /admin/?page=user/manage_user&id=. - - -- [Live-Hack-CVE/CVE-2022-43179](https://github.com/Live-Hack-CVE/CVE-2022-43179) - -### CVE-2022-43183 (2022-11-17) - - -XXL-Job before v2.3.1 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java. - - -- [Live-Hack-CVE/CVE-2022-43183](https://github.com/Live-Hack-CVE/CVE-2022-43183) - -### CVE-2022-43192 (2022-11-17) - - -An arbitrary file upload vulnerability in the component /dede/file_manage_control.php of Dedecms v5.7.101 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is related to an incomplete fix for CVE-2022-40886. - - -- [Live-Hack-CVE/CVE-2022-43192](https://github.com/Live-Hack-CVE/CVE-2022-43192) - -### CVE-2022-43196 (2022-11-23) - - -dedecmdv6 v6.1.9 is vulnerable to Arbitrary file deletion via file_manage_control.php. - - -- [Live-Hack-CVE/CVE-2022-43196](https://github.com/Live-Hack-CVE/CVE-2022-43196) - -### CVE-2022-43212 (2022-11-22) - - -Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the orderId parameter at fetchOrderData.php. - - -- [Live-Hack-CVE/CVE-2022-43212](https://github.com/Live-Hack-CVE/CVE-2022-43212) - -### CVE-2022-43213 (2022-11-22) - - -Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at editorder.php. - - -- [Live-Hack-CVE/CVE-2022-43213](https://github.com/Live-Hack-CVE/CVE-2022-43213) - -### CVE-2022-43214 (2022-11-21) - - -Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the orderId parameter at printOrder.php. - - -- [Live-Hack-CVE/CVE-2022-43214](https://github.com/Live-Hack-CVE/CVE-2022-43214) - -### CVE-2022-43215 (2022-11-21) - - -Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the endDate parameter at getOrderReport.php. - - -- [Live-Hack-CVE/CVE-2022-43215](https://github.com/Live-Hack-CVE/CVE-2022-43215) - ### CVE-2022-43234 (2022-11-16) @@ -8686,6 +9456,30 @@ An arbitrary file upload vulnerability in the /attachments component of Hoosk v1 - [Live-Hack-CVE/CVE-2022-43234](https://github.com/Live-Hack-CVE/CVE-2022-43234) +### CVE-2022-43256 (2022-11-16) + + +SeaCms before v12.6 was discovered to contain a SQL injection vulnerability via the component /js/player/dmplayer/dmku/index.php. + + +- [Live-Hack-CVE/CVE-2022-43256](https://github.com/Live-Hack-CVE/CVE-2022-43256) + +### CVE-2022-43262 (2022-11-16) + + +Human Resource Management System v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /hrm/controller/login.php. + + +- [Live-Hack-CVE/CVE-2022-43262](https://github.com/Live-Hack-CVE/CVE-2022-43262) + +### CVE-2022-43263 (2022-11-16) + + +A cross-site scripting (XSS) vulnerability in Arobas Music Guitar Pro for iPad and iPhone before v1.10.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the name of an uploaded file. + + +- [Live-Hack-CVE/CVE-2022-43263](https://github.com/Live-Hack-CVE/CVE-2022-43263) + ### CVE-2022-43264 (2022-11-16) @@ -8702,6 +9496,22 @@ An arbitrary file upload vulnerability in the component /pages/save_user.php of - [Live-Hack-CVE/CVE-2022-43265](https://github.com/Live-Hack-CVE/CVE-2022-43265) +### CVE-2022-43277 (2022-11-09) + + +Canteen Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via ip/youthappam/php_action/editFile.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. + + +- [Live-Hack-CVE/CVE-2022-43277](https://github.com/Live-Hack-CVE/CVE-2022-43277) + +### CVE-2022-43278 (2022-11-09) + + +Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the categoriesId parameter at /php_action/fetchSelectedCategories.php. + + +- [Live-Hack-CVE/CVE-2022-43278](https://github.com/Live-Hack-CVE/CVE-2022-43278) + ### CVE-2022-43279 (2022-11-15) @@ -8710,6 +9520,38 @@ LimeSurvey v5.4.4 was discovered to contain a SQL injection vulnerability via th - [Live-Hack-CVE/CVE-2022-43279](https://github.com/Live-Hack-CVE/CVE-2022-43279) +### CVE-2022-43288 (2022-11-14) + + +Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the order_by parameter at /rukovoditel/index.php?module=logs/view&type=php. + + +- [Live-Hack-CVE/CVE-2022-43288](https://github.com/Live-Hack-CVE/CVE-2022-43288) + +### CVE-2022-43290 (2022-11-09) + + +Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /youthappam/editcategory.php. + + +- [Live-Hack-CVE/CVE-2022-43290](https://github.com/Live-Hack-CVE/CVE-2022-43290) + +### CVE-2022-43291 (2022-11-09) + + +Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /youthappam/editclient.php. + + +- [Live-Hack-CVE/CVE-2022-43291](https://github.com/Live-Hack-CVE/CVE-2022-43291) + +### CVE-2022-43292 (2022-11-09) + + +Canteen Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /youthappam/editfood.php. + + +- [Live-Hack-CVE/CVE-2022-43292](https://github.com/Live-Hack-CVE/CVE-2022-43292) + ### CVE-2022-43294 (2022-11-14) @@ -8726,13 +9568,85 @@ XPDF v4.04 was discovered to contain a stack overflow via the function FileStrea - [Live-Hack-CVE/CVE-2022-43295](https://github.com/Live-Hack-CVE/CVE-2022-43295) -### CVE-2022-43308 (2022-11-17) +### CVE-2022-43303 (2022-11-07) -INTELBRAS SG 2404 MR 20180928-rel64938 allows authenticated attackers to arbitrarily create Administrator accounts via crafted user cookies. +The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-43308](https://github.com/Live-Hack-CVE/CVE-2022-43308) +- [Live-Hack-CVE/CVE-2022-43303](https://github.com/Live-Hack-CVE/CVE-2022-43303) + +### CVE-2022-43304 (2022-11-07) + + +The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0. + + +- [Live-Hack-CVE/CVE-2022-43304](https://github.com/Live-Hack-CVE/CVE-2022-43304) + +### CVE-2022-43305 (2022-11-07) + + +The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-algorithms package. The affected version of d8s-htm is 0.1.0. + + +- [Live-Hack-CVE/CVE-2022-43305](https://github.com/Live-Hack-CVE/CVE-2022-43305) + +### CVE-2022-43306 (2022-11-07) + + +The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-dates package. The affected version of d8s-htm is 0.1.0. + + +- [Live-Hack-CVE/CVE-2022-43306](https://github.com/Live-Hack-CVE/CVE-2022-43306) + +### CVE-2022-43310 (2022-11-09) + + +An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path. + + +- [Live-Hack-CVE/CVE-2022-43310](https://github.com/Live-Hack-CVE/CVE-2022-43310) + +### CVE-2022-43317 (2022-11-07) + + +A cross-site scripting (XSS) vulnerability in /hrm/index.php?msg of Human Resource Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. + + +- [Live-Hack-CVE/CVE-2022-43317](https://github.com/Live-Hack-CVE/CVE-2022-43317) + +### CVE-2022-43318 (2022-11-07) + + +Human Resource Management System v1.0 was discovered to contain a SQL injection vulnerability via the stateedit parameter at /hrm/state.php. + + +- [Live-Hack-CVE/CVE-2022-43318](https://github.com/Live-Hack-CVE/CVE-2022-43318) + +### CVE-2022-43319 (2022-11-07) + + +An information disclosure vulnerability in the component vcs/downloadFiles.php?download=./search.php of Simple E-Learning System v1.0 allows attackers to read arbitrary files. + + +- [Live-Hack-CVE/CVE-2022-43319](https://github.com/Live-Hack-CVE/CVE-2022-43319) + +### CVE-2022-43320 (2022-11-09) + + +FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer. + + +- [Live-Hack-CVE/CVE-2022-43320](https://github.com/Live-Hack-CVE/CVE-2022-43320) + +### CVE-2022-43321 (2022-11-09) + + +Shopwind v3.4.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the component /common/library/Page.php. + + +- [Live-Hack-CVE/CVE-2022-43321](https://github.com/Live-Hack-CVE/CVE-2022-43321) ### CVE-2022-43323 (2022-11-14) @@ -8742,93 +9656,261 @@ EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery ( - [Live-Hack-CVE/CVE-2022-43323](https://github.com/Live-Hack-CVE/CVE-2022-43323) -### CVE-2022-43332 (2022-11-17) +### CVE-2022-43342 (2022-11-14) -A cross-site scripting (XSS) vulnerability in Wondercms v3.3.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Site title field of the Configuration Panel. +A stored cross-site scripting (XSS) vulnerability in the Add function of Eramba GRC Software c2.8.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the KPI Title text field. -- [Live-Hack-CVE/CVE-2022-43332](https://github.com/Live-Hack-CVE/CVE-2022-43332) +- [Live-Hack-CVE/CVE-2022-43342](https://github.com/Live-Hack-CVE/CVE-2022-43342) -### CVE-2022-43447 (2022-11-17) +### CVE-2022-43343 (2022-11-08) -SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network +N-Prolog v1.91 was discovered to contain a global buffer overflow vulnerability in the function gettoken() at Main.c. -- [Live-Hack-CVE/CVE-2022-43447](https://github.com/Live-Hack-CVE/CVE-2022-43447) +- [Live-Hack-CVE/CVE-2022-43343](https://github.com/Live-Hack-CVE/CVE-2022-43343) -### CVE-2022-43452 (2022-11-17) +### CVE-2022-43350 (2022-11-07) -SQL Injection in FtyInfoSetting.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network +Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_inquiry. -- [Live-Hack-CVE/CVE-2022-43452](https://github.com/Live-Hack-CVE/CVE-2022-43452) +- [Live-Hack-CVE/CVE-2022-43350](https://github.com/Live-Hack-CVE/CVE-2022-43350) -### CVE-2022-43457 (2022-11-17) +### CVE-2022-43351 (2022-11-07) -SQL Injection in HandlerPage_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network +Sanitization Management System v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /classes/Master.php?f=delete_img. -- [Live-Hack-CVE/CVE-2022-43457](https://github.com/Live-Hack-CVE/CVE-2022-43457) +- [Live-Hack-CVE/CVE-2022-43351](https://github.com/Live-Hack-CVE/CVE-2022-43351) -### CVE-2022-43463 (2022-11-18) +### CVE-2022-43352 (2022-11-07) -Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Custom Product Tabs for WooCommerce plugin <= 1.7.9 on WordPress. +Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-sms/classes/Master.php?f=delete_quote. -- [Live-Hack-CVE/CVE-2022-43463](https://github.com/Live-Hack-CVE/CVE-2022-43463) +- [Live-Hack-CVE/CVE-2022-43352](https://github.com/Live-Hack-CVE/CVE-2022-43352) -### CVE-2022-43482 (2022-11-18) +### CVE-2022-43359 (2022-11-07) -Missing Authorization vulnerability in Appointment Booking Calendar plugin <= 1.3.69 on WordPress. +Gifdec commit 1dcbae19363597314f6623010cc80abad4e47f7c was discovered to contain an out-of-bounds read in the function read_image_data. This vulnerability is triggered when parsing a crafted Gif file. -- [Live-Hack-CVE/CVE-2022-43482](https://github.com/Live-Hack-CVE/CVE-2022-43482) +- [Live-Hack-CVE/CVE-2022-43359](https://github.com/Live-Hack-CVE/CVE-2022-43359) -### CVE-2022-43492 (2022-11-18) +### CVE-2022-43372 (2022-11-03) -Auth. (subscriber+) Insecure Direct Object References (IDOR) vulnerability in Comments – wpDiscuz plugin 7.4.2 on WordPress. +Emlog Pro v1.7.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability at /admin/store.php. -- [Live-Hack-CVE/CVE-2022-43492](https://github.com/Live-Hack-CVE/CVE-2022-43492) +- [Live-Hack-CVE/CVE-2022-43372](https://github.com/Live-Hack-CVE/CVE-2022-43372) -### CVE-2022-43506 (2022-11-17) +### CVE-2022-43397 (2022-11-08) -SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network +A vulnerability has been identified in Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170). The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17854) -- [Live-Hack-CVE/CVE-2022-43506](https://github.com/Live-Hack-CVE/CVE-2022-43506) +- [Live-Hack-CVE/CVE-2022-43397](https://github.com/Live-Hack-CVE/CVE-2022-43397) -### CVE-2022-43588 (2022-11-28) +### CVE-2022-43398 (2022-11-08) -A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. +A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not renew the session cookie after login/logout and also accept user defined session cookies. An attacker could overwrite the stored session cookie of a user. After the victim logged in, the attacker is given access to the user's account through the activated session. -- [Live-Hack-CVE/CVE-2022-43588](https://github.com/Live-Hack-CVE/CVE-2022-43588) +- [Live-Hack-CVE/CVE-2022-43398](https://github.com/Live-Hack-CVE/CVE-2022-43398) -### CVE-2022-43589 (2022-11-28) +### CVE-2022-43439 (2022-11-08) -A null pointer dereference vulnerability exists in the handle_ioctl_8314C functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. +A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not properly validate the Language-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device. -- [Live-Hack-CVE/CVE-2022-43589](https://github.com/Live-Hack-CVE/CVE-2022-43589) +- [Live-Hack-CVE/CVE-2022-43439](https://github.com/Live-Hack-CVE/CVE-2022-43439) -### CVE-2022-43590 (2022-11-28) +### CVE-2022-43449 (2022-11-03) -A null pointer dereference vulnerability exists in the handle_ioctl_0x830a0_systembuffer functionality of Callback technologies CBFS Filter 20.0.8317. A specially-crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. +OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000. -- [Live-Hack-CVE/CVE-2022-43590](https://github.com/Live-Hack-CVE/CVE-2022-43590) +- [Live-Hack-CVE/CVE-2022-43449](https://github.com/Live-Hack-CVE/CVE-2022-43449) + +### CVE-2022-43451 (2022-11-03) + + +OpenHarmony-v3.1.2 and prior versions had an Multiple path traversal vulnerability in appspawn and nwebspawn services. Local attackers can create arbitrary directories or escape application sandbox.If chained with other vulnerabilities it would allow an unprivileged process to gain full root privileges. + + +- [Live-Hack-CVE/CVE-2022-43451](https://github.com/Live-Hack-CVE/CVE-2022-43451) + +### CVE-2022-43481 (2022-11-08) + + +Cross-Site Request Forgery (CSRF) vulnerability in Advanced Coupons for WooCommerce Coupons plugin <= 4.5 on WordPress leading to notice dismissal. + + +- [Live-Hack-CVE/CVE-2022-43481](https://github.com/Live-Hack-CVE/CVE-2022-43481) + +### CVE-2022-43488 (2022-11-09) + + +Cross-Site Request Forgery (CSRF) vulnerability in Advanced Dynamic Pricing for WooCommerce plugin <= 4.1.5 on WordPress leading to rule type migration. + + +- [Live-Hack-CVE/CVE-2022-43488](https://github.com/Live-Hack-CVE/CVE-2022-43488) + +### CVE-2022-43491 (2022-11-08) + + +Cross-Site Request Forgery (CSRF) vulnerability in Advanced Dynamic Pricing for WooCommerce plugin <= 4.1.5 on WordPress leading to plugin settings import. + + +- [Live-Hack-CVE/CVE-2022-43491](https://github.com/Live-Hack-CVE/CVE-2022-43491) + +### CVE-2022-43495 (2022-11-03) + + +OpenHarmony-v3.1.2 and prior versions had a DOS vulnerability in distributedhardware_device_manager when joining a network. Network attakcers can send an abonormal packet when joining a network, cause a nullptr reference and device reboot. + + +- [Live-Hack-CVE/CVE-2022-43495](https://github.com/Live-Hack-CVE/CVE-2022-43495) + +### CVE-2022-43545 (2022-11-08) + + +A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not properly validate the RecordType-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device. + + +- [Live-Hack-CVE/CVE-2022-43545](https://github.com/Live-Hack-CVE/CVE-2022-43545) + +### CVE-2022-43546 (2022-11-08) + + +A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.50), POWER METER SICAM Q100 (All versions < V2.50). Affected devices do not properly validate the EndTime-parameter in requests to the web interface on port 443/tcp. This could allow an authenticated remote attacker to crash the device (followed by an automatic reboot) or to execute arbitrary code on the device. + + +- [Live-Hack-CVE/CVE-2022-43546](https://github.com/Live-Hack-CVE/CVE-2022-43546) + +### CVE-2022-43561 (2022-11-03) + + +In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user that holds the “power” Splunk role can store arbitrary scripts that can lead to persistent cross-site scripting (XSS). The vulnerability affects instances with Splunk Web enabled. + + +- [Live-Hack-CVE/CVE-2022-43561](https://github.com/Live-Hack-CVE/CVE-2022-43561) + +### CVE-2022-43562 (2022-11-04) + + +In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, Splunk Enterprise fails to properly validate and escape the Host header, which could let a remote authenticated user conduct various attacks against the system, including cross-site scripting and cache poisoning. + + +- [Live-Hack-CVE/CVE-2022-43562](https://github.com/Live-Hack-CVE/CVE-2022-43562) + +### CVE-2022-43563 (2022-11-04) + + +In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the rex search command handles field names lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will. + + +- [Live-Hack-CVE/CVE-2022-43563](https://github.com/Live-Hack-CVE/CVE-2022-43563) + +### CVE-2022-43564 (2022-11-04) + + +In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a remote user who can create search macros and schedule search reports can cause a denial of service through the use of specially crafted search macros. + + +- [Live-Hack-CVE/CVE-2022-43564](https://github.com/Live-Hack-CVE/CVE-2022-43564) + +### CVE-2022-43565 (2022-11-04) + + +In Splunk Enterprise versions below 8.2.9 and 8.1.12, the way that the ‘tstats command handles Javascript Object Notation (JSON) lets an attacker bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards . The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. + + +- [Live-Hack-CVE/CVE-2022-43565](https://github.com/Live-Hack-CVE/CVE-2022-43565) + +### CVE-2022-43566 (2022-11-04) + + +In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run risky commands using a more privileged user’s permissions to bypass SPL safeguards for risky commands https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/SPLsafeguards in the Analytics Workspace. The vulnerability requires the attacker to phish the victim by tricking them into initiating a request within their browser. The attacker cannot exploit the vulnerability at will. + + +- [Live-Hack-CVE/CVE-2022-43566](https://github.com/Live-Hack-CVE/CVE-2022-43566) + +### CVE-2022-43567 (2022-11-04) + + +In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can run arbitrary operating system commands remotely through the use of specially crafted requests to the mobile alerts feature in the Splunk Secure Gateway app. + + +- [Live-Hack-CVE/CVE-2022-43567](https://github.com/Live-Hack-CVE/CVE-2022-43567) + +### CVE-2022-43568 (2022-11-04) + + +In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, a View allows for a Reflected Cross Site Scripting via JavaScript Object Notation (JSON) in a query parameter when output_mode=radio. + + +- [Live-Hack-CVE/CVE-2022-43568](https://github.com/Live-Hack-CVE/CVE-2022-43568) + +### CVE-2022-43569 (2022-11-04) + + +In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can inject and store arbitrary scripts that can lead to persistent cross-site scripting (XSS) in the object name of a Data Model. + + +- [Live-Hack-CVE/CVE-2022-43569](https://github.com/Live-Hack-CVE/CVE-2022-43569) + +### CVE-2022-43570 (2022-11-04) + + +In Splunk Enterprise versions below 8.1.12, 8.2.9, and 9.0.2, an authenticated user can perform an extensible markup language (XML) external entity (XXE) injection via a custom View. The XXE injection causes Splunk Web to embed incorrect documents into an error. + + +- [Live-Hack-CVE/CVE-2022-43570](https://github.com/Live-Hack-CVE/CVE-2022-43570) + +### CVE-2022-43571 (2022-11-03) + + +In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, an authenticated user can execute arbitrary code through the dashboard PDF generation component. + + +- [Live-Hack-CVE/CVE-2022-43571](https://github.com/Live-Hack-CVE/CVE-2022-43571) + +### CVE-2022-43572 (2022-11-04) + + +In Splunk Enterprise versions below 8.2.9, 8.1.12, and 9.0.2, sending a malformed file through the Splunk-to-Splunk (S2S) or HTTP Event Collector (HEC) protocols to an indexer results in a blockage or denial-of-service preventing further indexing. + + +- [Live-Hack-CVE/CVE-2022-43572](https://github.com/Live-Hack-CVE/CVE-2022-43572) + +### CVE-2022-43574 (2022-11-03) + + +"IBM Robotic Process Automation 21.0.1, 21.0.2, 21.0.3, 21.0.4, and 21.0.5 is vulnerable to incorrect permission assignment which could allow access to application configurations. IBM X-Force ID: 238679." + + +- [Live-Hack-CVE/CVE-2022-43574](https://github.com/Live-Hack-CVE/CVE-2022-43574) + +### CVE-2022-43671 (2022-11-11) + + +Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Access Manager Plus before 4306 allow SQL Injection. + + +- [Live-Hack-CVE/CVE-2022-43671](https://github.com/Live-Hack-CVE/CVE-2022-43671) ### CVE-2022-43672 (2022-11-11) @@ -8838,21 +9920,13 @@ Zoho ManageEngine Password Manager Pro before 12122, PAM360 before 5711, and Acc - [Live-Hack-CVE/CVE-2022-43672](https://github.com/Live-Hack-CVE/CVE-2022-43672) -### CVE-2022-43673 (2022-11-18) +### CVE-2022-43679 (2022-11-10) -Wire through 3.22.3993 on Windows advertises deletion of sent messages; nonetheless, all messages can be retrieved (for a limited period of time) from the AppData\Roaming\Wire\IndexedDB\https_app.wire.com_0.indexeddb.leveldb database. +The Docker image of ownCloud Server through 10.11 contains a misconfiguration that renders the trusted_domains config useless. This could be abused to spoof the URL in password-reset e-mail messages. -- [Live-Hack-CVE/CVE-2022-43673](https://github.com/Live-Hack-CVE/CVE-2022-43673) - -### CVE-2022-43685 (2022-11-21) - - -CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is sent via an HTTP POST request. This allows a user to take over an existing account including superuser accounts. - - -- [Live-Hack-CVE/CVE-2022-43685](https://github.com/Live-Hack-CVE/CVE-2022-43685) +- [Live-Hack-CVE/CVE-2022-43679](https://github.com/Live-Hack-CVE/CVE-2022-43679) ### CVE-2022-43686 (2022-11-14) @@ -8934,61 +10008,37 @@ Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vu - [Live-Hack-CVE/CVE-2022-43695](https://github.com/Live-Hack-CVE/CVE-2022-43695) -### CVE-2022-43705 (2022-11-26) +### CVE-2022-43752 (2022-10-31) -In Botan before 2.19.3, it is possible to forge OCSP responses due to a certificate verification error. This issue was introduced in Botan 1.11.34 (November 2016). +** UNSUPPORTED WHEN ASSIGNED ** Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon. -- [Live-Hack-CVE/CVE-2022-43705](https://github.com/Live-Hack-CVE/CVE-2022-43705) +- [Live-Hack-CVE/CVE-2022-43752](https://github.com/Live-Hack-CVE/CVE-2022-43752) -### CVE-2022-43707 (2022-11-21) +### CVE-2022-43753 (2022-11-10) -MyBB 1.8.31 has a Cross-site scripting (XSS) vulnerability in the visual MyCode editor (SCEditor) allows remote attackers to inject HTML via user input or stored data +A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to read files available to the user running the process, typically tomcat. This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10. -- [Live-Hack-CVE/CVE-2022-43707](https://github.com/Live-Hack-CVE/CVE-2022-43707) +- [Live-Hack-CVE/CVE-2022-43753](https://github.com/Live-Hack-CVE/CVE-2022-43753) -### CVE-2022-43708 (2022-11-21) +### CVE-2022-43754 (2022-11-10) -MyBB 1.8.31 has a (issue 2 of 2) cross-site scripting (XSS) vulnerabilities in the post Attachments interface allow attackers to inject HTML by persuading the user to upload a file with specially crafted name +An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in spacewalk/Uyuni of SUSE Linux Enterprise Module for SUSE Manager Server 4.2, SUSE Linux Enterprise Module for SUSE Manager Server 4.3, SUSE Manager Server 4.2 allows remote attackers to embed Javascript code via /rhn/audit/scap/Search.do This issue affects: SUSE Linux Enterprise Module for SUSE Manager Server 4.2 hub-xmlrpc-api-0.7-150300.3.9.2, inter-server-sync-0.2.4-150300.8.25.2, locale-formula-0.3-150300.3.3.2, py27-compat-salt-3000.3-150300.7.7.26.2, python-urlgrabber-3.10.2.1py2_3-150300.3.3.2, spacecmd-4.2.20-150300.4.30.2, spacewalk-backend-4.2.25-150300.4.32.4, spacewalk-client-tools-4.2.21-150300.4.27.3, spacewalk-java-4.2.43-150300.3.48.2, spacewalk-utils-4.2.18-150300.3.21.2, spacewalk-web-4.2.30-150300.3.30.3, susemanager-4.2.38-150300.3.44.3, susemanager-doc-indexes-4.2-150300.12.36.3, susemanager-docs_en-4.2-150300.12.36.2, susemanager-schema-4.2.25-150300.3.30.3, susemanager-sls versions prior to 4.2.28. SUSE Linux Enterprise Module for SUSE Manager Server 4.3 spacewalk-java versions prior to 4.3.39. SUSE Manager Server 4.2 release-notes-susemanager versions prior to 4.2.10. -- [Live-Hack-CVE/CVE-2022-43708](https://github.com/Live-Hack-CVE/CVE-2022-43708) +- [Live-Hack-CVE/CVE-2022-43754](https://github.com/Live-Hack-CVE/CVE-2022-43754) -### CVE-2022-43709 (2022-11-21) +### CVE-2022-43958 (2022-11-08) -MyBB 1.8.31 has a SQL injection vulnerability in the Admin CP's Users module allows remote authenticated users to modify the query string via direct user input or stored search filter settings. +A vulnerability has been identified in QMS Automotive (All versions). User credentials are stored in plaintext in the database. This could allow an attacker to gain access to credentials and impersonate other users. -- [Live-Hack-CVE/CVE-2022-43709](https://github.com/Live-Hack-CVE/CVE-2022-43709) - -### CVE-2022-43751 (2022-11-22) - - -McAfee Total Protection prior to version 16.0.49 contains an uncontrolled search path element vulnerability due to the use of a variable pointing to a subdirectory that may be controllable by an unprivileged user. This may have allowed the unprivileged user to execute arbitrary code with system privileges. - - -- [Live-Hack-CVE/CVE-2022-43751](https://github.com/Live-Hack-CVE/CVE-2022-43751) - -### CVE-2022-43781 (2022-11-16) - - -There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”. - - -- [Live-Hack-CVE/CVE-2022-43781](https://github.com/Live-Hack-CVE/CVE-2022-43781) - -### CVE-2022-43782 (2022-11-16) - - -Affected versions of Atlassian Crowd allow an attacker to authenticate as the crowd application via security misconfiguration and subsequent ability to call privileged endpoints in Crowd's REST API under the {{usermanagement}} path. This vulnerability can only be exploited by IPs specified under the crowd application allowlist in the Remote Addresses configuration, which is {{none}} by default. The affected versions are all versions 3.x.x, versions 4.x.x before version 4.4.4, and versions 5.x.x before 5.0.3 - - -- [Live-Hack-CVE/CVE-2022-43782](https://github.com/Live-Hack-CVE/CVE-2022-43782) +- [Live-Hack-CVE/CVE-2022-43958](https://github.com/Live-Hack-CVE/CVE-2022-43958) ### CVE-2022-43967 (2022-11-14) @@ -9006,405 +10056,117 @@ Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vu - [Live-Hack-CVE/CVE-2022-43968](https://github.com/Live-Hack-CVE/CVE-2022-43968) -### CVE-2022-43983 (2022-11-25) +### CVE-2022-44048 (2022-11-07) -Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol. +The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-domains package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-43983](https://github.com/Live-Hack-CVE/CVE-2022-43983) +- [Live-Hack-CVE/CVE-2022-44048](https://github.com/Live-Hack-CVE/CVE-2022-44048) -### CVE-2022-43984 (2022-11-25) +### CVE-2022-44049 (2022-11-07) -Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol. +The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-grammars package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-43984](https://github.com/Live-Hack-CVE/CVE-2022-43984) +- [Live-Hack-CVE/CVE-2022-44049](https://github.com/Live-Hack-CVE/CVE-2022-44049) -### CVE-2022-43999 (2022-11-16) +### CVE-2022-44050 (2022-11-07) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to exposed CORBA management services, arbitrary system commands can be executed on the server. +The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-json package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-43999](https://github.com/Live-Hack-CVE/CVE-2022-43999) +- [Live-Hack-CVE/CVE-2022-44050](https://github.com/Live-Hack-CVE/CVE-2022-44050) -### CVE-2022-44000 (2022-11-16) +### CVE-2022-44051 (2022-11-07) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to an exposed internal communications interface, it is possible to execute arbitrary system commands on the server. +The d8s-stats for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-math package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-44000](https://github.com/Live-Hack-CVE/CVE-2022-44000) +- [Live-Hack-CVE/CVE-2022-44051](https://github.com/Live-Hack-CVE/CVE-2022-44051) -### CVE-2022-44001 (2022-11-17) +### CVE-2022-44052 (2022-11-07) -An issue was discovered in BACKCLICK Professional 5.9.63. User authentication for accessing the CORBA back-end services can be bypassed. +The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-timezones package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-44001](https://github.com/Live-Hack-CVE/CVE-2022-44001) +- [Live-Hack-CVE/CVE-2022-44052](https://github.com/Live-Hack-CVE/CVE-2022-44052) -### CVE-2022-44002 (2022-11-16) +### CVE-2022-44053 (2022-11-07) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient output encoding of user-supplied data, the web application is vulnerable to cross-site scripting (XSS) at various locations. +The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-44002](https://github.com/Live-Hack-CVE/CVE-2022-44002) +- [Live-Hack-CVE/CVE-2022-44053](https://github.com/Live-Hack-CVE/CVE-2022-44053) -### CVE-2022-44003 (2022-11-16) +### CVE-2022-44054 (2022-11-07) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to insufficient escaping of user-supplied input, the application is vulnerable to SQL injection at various locations. +The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-utility package. The affected version of d8s-htm is 0.1.0. -- [Live-Hack-CVE/CVE-2022-44003](https://github.com/Live-Hack-CVE/CVE-2022-44003) +- [Live-Hack-CVE/CVE-2022-44054](https://github.com/Live-Hack-CVE/CVE-2022-44054) -### CVE-2022-44004 (2022-11-16) +### CVE-2022-44069 (2022-11-16) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to insecure design or lack of authentication, unauthenticated attackers can complete the password-reset process for any account and set a new password. +Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via the Nest library module. -- [Live-Hack-CVE/CVE-2022-44004](https://github.com/Live-Hack-CVE/CVE-2022-44004) +- [Live-Hack-CVE/CVE-2022-44069](https://github.com/Live-Hack-CVE/CVE-2022-44069) -### CVE-2022-44005 (2022-11-16) +### CVE-2022-44070 (2022-11-16) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to the use of consecutive IDs in verification links, the newsletter sign-up functionality is vulnerable to the enumeration of subscribers' e-mail addresses. Furthermore, it is possible to subscribe and verify other persons' e-mail addresses to newsletters without their consent. +Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via News articles. -- [Live-Hack-CVE/CVE-2022-44005](https://github.com/Live-Hack-CVE/CVE-2022-44005) +- [Live-Hack-CVE/CVE-2022-44070](https://github.com/Live-Hack-CVE/CVE-2022-44070) -### CVE-2022-44006 (2022-11-16) +### CVE-2022-44071 (2022-11-16) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation or sanitization of upload filenames, an externally reachable, unauthenticated update function permits writing files outside the intended target location. Achieving remote code execution is possible, e.g., by uploading an executable file. +Zenario CMS 9.3.57186 is is vulnerable to Cross Site Scripting (XSS) via profile. -- [Live-Hack-CVE/CVE-2022-44006](https://github.com/Live-Hack-CVE/CVE-2022-44006) +- [Live-Hack-CVE/CVE-2022-44071](https://github.com/Live-Hack-CVE/CVE-2022-44071) -### CVE-2022-44007 (2022-11-16) +### CVE-2022-44073 (2022-11-16) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to an unsafe implementation of session tracking, it is possible for an attacker to trick users into opening an authenticated user session for a session identifier known to the attacker, aka Session Fixation. +Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via svg,Users & Contacts. -- [Live-Hack-CVE/CVE-2022-44007](https://github.com/Live-Hack-CVE/CVE-2022-44007) +- [Live-Hack-CVE/CVE-2022-44073](https://github.com/Live-Hack-CVE/CVE-2022-44073) -### CVE-2022-44008 (2022-11-16) +### CVE-2022-44087 (2022-11-10) -An issue was discovered in BACKCLICK Professional 5.9.63. Due to improper validation, arbitrary local files can be retrieved by accessing the back-end Tomcat server directly. +ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component UPFILE_PIC_ZOOM_HIGHT. -- [Live-Hack-CVE/CVE-2022-44008](https://github.com/Live-Hack-CVE/CVE-2022-44008) +- [Live-Hack-CVE/CVE-2022-44087](https://github.com/Live-Hack-CVE/CVE-2022-44087) -### CVE-2022-44020 (2022-10-29) +### CVE-2022-44088 (2022-11-10) -An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and VirtualBMC through 2.2.2. Changing the boot device configuration with these packages removes password protection from the managed libvirt XML domain. NOTE: this only affects an "unsupported, production-like configuration." +ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component INPUT_ISDESCRIPTION. -- [Live-Hack-CVE/CVE-2022-44020](https://github.com/Live-Hack-CVE/CVE-2022-44020) +- [Live-Hack-CVE/CVE-2022-44088](https://github.com/Live-Hack-CVE/CVE-2022-44088) -### CVE-2022-44117 (2022-11-23) +### CVE-2022-44089 (2022-11-10) -Boa 0.94.14rc21 is vulnerable to SQL Injection via username. +ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component IS_GETCACHE. -- [Live-Hack-CVE/CVE-2022-44117](https://github.com/Live-Hack-CVE/CVE-2022-44117) - -### CVE-2022-44118 (2022-11-23) - - -dedecmdv6 v6.1.9 is vulnerable to Remote Code Execution (RCE) via file_manage_control.php. - - -- [Live-Hack-CVE/CVE-2022-44118](https://github.com/Live-Hack-CVE/CVE-2022-44118) - -### CVE-2022-44120 (2022-11-23) - - -dedecmdv6 6.1.9 is vulnerable to SQL Injection. via sys_sql_query.php. - - -- [Live-Hack-CVE/CVE-2022-44120](https://github.com/Live-Hack-CVE/CVE-2022-44120) - -### CVE-2022-44139 (2022-11-23) - - -Apartment Visitor Management System v1.0 is vulnerable to SQL Injection via /avms/index.php. - - -- [Live-Hack-CVE/CVE-2022-44139](https://github.com/Live-Hack-CVE/CVE-2022-44139) - -### CVE-2022-44140 (2022-11-23) - - -Jizhicms v2.3.3 was discovered to contain a SQL injection vulnerability via the /Member/memberedit.html component. - - -- [Live-Hack-CVE/CVE-2022-44140](https://github.com/Live-Hack-CVE/CVE-2022-44140) - -### CVE-2022-44151 (2022-11-30) - - -Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php. - - -- [Live-Hack-CVE/CVE-2022-44151](https://github.com/Live-Hack-CVE/CVE-2022-44151) - -### CVE-2022-44156 (2022-11-21) - - -Tenda AC15 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetIpMacBind. - - -- [Live-Hack-CVE/CVE-2022-44156](https://github.com/Live-Hack-CVE/CVE-2022-44156) - -### CVE-2022-44158 (2022-11-21) - - -Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via function via set_device_name. - - -- [Live-Hack-CVE/CVE-2022-44158](https://github.com/Live-Hack-CVE/CVE-2022-44158) - -### CVE-2022-44163 (2022-11-21) - - -Tenda AC21 V16.03.08.15 is vulnerable to Buffer Overflow via function formSetMacFilterCfg. - - -- [Live-Hack-CVE/CVE-2022-44163](https://github.com/Live-Hack-CVE/CVE-2022-44163) - -### CVE-2022-44167 (2022-11-21) - - -Tenda AC15 V15.03.05.18 is avulnerable to Buffer Overflow via function formSetPPTPServer. - - -- [Live-Hack-CVE/CVE-2022-44167](https://github.com/Live-Hack-CVE/CVE-2022-44167) - -### CVE-2022-44168 (2022-11-21) - - -Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function fromSetRouteStatic.. - - -- [Live-Hack-CVE/CVE-2022-44168](https://github.com/Live-Hack-CVE/CVE-2022-44168) - -### CVE-2022-44169 (2022-11-21) - - -Tenda AC15 V15.03.05.18 is vulnerable to Buffer Overflow via function formSetVirtualSer. - - -- [Live-Hack-CVE/CVE-2022-44169](https://github.com/Live-Hack-CVE/CVE-2022-44169) - -### CVE-2022-44171 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function form_fast_setting_wifi_set. - - -- [Live-Hack-CVE/CVE-2022-44171](https://github.com/Live-Hack-CVE/CVE-2022-44171) - -### CVE-2022-44172 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function R7WebsSecurityHandler. - - -- [Live-Hack-CVE/CVE-2022-44172](https://github.com/Live-Hack-CVE/CVE-2022-44172) - -### CVE-2022-44174 (2022-11-21) - - -Tenda AC18 V15.03.05.05 is vulnerable to Buffer Overflow via function formSetDeviceName. - - -- [Live-Hack-CVE/CVE-2022-44174](https://github.com/Live-Hack-CVE/CVE-2022-44174) - -### CVE-2022-44175 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetMacFilterCfg. - - -- [Live-Hack-CVE/CVE-2022-44175](https://github.com/Live-Hack-CVE/CVE-2022-44175) - -### CVE-2022-44176 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function fromSetRouteStatic. - - -- [Live-Hack-CVE/CVE-2022-44176](https://github.com/Live-Hack-CVE/CVE-2022-44176) - -### CVE-2022-44177 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart. - - -- [Live-Hack-CVE/CVE-2022-44177](https://github.com/Live-Hack-CVE/CVE-2022-44177) - -### CVE-2022-44178 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow. via function formWifiWpsOOB. - - -- [Live-Hack-CVE/CVE-2022-44178](https://github.com/Live-Hack-CVE/CVE-2022-44178) - -### CVE-2022-44180 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function addWifiMacFilter. - - -- [Live-Hack-CVE/CVE-2022-44180](https://github.com/Live-Hack-CVE/CVE-2022-44180) - -### CVE-2022-44183 (2022-11-21) - - -Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic. - - -- [Live-Hack-CVE/CVE-2022-44183](https://github.com/Live-Hack-CVE/CVE-2022-44183) - -### CVE-2022-44184 (2022-11-22) - - -Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_sec. - - -- [Live-Hack-CVE/CVE-2022-44184](https://github.com/Live-Hack-CVE/CVE-2022-44184) - -### CVE-2022-44186 (2022-11-22) - - -Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_pri. - - -- [Live-Hack-CVE/CVE-2022-44186](https://github.com/Live-Hack-CVE/CVE-2022-44186) - -### CVE-2022-44187 (2022-11-22) - - -Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via wan_dns1_pri. - - -- [Live-Hack-CVE/CVE-2022-44187](https://github.com/Live-Hack-CVE/CVE-2022-44187) - -### CVE-2022-44188 (2022-11-22) - - -Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter enable_band_steering. - - -- [Live-Hack-CVE/CVE-2022-44188](https://github.com/Live-Hack-CVE/CVE-2022-44188) - -### CVE-2022-44190 (2022-11-22) - - -Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering. - - -- [Live-Hack-CVE/CVE-2022-44190](https://github.com/Live-Hack-CVE/CVE-2022-44190) - -### CVE-2022-44191 (2022-11-22) - - -Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameters KEY1 and KEY2. - - -- [Live-Hack-CVE/CVE-2022-44191](https://github.com/Live-Hack-CVE/CVE-2022-44191) - -### CVE-2022-44193 (2022-11-22) - - -Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameters: starthour, startminute , endhour, and endminute. - - -- [Live-Hack-CVE/CVE-2022-44193](https://github.com/Live-Hack-CVE/CVE-2022-44193) - -### CVE-2022-44194 (2022-11-22) - - -Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameters apmode_dns1_pri and apmode_dns1_sec. - - -- [Live-Hack-CVE/CVE-2022-44194](https://github.com/Live-Hack-CVE/CVE-2022-44194) - -### CVE-2022-44196 (2022-11-22) - - -Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_push1. - - -- [Live-Hack-CVE/CVE-2022-44196](https://github.com/Live-Hack-CVE/CVE-2022-44196) - -### CVE-2022-44197 (2022-11-22) - - -Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. - - -- [Live-Hack-CVE/CVE-2022-44197](https://github.com/Live-Hack-CVE/CVE-2022-44197) - -### CVE-2022-44198 (2022-11-22) - - -Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_push1. - - -- [Live-Hack-CVE/CVE-2022-44198](https://github.com/Live-Hack-CVE/CVE-2022-44198) - -### CVE-2022-44199 (2022-11-22) - - -Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. - - -- [Live-Hack-CVE/CVE-2022-44199](https://github.com/Live-Hack-CVE/CVE-2022-44199) - -### CVE-2022-44200 (2022-11-22) - - -Netgear R7000P V1.3.0.8, V1.3.1.64 is vulnerable to Buffer Overflow via parameters: stamode_dns1_pri and stamode_dns1_sec. - - -- [Live-Hack-CVE/CVE-2022-44200](https://github.com/Live-Hack-CVE/CVE-2022-44200) - -### CVE-2022-44201 (2022-11-22) - - -D-Link DIR823G 1.02B05 is vulnerable to Commad Injection. - - -- [Live-Hack-CVE/CVE-2022-44201](https://github.com/Live-Hack-CVE/CVE-2022-44201) - -### CVE-2022-44202 (2022-11-22) - - -D-Link DIR878 1.02B04 and 1.02B05 are vulnerable to Buffer Overflow. - - -- [Live-Hack-CVE/CVE-2022-44202](https://github.com/Live-Hack-CVE/CVE-2022-44202) - -### CVE-2022-44204 (2022-11-18) - - -D-Link DIR3060 DIR3060A1_FW111B04.bin is vulnerable to Buffer Overflow. - - -- [Live-Hack-CVE/CVE-2022-44204](https://github.com/Live-Hack-CVE/CVE-2022-44204) +- [Live-Hack-CVE/CVE-2022-44089](https://github.com/Live-Hack-CVE/CVE-2022-44089) ### CVE-2022-44244 (2022-11-09) @@ -9414,189 +10176,93 @@ An authentication bypass in Lin-CMS v0.2.1 allows attackers to escalate privileg - [Live-Hack-CVE/CVE-2022-44244](https://github.com/Live-Hack-CVE/CVE-2022-44244) -### CVE-2022-44249 (2022-11-23) +### CVE-2022-44311 (2022-11-08) -TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the FileName parameter in the UploadFirmwareFile function. +html2xhtml v1.3 was discovered to contain an Out-Of-Bounds read in the function static void elm_close(tree_node_t *nodo) at procesador.c. This vulnerability allows attackers to access sensitive files or cause a Denial of Service (DoS) via a crafted html file. -- [Live-Hack-CVE/CVE-2022-44249](https://github.com/Live-Hack-CVE/CVE-2022-44249) +- [Live-Hack-CVE/CVE-2022-44311](https://github.com/Live-Hack-CVE/CVE-2022-44311) -### CVE-2022-44250 (2022-11-23) +### CVE-2022-44312 (2022-11-08) -TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the hostName parameter in the setOpModeCfg function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceInteger function in expression.c when called from ExpressionInfixOperator. -- [Live-Hack-CVE/CVE-2022-44250](https://github.com/Live-Hack-CVE/CVE-2022-44250) +- [Live-Hack-CVE/CVE-2022-44312](https://github.com/Live-Hack-CVE/CVE-2022-44312) -### CVE-2022-44251 (2022-11-23) +### CVE-2022-44313 (2022-11-08) -TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the ussd parameter in the setUssd function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceUnsignedInteger function in expression.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44251](https://github.com/Live-Hack-CVE/CVE-2022-44251) +- [Live-Hack-CVE/CVE-2022-44313](https://github.com/Live-Hack-CVE/CVE-2022-44313) -### CVE-2022-44252 (2022-11-23) +### CVE-2022-44314 (2022-11-08) -TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the FileName parameter in the setUploadSetting function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StringStrncpy function in cstdlib/string.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44252](https://github.com/Live-Hack-CVE/CVE-2022-44252) +- [Live-Hack-CVE/CVE-2022-44314](https://github.com/Live-Hack-CVE/CVE-2022-44314) -### CVE-2022-44253 (2022-11-23) +### CVE-2022-44315 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter ip in the setDiagnosisCfg function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionAssign function in expression.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44253](https://github.com/Live-Hack-CVE/CVE-2022-44253) +- [Live-Hack-CVE/CVE-2022-44315](https://github.com/Live-Hack-CVE/CVE-2022-44315) -### CVE-2022-44254 (2022-11-23) +### CVE-2022-44316 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter text in the setSmsCfg function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the LexGetStringConstant function in lex.c when called from LexScanGetToken. -- [Live-Hack-CVE/CVE-2022-44254](https://github.com/Live-Hack-CVE/CVE-2022-44254) +- [Live-Hack-CVE/CVE-2022-44316](https://github.com/Live-Hack-CVE/CVE-2022-44316) -### CVE-2022-44255 (2022-11-23) +### CVE-2022-44317 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a pre-authentication buffer overflow in the main function via long post data. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StdioOutPutc function in cstdlib/stdio.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44255](https://github.com/Live-Hack-CVE/CVE-2022-44255) +- [Live-Hack-CVE/CVE-2022-44317](https://github.com/Live-Hack-CVE/CVE-2022-44317) -### CVE-2022-44256 (2022-11-23) +### CVE-2022-44318 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter lang in the setLanguageCfg function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StringStrcat function in cstdlib/string.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44256](https://github.com/Live-Hack-CVE/CVE-2022-44256) +- [Live-Hack-CVE/CVE-2022-44318](https://github.com/Live-Hack-CVE/CVE-2022-44318) -### CVE-2022-44257 (2022-11-23) +### CVE-2022-44319 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter pppoeUser in the setOpModeCfg function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StdioBasePrintf function in cstdlib/string.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44257](https://github.com/Live-Hack-CVE/CVE-2022-44257) +- [Live-Hack-CVE/CVE-2022-44319](https://github.com/Live-Hack-CVE/CVE-2022-44319) -### CVE-2022-44258 (2022-11-23) +### CVE-2022-44320 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter command in the setTracerouteCfg function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the ExpressionCoerceFP function in expression.c when called from ExpressionParseFunctionCall. -- [Live-Hack-CVE/CVE-2022-44258](https://github.com/Live-Hack-CVE/CVE-2022-44258) +- [Live-Hack-CVE/CVE-2022-44320](https://github.com/Live-Hack-CVE/CVE-2022-44320) -### CVE-2022-44259 (2022-11-23) +### CVE-2022-44321 (2022-11-08) -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter week, sTime, and eTime in the setParentalRules function. +PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the LexSkipComment function in lex.c when called from LexScanGetToken. -- [Live-Hack-CVE/CVE-2022-44259](https://github.com/Live-Hack-CVE/CVE-2022-44259) - -### CVE-2022-44260 (2022-11-23) - - -TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter sPort/ePort in the setIpPortFilterRules function. - - -- [Live-Hack-CVE/CVE-2022-44260](https://github.com/Live-Hack-CVE/CVE-2022-44260) - -### CVE-2022-44278 (2022-11-23) - - -Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=user/manage_user&id=. - - -- [Live-Hack-CVE/CVE-2022-44278](https://github.com/Live-Hack-CVE/CVE-2022-44278) - -### CVE-2022-44279 (2022-11-29) - - -Garage Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via /garage/php_action/createBrand.php. - - -- [Live-Hack-CVE/CVE-2022-44279](https://github.com/Live-Hack-CVE/CVE-2022-44279) - -### CVE-2022-44280 (2022-11-23) - - -Automotive Shop Management System v1.0 is vulnerable to Delete any file via /asms/classes/Master.php?f=delete_img. - - -- [Live-Hack-CVE/CVE-2022-44280](https://github.com/Live-Hack-CVE/CVE-2022-44280) - -### CVE-2022-44294 (2022-11-30) - - -Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/manage_service&id=. - - -- [Live-Hack-CVE/CVE-2022-44294](https://github.com/Live-Hack-CVE/CVE-2022-44294) - -### CVE-2022-44295 (2022-11-30) - - -Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/orders/assign_team.php?id=. - - -- [Live-Hack-CVE/CVE-2022-44295](https://github.com/Live-Hack-CVE/CVE-2022-44295) - -### CVE-2022-44296 (2022-11-30) - - -Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/quotes/manage_remark.php?id=. - - -- [Live-Hack-CVE/CVE-2022-44296](https://github.com/Live-Hack-CVE/CVE-2022-44296) - -### CVE-2022-44354 (2022-11-29) - - -SolarView Compact 4.0 and 5.0 is vulnerable to Unrestricted File Upload via a crafted php file. - - -- [Live-Hack-CVE/CVE-2022-44354](https://github.com/Live-Hack-CVE/CVE-2022-44354) - -### CVE-2022-44355 (2022-11-29) - - -SolarView Compact 7.0 is vulnerable to Cross-site Scripting (XSS) via /network_test.php. - - -- [Live-Hack-CVE/CVE-2022-44355](https://github.com/Live-Hack-CVE/CVE-2022-44355) - -### CVE-2022-44378 (2022-11-18) - - -Automotive Shop Management System v1.0 is vulnerable to SQL via /asms/classes/Master.php?f=delete_mechanic. - - -- [Live-Hack-CVE/CVE-2022-44378](https://github.com/Live-Hack-CVE/CVE-2022-44378) - -### CVE-2022-44379 (2022-11-18) - - -Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/classes/Master.php?f=delete_service. - - -- [Live-Hack-CVE/CVE-2022-44379](https://github.com/Live-Hack-CVE/CVE-2022-44379) - -### CVE-2022-44384 (2022-11-17) - - -An arbitrary file upload vulnerability in rconfig v3.9.6 allows attackers to execute arbitrary code via a crafted PHP file. - - -- [Live-Hack-CVE/CVE-2022-44384](https://github.com/Live-Hack-CVE/CVE-2022-44384) +- [Live-Hack-CVE/CVE-2022-44321](https://github.com/Live-Hack-CVE/CVE-2022-44321) ### CVE-2022-44387 (2022-11-14) @@ -9614,61 +10280,133 @@ EyouCMS V1.5.9-UTF8-SP1 was discovered to contain a Cross-Site Request Forgery ( - [Live-Hack-CVE/CVE-2022-44389](https://github.com/Live-Hack-CVE/CVE-2022-44389) -### CVE-2022-44400 (2022-11-28) +### CVE-2022-44390 (2022-11-14) -Purchase Order Management System v1.0 contains a file upload vulnerability via /purchase_order/admin/?page=system_info. +A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field. -- [Live-Hack-CVE/CVE-2022-44400](https://github.com/Live-Hack-CVE/CVE-2022-44400) +- [Live-Hack-CVE/CVE-2022-44390](https://github.com/Live-Hack-CVE/CVE-2022-44390) -### CVE-2022-44401 (2022-11-28) +### CVE-2022-44544 (2022-11-06) -Online Tours & Travels Management System v1.0 contains an arbitrary file upload vulnerability via /tour/admin/file.php. +Mahara 21.04 before 21.04.7, 21.10 before 21.10.5, 22.04 before 22.04.3, and 22.10 before 22.10.0 potentially allow a PDF export to trigger a remote shell if the site is running on Ubuntu and the flag -dSAFER is not set with Ghostscript. -- [Live-Hack-CVE/CVE-2022-44401](https://github.com/Live-Hack-CVE/CVE-2022-44401) +- [Live-Hack-CVE/CVE-2022-44544](https://github.com/Live-Hack-CVE/CVE-2022-44544) -### CVE-2022-44402 (2022-11-17) +### CVE-2022-44546 (2022-11-09) -Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/classes/Master.php?f=delete_transaction. +The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. -- [Live-Hack-CVE/CVE-2022-44402](https://github.com/Live-Hack-CVE/CVE-2022-44402) +- [Live-Hack-CVE/CVE-2022-44546](https://github.com/Live-Hack-CVE/CVE-2022-44546) -### CVE-2022-44403 (2022-11-17) +### CVE-2022-44547 (2022-11-09) -Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/admin/?page=user/manage_user&id=. +The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. -- [Live-Hack-CVE/CVE-2022-44403](https://github.com/Live-Hack-CVE/CVE-2022-44403) +- [Live-Hack-CVE/CVE-2022-44547](https://github.com/Live-Hack-CVE/CVE-2022-44547) -### CVE-2022-44411 (2022-11-25) +### CVE-2022-44548 (2022-11-09) -Web Based Quiz System v1.0 transmits user passwords in plaintext during the authentication process, allowing attackers to obtain users' passwords via a bruteforce attack. +There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. -- [Live-Hack-CVE/CVE-2022-44411](https://github.com/Live-Hack-CVE/CVE-2022-44411) +- [Live-Hack-CVE/CVE-2022-44548](https://github.com/Live-Hack-CVE/CVE-2022-44548) -### CVE-2022-44414 (2022-11-18) +### CVE-2022-44549 (2022-11-09) -Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/admin/services/manage_service.php?id=. +The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. -- [Live-Hack-CVE/CVE-2022-44414](https://github.com/Live-Hack-CVE/CVE-2022-44414) +- [Live-Hack-CVE/CVE-2022-44549](https://github.com/Live-Hack-CVE/CVE-2022-44549) -### CVE-2022-44415 (2022-11-18) +### CVE-2022-44550 (2022-11-09) -Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/admin/mechanics/view_mechanic.php?id=. +The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. -- [Live-Hack-CVE/CVE-2022-44415](https://github.com/Live-Hack-CVE/CVE-2022-44415) +- [Live-Hack-CVE/CVE-2022-44550](https://github.com/Live-Hack-CVE/CVE-2022-44550) + +### CVE-2022-44551 (2022-11-09) + + +The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability. + + +- [Live-Hack-CVE/CVE-2022-44551](https://github.com/Live-Hack-CVE/CVE-2022-44551) + +### CVE-2022-44552 (2022-11-09) + + +The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability. + + +- [Live-Hack-CVE/CVE-2022-44552](https://github.com/Live-Hack-CVE/CVE-2022-44552) + +### CVE-2022-44553 (2022-11-09) + + +The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically. + + +- [Live-Hack-CVE/CVE-2022-44553](https://github.com/Live-Hack-CVE/CVE-2022-44553) + +### CVE-2022-44554 (2022-11-09) + + +The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device. + + +- [Live-Hack-CVE/CVE-2022-44554](https://github.com/Live-Hack-CVE/CVE-2022-44554) + +### CVE-2022-44555 (2022-11-09) + + +The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable. + + +- [Live-Hack-CVE/CVE-2022-44555](https://github.com/Live-Hack-CVE/CVE-2022-44555) + +### CVE-2022-44556 (2022-11-08) + + +Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. + + +- [Live-Hack-CVE/CVE-2022-44556](https://github.com/Live-Hack-CVE/CVE-2022-44556) + +### CVE-2022-44557 (2022-11-09) + + +The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality. + + +- [Live-Hack-CVE/CVE-2022-44557](https://github.com/Live-Hack-CVE/CVE-2022-44557) + +### CVE-2022-44558 (2022-11-09) + + +The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. + + +- [Live-Hack-CVE/CVE-2022-44558](https://github.com/Live-Hack-CVE/CVE-2022-44558) + +### CVE-2022-44559 (2022-11-09) + + +The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. + + +- [Live-Hack-CVE/CVE-2022-44559](https://github.com/Live-Hack-CVE/CVE-2022-44559) ### CVE-2022-44560 (2022-11-09) @@ -9686,397 +10424,173 @@ The preset launcher module has a permission verification vulnerability. Successf - [Live-Hack-CVE/CVE-2022-44561](https://github.com/Live-Hack-CVE/CVE-2022-44561) -### CVE-2022-44583 (2022-11-18) +### CVE-2022-44562 (2022-11-09) -Unauth. Arbitrary File Download vulnerability in WatchTowerHQ plugin <= 3.6.15 on WordPress. +The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. -- [Live-Hack-CVE/CVE-2022-44583](https://github.com/Live-Hack-CVE/CVE-2022-44583) +- [Live-Hack-CVE/CVE-2022-44562](https://github.com/Live-Hack-CVE/CVE-2022-44562) -### CVE-2022-44584 (2022-11-18) +### CVE-2022-44563 (2022-11-09) -Unauth. Arbitrary File Deletion vulnerability in WatchTowerHQ plugin <= 3.6.15 on WordPress. +There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality. -- [Live-Hack-CVE/CVE-2022-44584](https://github.com/Live-Hack-CVE/CVE-2022-44584) +- [Live-Hack-CVE/CVE-2022-44563](https://github.com/Live-Hack-CVE/CVE-2022-44563) -### CVE-2022-44591 (2022-11-17) +### CVE-2022-44590 (2022-11-09) -Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anthologize plugin <= 0.8.0 on WordPress. +Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in James Lao's Simple Video Embedder plugin <= 2.2 on WordPress. -- [Live-Hack-CVE/CVE-2022-44591](https://github.com/Live-Hack-CVE/CVE-2022-44591) +- [Live-Hack-CVE/CVE-2022-44590](https://github.com/Live-Hack-CVE/CVE-2022-44590) -### CVE-2022-44634 (2022-11-18) +### CVE-2022-44627 (2022-11-03) -Auth. (admin+) Arbitrary File Read vulnerability in S2W – Import Shopify to WooCommerce plugin <= 1.1.12 on WordPress. +Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple SEO plugin <= 1.8.12 on WordPress allows attackers to create or delete sitemaps. -- [Live-Hack-CVE/CVE-2022-44634](https://github.com/Live-Hack-CVE/CVE-2022-44634) +- [Live-Hack-CVE/CVE-2022-44627](https://github.com/Live-Hack-CVE/CVE-2022-44627) -### CVE-2022-44635 (2022-11-29) +### CVE-2022-44628 (2022-11-03) -Apache Fineract allowed an authenticated user to perform remote code execution due to a path traversal vulnerability in a file upload component of Apache Fineract, allowing an attacker to run remote code. This issue affects Apache Fineract version 1.8.0 and prior versions. We recommend users to upgrade to 1.8.1. +Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in JumpDEMAND Inc. 4ECPS Web Forms plugin <= 0.2.17 on WordPress. -- [Live-Hack-CVE/CVE-2022-44635](https://github.com/Live-Hack-CVE/CVE-2022-44635) +- [Live-Hack-CVE/CVE-2022-44628](https://github.com/Live-Hack-CVE/CVE-2022-44628) -### CVE-2022-44641 (2022-11-18) +### CVE-2022-44727 (2022-11-10) -In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service. +The EU Cookie Law GDPR (Banner + Blocker) module before 2.1.3 for PrestaShop allows SQL Injection via a cookie ( lgcookieslaw or __lglaw ). -- [Live-Hack-CVE/CVE-2022-44641](https://github.com/Live-Hack-CVE/CVE-2022-44641) +- [Live-Hack-CVE/CVE-2022-44727](https://github.com/Live-Hack-CVE/CVE-2022-44727) -### CVE-2022-44725 (2022-11-17) +### CVE-2022-44732 (2022-11-07) -OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user). +Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900. -- [Live-Hack-CVE/CVE-2022-44725](https://github.com/Live-Hack-CVE/CVE-2022-44725) +- [Live-Hack-CVE/CVE-2022-44732](https://github.com/Live-Hack-CVE/CVE-2022-44732) -### CVE-2022-44736 (2022-11-17) +### CVE-2022-44733 (2022-11-07) -Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Chameleon plugin <= 1.4.3 on WordPress. +Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900. -- [Live-Hack-CVE/CVE-2022-44736](https://github.com/Live-Hack-CVE/CVE-2022-44736) +- [Live-Hack-CVE/CVE-2022-44733](https://github.com/Live-Hack-CVE/CVE-2022-44733) -### CVE-2022-44737 (2022-11-22) +### CVE-2022-44741 (2022-11-08) -Multiple Cross-Site Request Forgery vulnerabilities in All-In-One Security (AIOS) – Security and Firewall (WordPress plugin) <= 5.1.0 on WordPress. +Cross-Site Request Forgery (CSRF) vulnerability leading to Cross-Site Scripting (XSS) in David Anderson Testimonial Slider plugin <= 1.3.1 on WordPress. -- [Live-Hack-CVE/CVE-2022-44737](https://github.com/Live-Hack-CVE/CVE-2022-44737) +- [Live-Hack-CVE/CVE-2022-44741](https://github.com/Live-Hack-CVE/CVE-2022-44741) -### CVE-2022-44740 (2022-11-18) +### CVE-2022-44744 (2022-11-07) -Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Creative Mail plugin <= 1.5.4 on WordPress. +Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107. -- [Live-Hack-CVE/CVE-2022-44740](https://github.com/Live-Hack-CVE/CVE-2022-44740) +- [Live-Hack-CVE/CVE-2022-44744](https://github.com/Live-Hack-CVE/CVE-2022-44744) -### CVE-2022-44748 (2022-11-24) +### CVE-2022-44745 (2022-11-07) -A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. Updates to fixed versions 4.13.6, 4.14.3, or 4.15.3 are advised. +Sensitive information leak through log files. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107. -- [Live-Hack-CVE/CVE-2022-44748](https://github.com/Live-Hack-CVE/CVE-2022-44748) +- [Live-Hack-CVE/CVE-2022-44745](https://github.com/Live-Hack-CVE/CVE-2022-44745) -### CVE-2022-44749 (2022-11-24) +### CVE-2022-44746 (2022-11-07) -A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Analytics Platform 3.2.0 and above can result in arbitrary files being overwritten on the user's system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being opened by a user, can overwrite arbitrary files that the user has write access to. It's not necessary to execute the workflow, opening the workflow is sufficient. The user will notice that something is wrong because an error is being reported but only after the files have already been written. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the user. In all cases the attacker has to know the location of files on the user's system, though. +Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107. -- [Live-Hack-CVE/CVE-2022-44749](https://github.com/Live-Hack-CVE/CVE-2022-44749) +- [Live-Hack-CVE/CVE-2022-44746](https://github.com/Live-Hack-CVE/CVE-2022-44746) -### CVE-2022-44784 (2022-11-21) +### CVE-2022-44747 (2022-11-07) -An issue was discovered in Appalti & Contratti 9.12.2. The target web applications LFS and DL229 expose a set of services provided by the Axis 1.4 instance, embedded directly into the applications, as hinted by the WEB-INF/web.xml file leaked through Local File Inclusion. Among the exposed services, there is the Axis AdminService, which, through the default configuration, should normally be accessible only by the localhost. Nevertheless, by trying to access the mentioned service, both in LFS and DL229, the service can actually be reached even by remote users, allowing creation of arbitrary services on the server side. When an attacker can reach the AdminService, they can use it to instantiate arbitrary services on the server. The exploit procedure is well known and described in Generic AXIS-SSRF exploitation. Basically, the attack consists of writing a JSP page inside the root directory of the web application, through the org.apache.axis.handlers.LogHandler class. +Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40107. -- [Live-Hack-CVE/CVE-2022-44784](https://github.com/Live-Hack-CVE/CVE-2022-44784) +- [Live-Hack-CVE/CVE-2022-44747](https://github.com/Live-Hack-CVE/CVE-2022-44747) -### CVE-2022-44785 (2022-11-21) +### CVE-2022-44792 (2022-11-06) -An issue was discovered in Appalti & Contratti 9.12.2. The target web applications are subject to multiple SQL Injection vulnerabilities, some of which executable even by unauthenticated users, as demonstrated by the GetListaEnti.do cfamm parameter. +handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. -- [Live-Hack-CVE/CVE-2022-44785](https://github.com/Live-Hack-CVE/CVE-2022-44785) +- [Live-Hack-CVE/CVE-2022-44792](https://github.com/Live-Hack-CVE/CVE-2022-44792) -### CVE-2022-44786 (2022-11-21) +### CVE-2022-44793 (2022-11-06) -An issue was discovered in Appalti & Contratti 9.12.2. The target web applications allow Local File Inclusion in any page relying on the href parameter to specify the JSP page to be rendered. This affects ApriPagina.do POST and GET requests to each application. +handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. -- [Live-Hack-CVE/CVE-2022-44786](https://github.com/Live-Hack-CVE/CVE-2022-44786) +- [Live-Hack-CVE/CVE-2022-44793](https://github.com/Live-Hack-CVE/CVE-2022-44793) -### CVE-2022-44787 (2022-11-21) +### CVE-2022-44794 (2022-11-06) -An issue was discovered in Appalti & Contratti 9.12.2. The web applications are vulnerable to a Reflected Cross-Site Scripting issue. The idPagina parameter is reflected inside the server response without any HTML encoding, resulting in XSS when the victim moves the mouse pointer inside the page. As an example, the onmouseenter attribute is not sanitized. +An issue was discovered in Object First 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in 1.0.13.1611. -- [Live-Hack-CVE/CVE-2022-44787](https://github.com/Live-Hack-CVE/CVE-2022-44787) +- [Live-Hack-CVE/CVE-2022-44794](https://github.com/Live-Hack-CVE/CVE-2022-44794) -### CVE-2022-44788 (2022-11-21) +### CVE-2022-44795 (2022-11-06) -An issue was discovered in Appalti & Contratti 9.12.2. It allows Session Fixation. When a user logs in providing a JSESSIONID cookie that is issued by the server at the first visit, the cookie value is not updated after a successful login. +An issue was discovered in Object First 1.0.7.712. A flaw was found in the Web Service, which could lead to local information disclosure. The command that creates the URL for the support bundle uses an insecure RNG. That can lead to prediction of the generated URL. As a result, an attacker can get access to system logs. An attacker would need credentials to exploit this vulnerability. This is fixed in 1.0.13.1611. -- [Live-Hack-CVE/CVE-2022-44788](https://github.com/Live-Hack-CVE/CVE-2022-44788) +- [Live-Hack-CVE/CVE-2022-44795](https://github.com/Live-Hack-CVE/CVE-2022-44795) -### CVE-2022-44801 (2022-11-22) +### CVE-2022-44796 (2022-11-06) -D-Link DIR-878 1.02B05 is vulnerable to Incorrect Access Control. +An issue was discovered in Object First 1.0.7.712. The authorization service has a flow that allows getting access to the Web UI without knowing credentials. For signing, the JWT token uses a secret key that is generated through a function that doesn't produce cryptographically strong sequences. An attacker can predict these sequences and generate a JWT token. As a result, an attacker can get access to the Web UI. This is fixed in 1.0.13.1611. -- [Live-Hack-CVE/CVE-2022-44801](https://github.com/Live-Hack-CVE/CVE-2022-44801) +- [Live-Hack-CVE/CVE-2022-44796](https://github.com/Live-Hack-CVE/CVE-2022-44796) -### CVE-2022-44804 (2022-11-22) +### CVE-2022-44797 (2022-11-06) -D-Link DIR-882 1.10B02 and1.20B06 is vulnerable to Buffer Overflow via the websRedirect function. +btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking. -- [Live-Hack-CVE/CVE-2022-44804](https://github.com/Live-Hack-CVE/CVE-2022-44804) +- [Live-Hack-CVE/CVE-2022-44797](https://github.com/Live-Hack-CVE/CVE-2022-44797) -### CVE-2022-44806 (2022-11-22) +### CVE-2022-45129 (2022-11-10) -D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow. +Payara before 2022-11-04, when deployed to the root context, allows attackers to visit META-INF and WEB-INF, a different vulnerability than CVE-2022-37422. This affects Payara Platform Community before 4.1.2.191.38, 5.x before 5.2022.4, and 6.x before 6.2022.1, and Payara Platform Enterprise before 5.45.0. -- [Live-Hack-CVE/CVE-2022-44806](https://github.com/Live-Hack-CVE/CVE-2022-44806) +- [Live-Hack-CVE/CVE-2022-45129](https://github.com/Live-Hack-CVE/CVE-2022-45129) -### CVE-2022-44807 (2022-11-22) +### CVE-2022-45130 (2022-11-10) -D-Link DIR-882 1.10B02 and 1.20B06 is vulnerable to Buffer Overflow via webGetVarString. +Plesk Obsidian allows a CSRF attack, e.g., via the /api/v2/cli/commands REST API to change an Admin password. NOTE: Obsidian is a specific version of the Plesk product: version numbers were used through version 12, and then the convention was changed so that versions are identified by names ("Obsidian"), not numbers. -- [Live-Hack-CVE/CVE-2022-44807](https://github.com/Live-Hack-CVE/CVE-2022-44807) - -### CVE-2022-44808 (2022-11-22) - - -A command injection vulnerability has been found on D-Link DIR-823G devices with firmware version 1.02B03 that allows an attacker to execute arbitrary operating system commands through well-designed /HNAP1 requests. Before the HNAP API function can process the request, the system function executes an untrusted command that triggers the vulnerability. - - -- [Live-Hack-CVE/CVE-2022-44808](https://github.com/Live-Hack-CVE/CVE-2022-44808) - -### CVE-2022-44820 (2022-11-18) - - -Automotive Shop Management System v1.0 is vulnerable to SQL Injection via /asms/admin/?page=transactions/manage_transaction&id=. - - -- [Live-Hack-CVE/CVE-2022-44820](https://github.com/Live-Hack-CVE/CVE-2022-44820) - -### CVE-2022-44830 (2022-11-21) - - -Sourcecodester Event Registration App v1.0 was discovered to contain multiple CSV injection vulnerabilities via the First Name, Contact and Remarks fields. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file. - - -- [Live-Hack-CVE/CVE-2022-44830](https://github.com/Live-Hack-CVE/CVE-2022-44830) - -### CVE-2022-44843 (2022-11-25) - - -TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the port parameter in the setting/setOpenVpnClientCfg function. - - -- [Live-Hack-CVE/CVE-2022-44843](https://github.com/Live-Hack-CVE/CVE-2022-44843) - -### CVE-2022-44844 (2022-11-25) - - -TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the pass parameter in the setting/setOpenVpnCfg function. - - -- [Live-Hack-CVE/CVE-2022-44844](https://github.com/Live-Hack-CVE/CVE-2022-44844) - -### CVE-2022-44858 (2022-11-25) - - -Automotive Shop Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /asms/products/view_product.php. - - -- [Live-Hack-CVE/CVE-2022-44858](https://github.com/Live-Hack-CVE/CVE-2022-44858) - -### CVE-2022-44859 (2022-11-25) - - -Automotive Shop Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /asms/admin/products/manage_product.php. - - -- [Live-Hack-CVE/CVE-2022-44859](https://github.com/Live-Hack-CVE/CVE-2022-44859) - -### CVE-2022-44860 (2022-11-25) - - -Automotive Shop Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/transactions/update_status.php. - - -- [Live-Hack-CVE/CVE-2022-44860](https://github.com/Live-Hack-CVE/CVE-2022-44860) - -### CVE-2022-45012 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in the Modify Page module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Source field. - - -- [Live-Hack-CVE/CVE-2022-45012](https://github.com/Live-Hack-CVE/CVE-2022-45012) - -### CVE-2022-45013 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in the Show Advanced Option module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Section Header field. - - -- [Live-Hack-CVE/CVE-2022-45013](https://github.com/Live-Hack-CVE/CVE-2022-45013) - -### CVE-2022-45014 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Header field. - - -- [Live-Hack-CVE/CVE-2022-45014](https://github.com/Live-Hack-CVE/CVE-2022-45014) - -### CVE-2022-45015 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Results Footer field. - - -- [Live-Hack-CVE/CVE-2022-45015](https://github.com/Live-Hack-CVE/CVE-2022-45015) - -### CVE-2022-45016 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Footer field. - - -- [Live-Hack-CVE/CVE-2022-45016](https://github.com/Live-Hack-CVE/CVE-2022-45016) - -### CVE-2022-45017 (2022-11-21) - - -A cross-site scripting (XSS) vulnerability in the Overview Page settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Loop field. - - -- [Live-Hack-CVE/CVE-2022-45017](https://github.com/Live-Hack-CVE/CVE-2022-45017) - -### CVE-2022-45036 (2022-11-25) - - -A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the No Results field. - - -- [Live-Hack-CVE/CVE-2022-45036](https://github.com/Live-Hack-CVE/CVE-2022-45036) - -### CVE-2022-45037 (2022-11-25) - - -A cross-site scripting (XSS) vulnerability in /admin/users/index.php of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Display Name field. - - -- [Live-Hack-CVE/CVE-2022-45037](https://github.com/Live-Hack-CVE/CVE-2022-45037) - -### CVE-2022-45038 (2022-11-25) - - -A cross-site scripting (XSS) vulnerability in /admin/settings/save.php of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website Footer field. - - -- [Live-Hack-CVE/CVE-2022-45038](https://github.com/Live-Hack-CVE/CVE-2022-45038) - -### CVE-2022-45039 (2022-11-25) - - -An arbitrary file upload vulnerability in the Server Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary code via a crafted PHP file. - - -- [Live-Hack-CVE/CVE-2022-45039](https://github.com/Live-Hack-CVE/CVE-2022-45039) - -### CVE-2022-45040 (2022-11-25) - - -A cross-site scripting (XSS) vulnerability in /admin/pages/sections_save.php of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name Section field. - - -- [Live-Hack-CVE/CVE-2022-45040](https://github.com/Live-Hack-CVE/CVE-2022-45040) - -### CVE-2022-45047 (2022-11-16) - - -Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server. - - -- [Live-Hack-CVE/CVE-2022-45047](https://github.com/Live-Hack-CVE/CVE-2022-45047) - -### CVE-2022-45066 (2022-11-17) - - -Auth. (subscriber+) Broken Access Control vulnerability in WooSwipe WooCommerce Gallery plugin <= 2.0.1 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45066](https://github.com/Live-Hack-CVE/CVE-2022-45066) - -### CVE-2022-45069 (2022-11-17) - - -Auth. (contributor+) Privilege Escalation vulnerability in Crowdsignal Dashboard plugin <= 3.0.9 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45069](https://github.com/Live-Hack-CVE/CVE-2022-45069) - -### CVE-2022-45071 (2022-11-17) - - -Cross-Site Request Forgery (CSRF) vulnerability in WPML Multilingual CMS premium plugin <= 4.5.13 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45071](https://github.com/Live-Hack-CVE/CVE-2022-45071) - -### CVE-2022-45072 (2022-11-17) - - -Cross-Site Request Forgery (CSRF) vulnerability in WPML Multilingual CMS premium plugin <= 4.5.13 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45072](https://github.com/Live-Hack-CVE/CVE-2022-45072) - -### CVE-2022-45073 (2022-11-18) - - -Cross-Site Request Forgery (CSRF) vulnerability in REST API Authentication plugin <= 2.4.0 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45073](https://github.com/Live-Hack-CVE/CVE-2022-45073) - -### CVE-2022-45077 (2022-11-17) - - -Auth. (subscriber+) PHP Object Injection vulnerability in Betheme theme <= 26.5.1.4 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45077](https://github.com/Live-Hack-CVE/CVE-2022-45077) - -### CVE-2022-45082 (2022-11-18) - - -Multiple Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerabilities in Accordions plugin <= 2.0.3 on WordPress via &addons-style-name and &accordions_or_faqs_license_key. - - -- [Live-Hack-CVE/CVE-2022-45082](https://github.com/Live-Hack-CVE/CVE-2022-45082) - -### CVE-2022-45132 (2022-11-18) - - -In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code execution can be achieved through user-submitted Jinja2 template. The REST API endpoint for validating device configuration files in lava-server loads input as a Jinja2 template in a way that can be used to trigger remote code execution in the LAVA server. - - -- [Live-Hack-CVE/CVE-2022-45132](https://github.com/Live-Hack-CVE/CVE-2022-45132) +- [Live-Hack-CVE/CVE-2022-45130](https://github.com/Live-Hack-CVE/CVE-2022-45130) ### CVE-2022-45136 (2022-11-14) @@ -10086,21 +10600,29 @@ In Linaro Automated Validation Architecture (LAVA) before 2022.11.1, remote code - [Live-Hack-CVE/CVE-2022-45136](https://github.com/Live-Hack-CVE/CVE-2022-45136) -### CVE-2022-45146 (2022-11-21) +### CVE-2022-45182 (2022-11-11) -An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or potential information loss. NOTE: FIPS compliant users are unaffected because the FIPS certification is only for Java 7, 8, and 11. +Pi-Star_DV_Dash (for Pi-Star DV) before 5aa194d mishandles the module parameter. -- [Live-Hack-CVE/CVE-2022-45146](https://github.com/Live-Hack-CVE/CVE-2022-45146) +- [Live-Hack-CVE/CVE-2022-45182](https://github.com/Live-Hack-CVE/CVE-2022-45182) -### CVE-2022-45163 (2022-11-18) +### CVE-2022-45183 (2022-11-14) -An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.) +Escalation of privileges in the Web Server in Ironman Software PowerShell Universal 2.x and 3.x allows an attacker with a valid app token to retrieve other app tokens by ID via an HTTP web request. Patched Versions are 3.5.3, 3.4.7, and 2.12.6. -- [Live-Hack-CVE/CVE-2022-45163](https://github.com/Live-Hack-CVE/CVE-2022-45163) +- [Live-Hack-CVE/CVE-2022-45183](https://github.com/Live-Hack-CVE/CVE-2022-45183) + +### CVE-2022-45184 (2022-11-14) + + +The Web Server in Ironman Software PowerShell Universal v3.x and v2.x allows for directory traversal outside of the configuration directory, which allows a remote attacker with administrator privilege to create, delete, update, and display files outside of the configuration directory via a crafted HTTP request to particular endpoints in the web server. Patched Versions are 3.5.3 and 3.4.7. + + +- [Live-Hack-CVE/CVE-2022-45184](https://github.com/Live-Hack-CVE/CVE-2022-45184) ### CVE-2022-45188 (2022-11-11) @@ -10110,6 +10632,22 @@ Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting - [Live-Hack-CVE/CVE-2022-45188](https://github.com/Live-Hack-CVE/CVE-2022-45188) +### CVE-2022-45193 (2022-11-11) + + +CBRN-Analysis before 22 has weak file permissions under Public Profile, leading to disclosure of file contents or privilege escalation. + + +- [Live-Hack-CVE/CVE-2022-45193](https://github.com/Live-Hack-CVE/CVE-2022-45193) + +### CVE-2022-45194 (2022-11-11) + + +CBRN-Analysis before 22 allows XXE attacks via am mws XML document, leading to NTLMv2-SSP hash disclosure. + + +- [Live-Hack-CVE/CVE-2022-45194](https://github.com/Live-Hack-CVE/CVE-2022-45194) + ### CVE-2022-45195 (2022-11-12) @@ -10126,294 +10664,6 @@ Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer cr - [Live-Hack-CVE/CVE-2022-45196](https://github.com/Live-Hack-CVE/CVE-2022-45196) -### CVE-2022-45198 (2022-11-14) - - -Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification). - - -- [Live-Hack-CVE/CVE-2022-45198](https://github.com/Live-Hack-CVE/CVE-2022-45198) - -### CVE-2022-45199 (2022-11-14) - - -Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. - - -- [Live-Hack-CVE/CVE-2022-45199](https://github.com/Live-Hack-CVE/CVE-2022-45199) - -### CVE-2022-45202 (2022-11-28) - - -GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a stack overflow via the function dimC_box_read at isomedia/box_code_3gpp.c. - - -- [Live-Hack-CVE/CVE-2022-45202](https://github.com/Live-Hack-CVE/CVE-2022-45202) - -### CVE-2022-45204 (2022-11-28) - - -GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a memory leak via the function dimC_box_read at isomedia/box_code_3gpp.c. - - -- [Live-Hack-CVE/CVE-2022-45204](https://github.com/Live-Hack-CVE/CVE-2022-45204) - -### CVE-2022-45205 (2022-11-25) - - -Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData. - - -- [Live-Hack-CVE/CVE-2022-45205](https://github.com/Live-Hack-CVE/CVE-2022-45205) - -### CVE-2022-45206 (2022-11-25) - - -Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check. - - -- [Live-Hack-CVE/CVE-2022-45206](https://github.com/Live-Hack-CVE/CVE-2022-45206) - -### CVE-2022-45207 (2022-11-25) - - -Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString. - - -- [Live-Hack-CVE/CVE-2022-45207](https://github.com/Live-Hack-CVE/CVE-2022-45207) - -### CVE-2022-45208 (2022-11-25) - - -Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin. - - -- [Live-Hack-CVE/CVE-2022-45208](https://github.com/Live-Hack-CVE/CVE-2022-45208) - -### CVE-2022-45210 (2022-11-25) - - -Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin. - - -- [Live-Hack-CVE/CVE-2022-45210](https://github.com/Live-Hack-CVE/CVE-2022-45210) - -### CVE-2022-45214 (2022-11-28) - - -A cross-site scripting (XSS) vulnerability in Sanitization Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username parameter at /php-sms/classes/Login.php. - - -- [Live-Hack-CVE/CVE-2022-45214](https://github.com/Live-Hack-CVE/CVE-2022-45214) - -### CVE-2022-45218 (2022-11-25) - - -Human Resource Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability. This vulnerability is triggered via a crafted payload injected into an authentication error message. - - -- [Live-Hack-CVE/CVE-2022-45218](https://github.com/Live-Hack-CVE/CVE-2022-45218) - -### CVE-2022-45221 (2022-11-28) - - -Web-Based Student Clearance System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in changepassword.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtnew_password parameter. - - -- [Live-Hack-CVE/CVE-2022-45221](https://github.com/Live-Hack-CVE/CVE-2022-45221) - -### CVE-2022-45223 (2022-11-28) - - -Web-Based Student Clearance System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /Admin/add-student.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtfullname parameter. - - -- [Live-Hack-CVE/CVE-2022-45223](https://github.com/Live-Hack-CVE/CVE-2022-45223) - -### CVE-2022-45224 (2022-11-28) - - -Web-Based Student Clearance System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in Admin/add-admin.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtfullname parameter. - - -- [Live-Hack-CVE/CVE-2022-45224](https://github.com/Live-Hack-CVE/CVE-2022-45224) - -### CVE-2022-45225 (2022-11-25) - - -Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the book_title parameter. - - -- [Live-Hack-CVE/CVE-2022-45225](https://github.com/Live-Hack-CVE/CVE-2022-45225) - -### CVE-2022-45276 (2022-11-23) - - -An issue in the /index/user/user_edit.html component of YJCMS v1.0.9 allows unauthenticated attackers to obtain the Administrator account password. - - -- [Live-Hack-CVE/CVE-2022-45276](https://github.com/Live-Hack-CVE/CVE-2022-45276) - -### CVE-2022-45278 (2022-11-23) - - -Jizhicms v2.3.3 was discovered to contain a SQL injection vulnerability via the /index.php/admins/Fields/get_fields.html component. - - -- [Live-Hack-CVE/CVE-2022-45278](https://github.com/Live-Hack-CVE/CVE-2022-45278) - -### CVE-2022-45280 (2022-11-23) - - -A cross-site scripting (XSS) vulnerability in the Url parameter in /login.php of EyouCMS v1.6.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. - - -- [Live-Hack-CVE/CVE-2022-45280](https://github.com/Live-Hack-CVE/CVE-2022-45280) - -### CVE-2022-45301 (2022-11-28) - - -Insecure permissions in Chocolatey Ruby package v3.1.2.1 and below grants all users in the Authenticated Users group write privileges for the path C:\tools\ruby31 and all files located in that folder. - - -- [Live-Hack-CVE/CVE-2022-45301](https://github.com/Live-Hack-CVE/CVE-2022-45301) - -### CVE-2022-45304 (2022-11-28) - - -Insecure permissions in Chocolatey Cmder package v1.3.20 and below grants all users in the Authenticated Users group write privileges for the path C:\tools\Cmder and all files located in that folder. - - -- [Live-Hack-CVE/CVE-2022-45304](https://github.com/Live-Hack-CVE/CVE-2022-45304) - -### CVE-2022-45305 (2022-11-28) - - -Insecure permissions in Chocolatey Python3 package v3.11.0 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\Python311 and all files located in that folder. - - -- [Live-Hack-CVE/CVE-2022-45305](https://github.com/Live-Hack-CVE/CVE-2022-45305) - -### CVE-2022-45306 (2022-11-28) - - -Insecure permissions in Chocolatey Azure-Pipelines-Agent package v2.211.1 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\agent and all files located in that folder. - - -- [Live-Hack-CVE/CVE-2022-45306](https://github.com/Live-Hack-CVE/CVE-2022-45306) - -### CVE-2022-45307 (2022-11-28) - - -Insecure permissions in Chocolatey PHP package v8.1.12 and below grants all users in the Authenticated Users group write privileges for the subfolder C:\tools\php81 and all files located in that folder. - - -- [Live-Hack-CVE/CVE-2022-45307](https://github.com/Live-Hack-CVE/CVE-2022-45307) - -### CVE-2022-45329 (2022-11-28) - - -AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the Search parameter. This vulnerability allows attackers to access database information. - - -- [Live-Hack-CVE/CVE-2022-45329](https://github.com/Live-Hack-CVE/CVE-2022-45329) - -### CVE-2022-45330 (2022-11-22) - - -AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the Category parameter at \category.php. This vulnerability allows attackers to access database information. - - -- [Live-Hack-CVE/CVE-2022-45330](https://github.com/Live-Hack-CVE/CVE-2022-45330) - -### CVE-2022-45331 (2022-11-22) - - -AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the p_id parameter at \post.php. This vulnerability allows attackers to access database information. - - -- [Live-Hack-CVE/CVE-2022-45331](https://github.com/Live-Hack-CVE/CVE-2022-45331) - -### CVE-2022-45343 (2022-11-29) - - -GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c. - - -- [Live-Hack-CVE/CVE-2022-45343](https://github.com/Live-Hack-CVE/CVE-2022-45343) - -### CVE-2022-45363 (2022-11-22) - - -Auth. (subscriber+) Stored Cross-Site Scripting (XSS) in Muffingroup Betheme theme <= 26.6.1 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45363](https://github.com/Live-Hack-CVE/CVE-2022-45363) - -### CVE-2022-45369 (2022-11-18) - - -Auth. (subscriber+) Broken Access Control vulnerability in Plugin for Google Reviews plugin <= 2.2.2 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45369](https://github.com/Live-Hack-CVE/CVE-2022-45369) - -### CVE-2022-45375 (2022-11-17) - - -Auth. Stored Cross-Site Scripting (XSS) vulnerability in iFeature Slider plugin <= 1.2 on WordPress. - - -- [Live-Hack-CVE/CVE-2022-45375](https://github.com/Live-Hack-CVE/CVE-2022-45375) - -### CVE-2022-45379 (2022-11-15) - - -Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks. - - -- [Live-Hack-CVE/CVE-2022-45379](https://github.com/Live-Hack-CVE/CVE-2022-45379) - -### CVE-2022-45380 (2022-11-15) - - -Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. - - -- [Live-Hack-CVE/CVE-2022-45380](https://github.com/Live-Hack-CVE/CVE-2022-45380) - -### CVE-2022-45381 (2022-11-15) - - -Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system. - - -- [Live-Hack-CVE/CVE-2022-45381](https://github.com/Live-Hack-CVE/CVE-2022-45381) - -### CVE-2022-45382 (2022-11-15) - - -Jenkins Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names. - - -- [Live-Hack-CVE/CVE-2022-45382](https://github.com/Live-Hack-CVE/CVE-2022-45382) - -### CVE-2022-45383 (2022-11-15) - - -An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission. - - -- [Live-Hack-CVE/CVE-2022-45383](https://github.com/Live-Hack-CVE/CVE-2022-45383) - -### CVE-2022-45384 (2022-11-15) - - -Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system. - - -- [Live-Hack-CVE/CVE-2022-45384](https://github.com/Live-Hack-CVE/CVE-2022-45384) - ### CVE-2022-45385 (2022-11-15) @@ -10494,30 +10744,6 @@ A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows a - [Live-Hack-CVE/CVE-2022-45394](https://github.com/Live-Hack-CVE/CVE-2022-45394) -### CVE-2022-45395 (2022-11-15) - - -Jenkins CCCC Plugin 0.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. - - -- [Live-Hack-CVE/CVE-2022-45395](https://github.com/Live-Hack-CVE/CVE-2022-45395) - -### CVE-2022-45396 (2022-11-15) - - -Jenkins SourceMonitor Plugin 0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. - - -- [Live-Hack-CVE/CVE-2022-45396](https://github.com/Live-Hack-CVE/CVE-2022-45396) - -### CVE-2022-45397 (2022-11-15) - - -Jenkins OSF Builder Suite : : XML Linter Plugin 1.0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. - - -- [Live-Hack-CVE/CVE-2022-45397](https://github.com/Live-Hack-CVE/CVE-2022-45397) - ### CVE-2022-45398 (2022-11-15) @@ -10534,14 +10760,6 @@ A missing permission check in Jenkins Cluster Statistics Plugin 0.4.6 and earlie - [Live-Hack-CVE/CVE-2022-45399](https://github.com/Live-Hack-CVE/CVE-2022-45399) -### CVE-2022-45400 (2022-11-15) - - -Jenkins JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. - - -- [Live-Hack-CVE/CVE-2022-45400](https://github.com/Live-Hack-CVE/CVE-2022-45400) - ### CVE-2022-45401 (2022-11-15) @@ -10558,240 +10776,16 @@ In Apache Airflow versions prior to 2.4.3, there was an open redirect in the web - [Live-Hack-CVE/CVE-2022-45402](https://github.com/Live-Hack-CVE/CVE-2022-45402) -### CVE-2022-45461 (2022-11-17) - - -The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root. - - -- [Live-Hack-CVE/CVE-2022-45461](https://github.com/Live-Hack-CVE/CVE-2022-45461) - -### CVE-2022-45462 (2022-11-23) - - -Alarm instance management has command injection when there is a specific command configured. It is only for logged-in users. We recommend you upgrade to version 2.0.6 or higher - - -- [Live-Hack-CVE/CVE-2022-45462](https://github.com/Live-Hack-CVE/CVE-2022-45462) - -### CVE-2022-45470 (2022-11-21) - - -** UNSUPPORTED WHEN ASSIGNED ** missing input validation in Apache Hama may cause information disclosure through path traversal and XSS. Since Apache Hama is EOL, we do not expect these issues to be fixed. - - -- [Live-Hack-CVE/CVE-2022-45470](https://github.com/Live-Hack-CVE/CVE-2022-45470) - -### CVE-2022-45471 (2022-11-18) - - -In JetBrains Hub before 2022.3.15181 Throttling was missed when sending emails to a particular email address - - -- [Live-Hack-CVE/CVE-2022-45471](https://github.com/Live-Hack-CVE/CVE-2022-45471) - -### CVE-2022-45472 (2022-11-23) - - -CAE LearningSpace Enterprise (with Intuity License) image 267r patch 639 allows DOM XSS, related to ontouchmove and onpointerup. - - -- [Live-Hack-CVE/CVE-2022-45472](https://github.com/Live-Hack-CVE/CVE-2022-45472) - -### CVE-2022-45473 (2022-11-18) - - -In drachtio-server 0.8.18, /var/log/drachtio has mode 0777 and drachtio.log has mode 0666. - - -- [Live-Hack-CVE/CVE-2022-45473](https://github.com/Live-Hack-CVE/CVE-2022-45473) - -### CVE-2022-45474 (2022-11-18) - - -drachtio-server 0.8.18 has a request-handler.cpp event_cb use-after-free for any request. - - -- [Live-Hack-CVE/CVE-2022-45474](https://github.com/Live-Hack-CVE/CVE-2022-45474) - -### CVE-2022-45529 (2022-11-22) - - -AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the post_category_id parameter at \admin\includes\edit_post.php. This vulnerability allows attackers to access database information. - - -- [Live-Hack-CVE/CVE-2022-45529](https://github.com/Live-Hack-CVE/CVE-2022-45529) - -### CVE-2022-45535 (2022-11-22) - - -AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the edit parameter at \admin\categories.php. This vulnerability allows attackers to access database information. - - -- [Live-Hack-CVE/CVE-2022-45535](https://github.com/Live-Hack-CVE/CVE-2022-45535) - -### CVE-2022-45536 (2022-11-22) - - -AeroCMS v0.0.1 was discovered to contain a SQL Injection vulnerability via the id parameter at \admin\post_comments.php. This vulnerability allows attackers to access database information. - - -- [Live-Hack-CVE/CVE-2022-45536](https://github.com/Live-Hack-CVE/CVE-2022-45536) - -### CVE-2022-45868 (2022-11-23) - - -The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be able to discover the password by listing processes and their arguments. NOTE: the vendor states "This is not a vulnerability of H2 Console ... Passwords should never be passed on the command line and every qualified DBA or system administrator is expected to know that." - - -- [Live-Hack-CVE/CVE-2022-45868](https://github.com/Live-Hack-CVE/CVE-2022-45868) - -### CVE-2022-45872 (2022-11-23) - - -iTerm2 before 3.4.18 mishandles a DECRQSS response. - - -- [Live-Hack-CVE/CVE-2022-45872](https://github.com/Live-Hack-CVE/CVE-2022-45872) - -### CVE-2022-45873 (2022-11-23) - - -systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file. - - -- [Live-Hack-CVE/CVE-2022-45873](https://github.com/Live-Hack-CVE/CVE-2022-45873) - -### CVE-2022-45884 (2022-11-24) - - -An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops. - - -- [Live-Hack-CVE/CVE-2022-45884](https://github.com/Live-Hack-CVE/CVE-2022-45884) - -### CVE-2022-45885 (2022-11-24) - - -An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected. - - -- [Live-Hack-CVE/CVE-2022-45885](https://github.com/Live-Hack-CVE/CVE-2022-45885) - -### CVE-2022-45886 (2022-11-24) - - -An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free. - - -- [Live-Hack-CVE/CVE-2022-45886](https://github.com/Live-Hack-CVE/CVE-2022-45886) - -### CVE-2022-45887 (2022-11-24) - - -An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call. - - -- [Live-Hack-CVE/CVE-2022-45887](https://github.com/Live-Hack-CVE/CVE-2022-45887) - -### CVE-2022-45888 (2022-11-24) - - -An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device. - - -- [Live-Hack-CVE/CVE-2022-45888](https://github.com/Live-Hack-CVE/CVE-2022-45888) - -### CVE-2022-45907 (2022-11-25) - - -In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. - - -- [Live-Hack-CVE/CVE-2022-45907](https://github.com/Live-Hack-CVE/CVE-2022-45907) - -### CVE-2022-45908 (2022-11-25) - - -In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution. - - -- [Live-Hack-CVE/CVE-2022-45908](https://github.com/Live-Hack-CVE/CVE-2022-45908) - -### CVE-2022-45919 (2022-11-26) - - -An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event. - - -- [Live-Hack-CVE/CVE-2022-45919](https://github.com/Live-Hack-CVE/CVE-2022-45919) - -### CVE-2022-45930 (2022-11-26) - - -A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/DomainStore.java deleteDomain function is affected for the /auth/v1/domains/ API interface. - - -- [Live-Hack-CVE/CVE-2022-45930](https://github.com/Live-Hack-CVE/CVE-2022-45930) - -### CVE-2022-45931 (2022-11-26) - - -A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used. - - -- [Live-Hack-CVE/CVE-2022-45931](https://github.com/Live-Hack-CVE/CVE-2022-45931) - -### CVE-2022-45932 (2022-11-26) - - -A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used. - - -- [Live-Hack-CVE/CVE-2022-45932](https://github.com/Live-Hack-CVE/CVE-2022-45932) - -### CVE-2022-45933 (2022-11-26) - - -KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure." - - -- [Live-Hack-CVE/CVE-2022-45933](https://github.com/Live-Hack-CVE/CVE-2022-45933) - -### CVE-2022-45934 (2022-11-26) - - -An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. - - -- [Live-Hack-CVE/CVE-2022-45934](https://github.com/Live-Hack-CVE/CVE-2022-45934) - -### CVE-2022-45939 (2022-11-28) - - -GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. - - -- [Live-Hack-CVE/CVE-2022-45939](https://github.com/Live-Hack-CVE/CVE-2022-45939) - -### CVE-2022-46148 (2022-11-29) - - -Discourse is an open-source messaging platform. In versions 2.8.10 and prior on the `stable` branch and versions 2.9.0.beta11 and prior on the `beta` and `tests-passed` branches, users composing malicious messages and navigating to drafts page could self-XSS. This vulnerability can lead to a full XSS on sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. - - -- [Live-Hack-CVE/CVE-2022-46148](https://github.com/Live-Hack-CVE/CVE-2022-46148) - -### CVE-2022-46150 (2022-11-29) - - -Discourse is an open-source discussion platform. Prior to version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches, unauthorized users may learn of the existence of hidden tags and that they have been applied to topics that they have access to. This issue is patched in version 2.8.13 of the `stable` branch and version 2.9.0.beta14 of the `beta` and `tests-passed` branches. As a workaround, use the `disable_email` site setting to disable all emails to non-staff users. - - -- [Live-Hack-CVE/CVE-2022-46150](https://github.com/Live-Hack-CVE/CVE-2022-46150) - ## 2021 +### CVE-2021-0185 (2022-11-10) + + +Improper input validation in the firmware for some Intel(R) Server Board M10JNP Family before version 7.216 may allow a privileged user to potentially enable an escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2021-0185](https://github.com/Live-Hack-CVE/CVE-2021-0185) + ### CVE-2021-0302 (2021-02-10) @@ -10866,21 +10860,12 @@ In checkCallerIsSystemOr of CompanionDeviceManagerService.java, there is a possi - [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0319) -### CVE-2021-0325 (2021-02-10) - - -In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784 - - -- [nanopathi/external_libavc_AOSP10_r33_CVE-2021-0325](https://github.com/nanopathi/external_libavc_AOSP10_r33_CVE-2021-0325) - ### CVE-2021-0326 (2021-02-10) In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525 -- [aemmitt-ns/skeleton](https://github.com/aemmitt-ns/skeleton) - [nanopathi/wpa_supplicant_8_CVE-2021-0326.](https://github.com/nanopathi/wpa_supplicant_8_CVE-2021-0326.) - [Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326](https://github.com/Satheesh575555/external_wpa_supplicant_8_AOSP10_r33_CVE-2021-0326) - [nanopathi/Packages_wpa_supplicant8_CVE-2021-0326](https://github.com/nanopathi/Packages_wpa_supplicant8_CVE-2021-0326) @@ -10909,14 +10894,6 @@ In several native functions called by AdvertiseManager.java, there is a possible - [ShaikUsaf/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329](https://github.com/ShaikUsaf/packages_apps_Bluetooth_AOSP10_r33_CVE-2021-0329) -### CVE-2021-0330 (2021-02-10) - - -In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441 - - -- [Satheesh575555/system_core_AOSP10_r33-CVE-2021-0330](https://github.com/Satheesh575555/system_core_AOSP10_r33-CVE-2021-0330) - ### CVE-2021-0331 (2021-02-10) @@ -10941,14 +10918,6 @@ In onCreate of BluetoothPermissionActivity.java, there is a possible permissions - [Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0333](https://github.com/Satheesh575555/packages_apps_Settings_AOSP10_r33_CVE-2021-0333) -### CVE-2021-0334 (2021-02-10) - - -In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811 - - -- [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0334](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0334) - ### CVE-2021-0336 (2021-02-10) @@ -11014,14 +10983,6 @@ In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related - [Satheesh575555/external_v8_AOSP10_r33_CVE-2021-0396](https://github.com/Satheesh575555/external_v8_AOSP10_r33_CVE-2021-0396) -### CVE-2021-0397 (2021-03-10) - - -In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148 - - -- [Satheesh575555/System_bt_AOSP10-r33_CVE-2021-0397](https://github.com/Satheesh575555/System_bt_AOSP10-r33_CVE-2021-0397) - ### CVE-2021-0431 (2021-04-13) @@ -11056,14 +11017,6 @@ In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could l - [nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0437](https://github.com/nanopathi/frameworks_av_AOSP10_r33_CVE-2021-0437) -### CVE-2021-0472 (2021-06-11) - - -In shouldLockKeyguard of LockTaskController.java, there is a possible way to exit App Pinning without a PIN due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-176801033 - - -- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0472](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0472) - ### CVE-2021-0474 (2021-06-11) @@ -11218,7 +11171,6 @@ In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user In lockAllProfileTasks of RootWindowContainer.java, there is a possible way to access the work profile without the profile PIN, after logging in. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-177457096 -- [pazhanivel07/Settings-CVE-2021-0595](https://github.com/pazhanivel07/Settings-CVE-2021-0595) - [pazhanivel07/frameworks_base_Aosp10_r33_CVE-2021-0595](https://github.com/pazhanivel07/frameworks_base_Aosp10_r33_CVE-2021-0595) ### CVE-2021-0600 (2021-07-14) @@ -11237,14 +11189,6 @@ In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write du - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0640](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0640) -### CVE-2021-0652 (2021-10-22) - - -In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568 - - -- [Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0652](https://github.com/Satheesh575555/frameworks_base_AOSP10_r33_CVE-2021-0652) - ### CVE-2021-0683 (2021-10-06) @@ -11270,14 +11214,6 @@ In sanitizeSbn of NotificationManagerService.java, there is a possible way to ke - [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-0705) - [Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0705](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2021-0705) -### CVE-2021-0928 (2021-12-15) - - -In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581 - - -- [michalbednarski/ReparcelBug2](https://github.com/michalbednarski/ReparcelBug2) - ### CVE-2021-0934 (2022-12-13) @@ -11297,6 +11233,14 @@ In ResolverActivity, there is a possible user interaction bypass due to a tapjac ### CVE-2021-403 - [rhysmcneill/CVE-2021-403](https://github.com/rhysmcneill/CVE-2021-403) +### CVE-2021-1050 (2022-11-08) + + +In MMU_UnmapPages of the PowerVR kernel driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-243825200 + + +- [Live-Hack-CVE/CVE-2021-1050](https://github.com/Live-Hack-CVE/CVE-2021-1050) + ### CVE-2021-1056 (2021-01-07) @@ -11347,8 +11291,6 @@ Windows Print Spooler Elevation of Privilege Vulnerability - [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675) - [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675) - [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675) -- [TheJoyOfHacking/cube0x0-CVE-2021-1675](https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675) -- [TheJoyOfHacking/calebstewart-CVE-2021-1675](https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675) - [jj4152/cve-2021-1675](https://github.com/jj4152/cve-2021-1675) ### CVE-2021-1699 (2021-01-12) @@ -11398,14 +11340,6 @@ Possible buffer overflow due to lack of offset length check while updating the b - [tamirzb/CVE-2021-1961](https://github.com/tamirzb/CVE-2021-1961) -### CVE-2021-1965 (2021-07-13) - - -Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking - - -- [foxtrot/CVE-2021-1965](https://github.com/foxtrot/CVE-2021-1965) - ### CVE-2021-1994 (2021-01-20) @@ -11439,7 +11373,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109) - [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109) - [yuaneuro/CVE-2021-2109_poc](https://github.com/yuaneuro/CVE-2021-2109_poc) -- [coco0x0a/CVE-2021-2109](https://github.com/coco0x0a/CVE-2021-2109) - [Vulnmachines/oracle-weblogic-CVE-2021-2109](https://github.com/Vulnmachines/oracle-weblogic-CVE-2021-2109) ### CVE-2021-2119 (2021-01-20) @@ -11449,7 +11382,6 @@ Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp - [Sauercloud/RWCTF21-VirtualBox-61-escape](https://github.com/Sauercloud/RWCTF21-VirtualBox-61-escape) -- [chatbottesisgmailh/Sauercloude](https://github.com/chatbottesisgmailh/Sauercloude) - [shi10587s/Sauercloude](https://github.com/shi10587s/Sauercloude) ### CVE-2021-2173 (2021-04-22) @@ -11619,7 +11551,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based - [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156) - [chenaotian/CVE-2021-3156](https://github.com/chenaotian/CVE-2021-3156) - [ret2basic/SudoScience](https://github.com/ret2basic/SudoScience) -- [puckiestyle/CVE-2021-3156](https://github.com/puckiestyle/CVE-2021-3156) - [RodricBr/CVE-2021-3156](https://github.com/RodricBr/CVE-2021-3156) - [ypl6/heaplens](https://github.com/ypl6/heaplens) - [q77190858/CVE-2021-3156](https://github.com/q77190858/CVE-2021-3156) @@ -11704,6 +11635,14 @@ KLog Server through 2.4.1 allows authenticated command injection. async.php call - [Al1ex/CVE-2021-3317](https://github.com/Al1ex/CVE-2021-3317) +### CVE-2021-3326 (2021-01-27) + + +The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. + + +- [Live-Hack-CVE/CVE-2021-3326](https://github.com/Live-Hack-CVE/CVE-2021-3326) + ### CVE-2021-3345 (2021-01-29) @@ -11871,7 +11810,6 @@ It was found that polkit could be tricked into bypassing the credential checks f - [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit) - [AssassinUKG/Polkit-CVE-2021-3560](https://github.com/AssassinUKG/Polkit-CVE-2021-3560) - [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560) -- [innxrmxst/CVE-2021-3560](https://github.com/innxrmxst/CVE-2021-3560) - [RicterZ/CVE-2021-3560-Authentication-Agent](https://github.com/RicterZ/CVE-2021-3560-Authentication-Agent) - [WinMin/CVE-2021-3560](https://github.com/WinMin/CVE-2021-3560) - [UNICORDev/exploit-CVE-2021-3560](https://github.com/UNICORDev/exploit-CVE-2021-3560) @@ -11892,6 +11830,14 @@ A flaw was found in python-pip in the way it handled Unicode separators in git r - [frenzymadness/CVE-2021-3572](https://github.com/frenzymadness/CVE-2021-3572) +### CVE-2021-3597 (2022-05-24) + + +A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.35.SP1, prior to 2.2.6.SP1, prior to 2.2.7.SP1, prior to 2.0.36.SP1, prior to 2.2.9.Final and prior to 2.0.39.Final. + + +- [Live-Hack-CVE/CVE-2021-3597](https://github.com/Live-Hack-CVE/CVE-2021-3597) + ### CVE-2021-3598 (2021-07-06) @@ -11924,6 +11870,14 @@ A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM - [Live-Hack-CVE/CVE-2021-3623](https://github.com/Live-Hack-CVE/CVE-2021-3623) +### CVE-2021-3629 (2022-05-24) + + +A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final. + + +- [Live-Hack-CVE/CVE-2021-3629](https://github.com/Live-Hack-CVE/CVE-2021-3629) + ### CVE-2021-3632 (2022-08-26) @@ -11932,6 +11886,14 @@ A flaw was found in Keycloak. This vulnerability allows anyone to register a new - [Live-Hack-CVE/CVE-2021-3632](https://github.com/Live-Hack-CVE/CVE-2021-3632) +### CVE-2021-3634 (2021-08-31) + + +A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange. + + +- [Live-Hack-CVE/CVE-2021-3634](https://github.com/Live-Hack-CVE/CVE-2021-3634) + ### CVE-2021-3638 (2022-03-03) @@ -11996,6 +11958,14 @@ ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING struct - [Live-Hack-CVE/CVE-2021-3712](https://github.com/Live-Hack-CVE/CVE-2021-3712) +### CVE-2021-3717 (2022-05-24) + + +A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This flaw affects wildfly-core versions prior to 17.0. + + +- [Live-Hack-CVE/CVE-2021-3717](https://github.com/Live-Hack-CVE/CVE-2021-3717) + ### CVE-2021-3732 (2022-03-07) @@ -12068,6 +12038,14 @@ A flaw was found in glib before version 2.63.6. Due to random charset alias, pke - [Live-Hack-CVE/CVE-2021-3800](https://github.com/Live-Hack-CVE/CVE-2021-3800) +### CVE-2021-3807 (2021-09-17) + + +ansi-regex is vulnerable to Inefficient Regular Expression Complexity + + +- [Live-Hack-CVE/CVE-2021-3807](https://github.com/Live-Hack-CVE/CVE-2021-3807) + ### CVE-2021-3821 (2022-11-21) @@ -12100,14 +12078,6 @@ A flaw was found in Undertow that tripped the client-side invocation timeout wit - [Live-Hack-CVE/CVE-2021-3859](https://github.com/Live-Hack-CVE/CVE-2021-3859) -### CVE-2021-3864 (2022-08-26) - - -A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges. - - -- [walac/cve-2021-3864](https://github.com/walac/cve-2021-3864) - ### CVE-2021-3899 - [liumuqing/CVE-2021-3899_PoC](https://github.com/liumuqing/CVE-2021-3899_PoC) @@ -12135,6 +12105,14 @@ vim is vulnerable to Heap-based Buffer Overflow - [Live-Hack-CVE/CVE-2021-3927](https://github.com/Live-Hack-CVE/CVE-2021-3927) +### CVE-2021-3928 (2021-11-05) + + +vim is vulnerable to Use of Uninitialized Variable + + +- [Live-Hack-CVE/CVE-2021-3928](https://github.com/Live-Hack-CVE/CVE-2021-3928) + ### CVE-2021-3929 (2022-08-25) @@ -12183,6 +12161,14 @@ A potential vulnerability by a driver used during manufacturing process on some - [killvxk/CVE-2021-3972](https://github.com/killvxk/CVE-2021-3972) +### CVE-2021-3974 (2021-11-19) + + +vim is vulnerable to Use After Free + + +- [Live-Hack-CVE/CVE-2021-3974](https://github.com/Live-Hack-CVE/CVE-2021-3974) + ### CVE-2021-3975 (2022-08-23) @@ -12207,6 +12193,14 @@ Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privi - [Live-Hack-CVE/CVE-2021-3982](https://github.com/Live-Hack-CVE/CVE-2021-3982) +### CVE-2021-3984 (2021-12-01) + + +vim is vulnerable to Heap-based Buffer Overflow + + +- [Live-Hack-CVE/CVE-2021-3984](https://github.com/Live-Hack-CVE/CVE-2021-3984) + ### CVE-2021-3995 (2022-08-23) @@ -12223,6 +12217,14 @@ A logic error was found in the libmount library of util-linux in the function th - [Live-Hack-CVE/CVE-2021-3996](https://github.com/Live-Hack-CVE/CVE-2021-3996) +### CVE-2021-3998 (2022-08-24) + + +A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data. + + +- [Live-Hack-CVE/CVE-2021-3998](https://github.com/Live-Hack-CVE/CVE-2021-3998) + ### CVE-2021-3999 (2022-08-24) @@ -12231,6 +12233,22 @@ A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd - [Live-Hack-CVE/CVE-2021-3999](https://github.com/Live-Hack-CVE/CVE-2021-3999) +### CVE-2021-4001 (2022-01-21) + + +A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2. + + +- [Live-Hack-CVE/CVE-2021-4001](https://github.com/Live-Hack-CVE/CVE-2021-4001) + +### CVE-2021-4019 (2021-12-01) + + +vim is vulnerable to Heap-based Buffer Overflow + + +- [Live-Hack-CVE/CVE-2021-4019](https://github.com/Live-Hack-CVE/CVE-2021-4019) + ### CVE-2021-4034 (2022-01-28) @@ -12241,37 +12259,16 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility. - [chenaotian/CVE-2021-4034](https://github.com/chenaotian/CVE-2021-4034) - [ly4k/PwnKit](https://github.com/ly4k/PwnKit) - [xcanwin/CVE-2021-4034-UniontechOS](https://github.com/xcanwin/CVE-2021-4034-UniontechOS) -- [nobelh/CVE-2021-4034](https://github.com/nobelh/CVE-2021-4034) - [tahaafarooq/poppy](https://github.com/tahaafarooq/poppy) - [PwnFunction/CVE-2021-4034](https://github.com/PwnFunction/CVE-2021-4034) -- [c3c/CVE-2021-4034](https://github.com/c3c/CVE-2021-4034) - [galoget/PwnKit-CVE-2021-4034](https://github.com/galoget/PwnKit-CVE-2021-4034) - [Sakura-nee/CVE-2021-4034](https://github.com/Sakura-nee/CVE-2021-4034) - [CYB3RK1D/CVE-2021-4034-POC](https://github.com/CYB3RK1D/CVE-2021-4034-POC) -- [OXDBXKXO/ez-pwnkit](https://github.com/OXDBXKXO/ez-pwnkit) - [rvizx/CVE-2021-4034](https://github.com/rvizx/CVE-2021-4034) - [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit) -- [hohn/codeql-sample-polkit](https://github.com/hohn/codeql-sample-polkit) -- [JoaoFukuda/CVE-2021-4034_POC](https://github.com/JoaoFukuda/CVE-2021-4034_POC) -- [Tanmay-N/CVE-2021-4034](https://github.com/Tanmay-N/CVE-2021-4034) -- [hahaleyile/CVE-2021-4034](https://github.com/hahaleyile/CVE-2021-4034) -- [movvamrocks/PwnKit-CVE-2021-4034](https://github.com/movvamrocks/PwnKit-CVE-2021-4034) -- [Squirre17/CVE-2021-4034](https://github.com/Squirre17/CVE-2021-4034) -- [Jesrat/make_me_root](https://github.com/Jesrat/make_me_root) -- [defhacks/cve-2021-4034](https://github.com/defhacks/cve-2021-4034) -- [PentesterSoham/CVE-2021-4034-exploit](https://github.com/PentesterSoham/CVE-2021-4034-exploit) - [T3slaa/pwnkit-pwn](https://github.com/T3slaa/pwnkit-pwn) -- [bakhtiyarsierad/CVE-2021-4034-bug-root](https://github.com/bakhtiyarsierad/CVE-2021-4034-bug-root) -- [ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034](https://github.com/ITMarcin2211/Polkit-s-Pkexec-CVE-2021-4034) -- [edsonjt81/CVE-2021-4034-Linux](https://github.com/edsonjt81/CVE-2021-4034-Linux) -- [Kashiki078/CVE-2021-4034](https://github.com/Kashiki078/CVE-2021-4034) -- [nel0x/pwnkit-vulnerability](https://github.com/nel0x/pwnkit-vulnerability) -- [TomSgn/CVE-2021-4034](https://github.com/TomSgn/CVE-2021-4034) - [hifumi1337/CVE-2021-4034](https://github.com/hifumi1337/CVE-2021-4034) -- [TheJoyOfHacking/berdav-CVE-2021-4034](https://github.com/TheJoyOfHacking/berdav-CVE-2021-4034) -- [tzwlhack/CVE-2021-4034](https://github.com/tzwlhack/CVE-2021-4034) - [Pajarraco4444/CVE-2021-4034](https://github.com/Pajarraco4444/CVE-2021-4034) -- [jcatala/f_poc_cve-2021-4034](https://github.com/jcatala/f_poc_cve-2021-4034) - [Nosferatuvjr/PwnKit](https://github.com/Nosferatuvjr/PwnKit) - [ArkAngeL43/CVE-2021-4034](https://github.com/ArkAngeL43/CVE-2021-4034) - [rhin0cer0s/CVE-2021-4034](https://github.com/rhin0cer0s/CVE-2021-4034) @@ -12308,6 +12305,14 @@ TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affect - [hacefresko/CVE-2021-4045-PoC](https://github.com/hacefresko/CVE-2021-4045-PoC) - [1x019/CVE-2021-4045](https://github.com/1x019/CVE-2021-4045) +### CVE-2021-4069 (2021-12-06) + + +vim is vulnerable to Use After Free + + +- [Live-Hack-CVE/CVE-2021-4069](https://github.com/Live-Hack-CVE/CVE-2021-4069) + ### CVE-2021-4090 (2022-02-18) @@ -12332,6 +12337,62 @@ A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v - [Markakd/CVE-2021-4154](https://github.com/Markakd/CVE-2021-4154) +### CVE-2021-4160 (2022-01-28) + + +There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb). + + +- [Live-Hack-CVE/CVE-2021-4160](https://github.com/Live-Hack-CVE/CVE-2021-4160) + +### CVE-2021-4181 (2021-12-30) + + +Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4181](https://github.com/Live-Hack-CVE/CVE-2021-4181) + +### CVE-2021-4182 (2021-12-30) + + +Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4182](https://github.com/Live-Hack-CVE/CVE-2021-4182) + +### CVE-2021-4183 (2021-12-30) + + +Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4183](https://github.com/Live-Hack-CVE/CVE-2021-4183) + +### CVE-2021-4184 (2021-12-30) + + +Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4184](https://github.com/Live-Hack-CVE/CVE-2021-4184) + +### CVE-2021-4185 (2021-12-30) + + +Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4185](https://github.com/Live-Hack-CVE/CVE-2021-4185) + +### CVE-2021-4186 (2021-12-30) + + +Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4186](https://github.com/Live-Hack-CVE/CVE-2021-4186) + ### CVE-2021-4189 (2022-08-24) @@ -12340,6 +12401,30 @@ A flaw was found in Python, specifically in the FTP (File Transfer Protocol) cli - [Live-Hack-CVE/CVE-2021-4189](https://github.com/Live-Hack-CVE/CVE-2021-4189) +### CVE-2021-4190 (2021-12-30) + + +Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file + + +- [Live-Hack-CVE/CVE-2021-4190](https://github.com/Live-Hack-CVE/CVE-2021-4190) + +### CVE-2021-4192 (2021-12-31) + + +vim is vulnerable to Use After Free + + +- [Live-Hack-CVE/CVE-2021-4192](https://github.com/Live-Hack-CVE/CVE-2021-4192) + +### CVE-2021-4193 (2021-12-31) + + +vim is vulnerable to Out-of-bounds Read + + +- [Live-Hack-CVE/CVE-2021-4193](https://github.com/Live-Hack-CVE/CVE-2021-4193) + ### CVE-2021-4203 (2022-03-25) @@ -12348,14 +12433,6 @@ A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due - [Live-Hack-CVE/CVE-2021-4203](https://github.com/Live-Hack-CVE/CVE-2021-4203) -### CVE-2021-4204 (2022-08-24) - - -An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information. - - -- [tr3ee/CVE-2021-4204](https://github.com/tr3ee/CVE-2021-4204) - ### CVE-2021-4207 (2022-04-29) @@ -12364,6 +12441,14 @@ A flaw was found in the QXL display device emulation in QEMU. A double fetch of - [Live-Hack-CVE/CVE-2021-4207](https://github.com/Live-Hack-CVE/CVE-2021-4207) +### CVE-2021-4214 (2022-08-24) + + +A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service. + + +- [Live-Hack-CVE/CVE-2021-4214](https://github.com/Live-Hack-CVE/CVE-2021-4214) + ### CVE-2021-4217 (2022-08-24) @@ -12671,6 +12756,14 @@ An unauthenticated command injection vulnerability exists in multiple parameters - [ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138](https://github.com/ShaikUsaf/frameworks_base_AOSP10_r33_CVE-2021-20138) +### CVE-2021-20227 (2021-03-23) + + +A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability. + + +- [Live-Hack-CVE/CVE-2021-20227](https://github.com/Live-Hack-CVE/CVE-2021-20227) + ### CVE-2021-20233 (2021-03-03) @@ -12679,6 +12772,14 @@ A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the me - [pauljrowland/BootHoleFix](https://github.com/pauljrowland/BootHoleFix) +### CVE-2021-20294 (2021-04-29) + + +A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability. + + +- [Live-Hack-CVE/CVE-2021-20294](https://github.com/Live-Hack-CVE/CVE-2021-20294) + ### CVE-2021-20296 (2021-04-01) @@ -12799,14 +12900,6 @@ Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote att - [s-index/CVE-2021-20717](https://github.com/s-index/CVE-2021-20717) -### CVE-2021-20837 (2021-10-26) - - -Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability. - - -- [orangmuda/CVE-2021-20837](https://github.com/orangmuda/CVE-2021-20837) - ### CVE-2021-21014 (2021-02-11) @@ -12822,7 +12915,6 @@ Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 - [ZeusBox/CVE-2021-21017](https://github.com/ZeusBox/CVE-2021-21017) -- [tzwlhack/CVE-2021-21017](https://github.com/tzwlhack/CVE-2021-21017) ### CVE-2021-21042 (2021-02-11) @@ -12856,14 +12948,6 @@ Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a rem - [Grayhaxor/CVE-2021-21148](https://github.com/Grayhaxor/CVE-2021-21148) -### CVE-2021-21193 (2021-03-16) - - -Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. - - -- [mehrzad1994/CVE-2021-21193](https://github.com/mehrzad1994/CVE-2021-21193) - ### CVE-2021-21234 (2021-01-05) @@ -12887,8 +12971,6 @@ Git is an open-source distributed revision control system. In affected versions - [ETOCheney/cve-2021-21300](https://github.com/ETOCheney/cve-2021-21300) - [fengzhouc/CVE-2021-21300](https://github.com/fengzhouc/CVE-2021-21300) - [danshuizhangyu/CVE-2021-21300](https://github.com/danshuizhangyu/CVE-2021-21300) -- [Jiang59991/cve-2021-21300](https://github.com/Jiang59991/cve-2021-21300) -- [Jiang59991/cve-2021-21300-plus](https://github.com/Jiang59991/cve-2021-21300-plus) - [macilin/CVE-2021-21300](https://github.com/macilin/CVE-2021-21300) - [Roboterh/CVE-2021-21300](https://github.com/Roboterh/CVE-2021-21300) - [ruifi47/cve-2021-21300-PoC](https://github.com/ruifi47/cve-2021-21300-PoC) @@ -12911,7 +12993,6 @@ XStream is a Java library to serialize objects to XML and back again. In XStream - [s-index/CVE-2021-21341](https://github.com/s-index/CVE-2021-21341) -- [Mani1325/ka-cve-2021-21341](https://github.com/Mani1325/ka-cve-2021-21341) ### CVE-2021-21349 (2021-03-22) @@ -12983,7 +13064,6 @@ Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability - [arnaudluti/PS-CVE-2021-21551](https://github.com/arnaudluti/PS-CVE-2021-21551) - [mathisvickie/CVE-2021-21551](https://github.com/mathisvickie/CVE-2021-21551) - [mzakocs/CVE-2021-21551-POC](https://github.com/mzakocs/CVE-2021-21551-POC) -- [ihack4falafel/Dell-Driver-EoP-CVE-2021-21551](https://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551) - [tijme/kernel-mii](https://github.com/tijme/kernel-mii) ### CVE-2021-21693 (2021-11-04) @@ -13002,6 +13082,14 @@ In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, c - [Live-Hack-CVE/CVE-2021-21707](https://github.com/Live-Hack-CVE/CVE-2021-21707) +### CVE-2021-21772 (2021-03-10) + + +A use-after-free vulnerability exists in the NMR::COpcPackageReader::releaseZIP() functionality of 3MF Consortium lib3mf 2.0.0. A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. + + +- [Live-Hack-CVE/CVE-2021-21772](https://github.com/Live-Hack-CVE/CVE-2021-21772) + ### CVE-2021-21809 (2021-06-23) @@ -13072,7 +13160,6 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v - [password520/CVE-2021-21972](https://github.com/password520/CVE-2021-21972) - [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972) - [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter) -- [orangmuda/CVE-2021-21972](https://github.com/orangmuda/CVE-2021-21972) - [user16-et/cve-2021-21972_PoC](https://github.com/user16-et/cve-2021-21972_PoC) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [trhacknon/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/trhacknon/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972) @@ -13119,14 +13206,6 @@ VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code exe - [me1ons/CVE-2021-21978](https://github.com/me1ons/CVE-2021-21978) - [skytina/CVE-2021-21978](https://github.com/skytina/CVE-2021-21978) -### CVE-2021-21983 (2021-03-31) - - -Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system. - - -- [murataydemir/CVE-2021-21983](https://github.com/murataydemir/CVE-2021-21983) - ### CVE-2021-21985 (2021-05-26) @@ -13175,6 +13254,14 @@ VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20. - [MKSx/CVE-2021-22054](https://github.com/MKSx/CVE-2021-22054) +### CVE-2021-22137 (2021-05-13) + + +In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices. + + +- [Live-Hack-CVE/CVE-2021-22137](https://github.com/Live-Hack-CVE/CVE-2021-22137) + ### CVE-2021-22141 (2022-11-18) @@ -13183,6 +13270,14 @@ An open redirect flaw was found in Kibana versions before 7.13.0 and 6.8.16. If - [Live-Hack-CVE/CVE-2021-22141](https://github.com/Live-Hack-CVE/CVE-2021-22141) +### CVE-2021-22147 (2021-09-15) + + +Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view. + + +- [Live-Hack-CVE/CVE-2021-22147](https://github.com/Live-Hack-CVE/CVE-2021-22147) + ### CVE-2021-22192 (2021-03-24) @@ -13209,8 +13304,6 @@ Improper neutralization of user data in the DjVu file format in ExifTool version - [convisolabs/CVE-2021-22204-exiftool](https://github.com/convisolabs/CVE-2021-22204-exiftool) - [se162xg/CVE-2021-22204](https://github.com/se162xg/CVE-2021-22204) - [bilkoh/POC-CVE-2021-22204](https://github.com/bilkoh/POC-CVE-2021-22204) -- [tuhinGsg/CVE-2021-22204-exiftool](https://github.com/tuhinGsg/CVE-2021-22204-exiftool) -- [Pajarraco4444/CVE-2021-22204](https://github.com/Pajarraco4444/CVE-2021-22204) - [UNICORDev/exploit-CVE-2021-22204](https://github.com/UNICORDev/exploit-CVE-2021-22204) ### CVE-2021-22205 (2021-04-23) @@ -13223,7 +13316,6 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro - [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205) - [c0okB/CVE-2021-22205](https://github.com/c0okB/CVE-2021-22205) - [GitLab-Red-Team/cve-hash-harvester](https://github.com/GitLab-Red-Team/cve-hash-harvester) -- [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205) - [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-) - [keven1z/CVE-2021-22205](https://github.com/keven1z/CVE-2021-22205) @@ -13253,6 +13345,14 @@ A CWE-732: Incorrect Permission Assignment for Critical Resource vulnerability e - [Live-Hack-CVE/CVE-2021-22716](https://github.com/Live-Hack-CVE/CVE-2021-22716) +### CVE-2021-22737 (2021-05-26) + + +Insufficiently Protected Credentials vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior that could cause unauthorized access of when credentials are discovered after a brute force attack. + + +- [Live-Hack-CVE/CVE-2021-22737](https://github.com/Live-Hack-CVE/CVE-2021-22737) + ### CVE-2021-22893 (2021-04-23) @@ -13261,7 +13361,6 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b - [ZephrFish/CVE-2021-22893_HoneyPoC2](https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2) - [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893) -- [orangmuda/CVE-2021-22893](https://github.com/orangmuda/CVE-2021-22893) ### CVE-2021-22911 (2021-05-27) @@ -13303,6 +13402,14 @@ libcurl-using applications can ask for a specific client certificate to be used - [Live-Hack-CVE/CVE-2021-22926](https://github.com/Live-Hack-CVE/CVE-2021-22926) +### CVE-2021-22939 (2021-08-16) + + +If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted. + + +- [Live-Hack-CVE/CVE-2021-22939](https://github.com/Live-Hack-CVE/CVE-2021-22939) + ### CVE-2021-22945 (2021-09-23) @@ -13351,7 +13458,6 @@ On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before - [yaunsky/CVE-202122986-EXP](https://github.com/yaunsky/CVE-202122986-EXP) - [Tas9er/CVE-2021-22986](https://github.com/Tas9er/CVE-2021-22986) - [dotslashed/CVE-2021-22986](https://github.com/dotslashed/CVE-2021-22986) -- [DDestinys/CVE-2021-22986](https://github.com/DDestinys/CVE-2021-22986) - [west9b/F5-BIG-IP-POC](https://github.com/west9b/F5-BIG-IP-POC) ### CVE-2021-23017 (2021-06-01) @@ -13410,6 +13516,14 @@ A man-in-the-middle attacker can inject false responses to the client's first fe - [Live-Hack-CVE/CVE-2021-23222](https://github.com/Live-Hack-CVE/CVE-2021-23222) +### CVE-2021-23239 (2021-01-12) + + +The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. + + +- [Live-Hack-CVE/CVE-2021-23239](https://github.com/Live-Hack-CVE/CVE-2021-23239) + ### CVE-2021-23383 (2021-05-04) @@ -13418,6 +13532,14 @@ The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when s - [dn9uy3n/Check-CVE-2021-23383](https://github.com/dn9uy3n/Check-CVE-2021-23383) +### CVE-2021-23394 (2021-06-13) + + +The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP. + + +- [Live-Hack-CVE/CVE-2021-23394](https://github.com/Live-Hack-CVE/CVE-2021-23394) + ### CVE-2021-23414 (2021-07-28) @@ -13498,14 +13620,6 @@ A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsAp - [CENSUS/whatsapp-mitd-mitm](https://github.com/CENSUS/whatsapp-mitd-mitm) -### CVE-2021-24084 (2021-02-25) - - -Windows Mobile Device Management Information Disclosure Vulnerability - - -- [exploitblizzard/WindowsMDM-LPE-0Day](https://github.com/exploitblizzard/WindowsMDM-LPE-0Day) - ### CVE-2021-24085 (2021-02-25) @@ -13538,6 +13652,14 @@ Windows Console Driver Denial of Service Vulnerability - [waleedassar/CVE-2021-24098](https://github.com/waleedassar/CVE-2021-24098) +### CVE-2021-24144 (2021-03-18) + + +Unvalidated input in the Contact Form 7 Database Addon plugin, versions before 1.2.5.6, was prone to a vulnerability that lets remote attackers inject arbitrary formulas into CSV files. + + +- [Live-Hack-CVE/CVE-2021-24144](https://github.com/Live-Hack-CVE/CVE-2021-24144) + ### CVE-2021-24160 (2021-04-05) @@ -13547,6 +13669,22 @@ In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers - [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160) - [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160) +### CVE-2021-24347 (2021-06-14) + + +The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP". + + +- [Live-Hack-CVE/CVE-2021-24347](https://github.com/Live-Hack-CVE/CVE-2021-24347) + +### CVE-2021-24349 (2021-06-14) + + +This Gallery from files WordPress plugin through 1.6.0 gives the functionality of uploading images to the server. But filenames are not properly sanitized before being output in an error message when they have an invalid extension, leading to a reflected Cross-Site Scripting issue. Due to the lack of CSRF check, the attack could also be performed via such vector. + + +- [Live-Hack-CVE/CVE-2021-24349](https://github.com/Live-Hack-CVE/CVE-2021-24349) + ### CVE-2021-24355 (2021-06-14) @@ -13571,6 +13709,14 @@ The Language Bar Flags WordPress plugin through 1.0.8 does not have any CSRF in - [Live-Hack-CVE/CVE-2021-24431](https://github.com/Live-Hack-CVE/CVE-2021-24431) +### CVE-2021-24444 (2021-08-02) + + +The TaxoPress – Create and Manage Taxonomies, Tags, Categories WordPress plugin before 3.0.7.2 does not sanitise its Taxonomy description field, allowing high privilege users to set JavaScript payload in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue. + + +- [Live-Hack-CVE/CVE-2021-24444](https://github.com/Live-Hack-CVE/CVE-2021-24444) + ### CVE-2021-24485 (2021-10-25) @@ -13579,6 +13725,14 @@ The Special Text Boxes WordPress plugin before 5.9.110 does not sanitise or esca - [Live-Hack-CVE/CVE-2021-24485](https://github.com/Live-Hack-CVE/CVE-2021-24485) +### CVE-2021-24504 (2021-08-02) + + +The WP LMS – Best WordPress LMS Plugin WordPress plugin through 1.1.2 does not properly sanitise or validate its User Field Titles, allowing XSS payload to be used in them. Furthermore, no CSRF and capability checks were in place, allowing such attack to be performed either via CSRF or as any user (including unauthenticated) + + +- [Live-Hack-CVE/CVE-2021-24504](https://github.com/Live-Hack-CVE/CVE-2021-24504) + ### CVE-2021-24507 (2021-08-09) @@ -13587,6 +13741,30 @@ The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or e - [RandomRobbieBF/CVE-2021-24507](https://github.com/RandomRobbieBF/CVE-2021-24507) +### CVE-2021-24543 (2021-10-25) + + +The jQuery Reply to Comment WordPress plugin through 1.31 does not have any CSRF check when saving its settings, nor sanitise or escape its 'Quote String' and 'Reply String' settings before outputting them in Comments, leading to a Stored Cross-Site Scripting issue. + + +- [Live-Hack-CVE/CVE-2021-24543](https://github.com/Live-Hack-CVE/CVE-2021-24543) + +### CVE-2021-24555 (2021-08-23) + + +The daac_delete_booking_callback function, hooked to the daac_delete_booking AJAX action, takes the id POST parameter which is passed into the SQL statement without proper sanitisation, validation or escaping, leading to a SQL Injection issue. Furthermore, the ajax action is lacking any CSRF and capability check, making it available to any authenticated user. + + +- [Live-Hack-CVE/CVE-2021-24555](https://github.com/Live-Hack-CVE/CVE-2021-24555) + +### CVE-2021-24570 (2021-11-01) + + +The Accept Donations with PayPal WordPress plugin before 1.3.1 offers a function to create donation buttons, which internally are posts. The process to create a new button is lacking a CSRF check. An attacker could use this to make an authenticated admin create a new button. Furthermore, one of the Button field is not escaped before being output in an attribute when editing a Button, leading to a Stored Cross-Site Scripting issue as well. + + +- [Live-Hack-CVE/CVE-2021-24570](https://github.com/Live-Hack-CVE/CVE-2021-24570) + ### CVE-2021-24581 (2021-08-30) @@ -13611,6 +13789,22 @@ The Per page add to head WordPress plugin before 1.4.4 is lacking any CSRF check - [Live-Hack-CVE/CVE-2021-24586](https://github.com/Live-Hack-CVE/CVE-2021-24586) +### CVE-2021-24595 (2021-10-18) + + +The Wp Cookie Choice WordPress plugin through 1.1.0 is lacking any CSRF check when saving its options, and do not escape them when outputting them in attributes. As a result, an attacker could make a logged in admin change them to arbitrary values including XSS payloads via a CSRF attack. + + +- [Live-Hack-CVE/CVE-2021-24595](https://github.com/Live-Hack-CVE/CVE-2021-24595) + +### CVE-2021-24615 (2021-10-18) + + +The Wechat Reward WordPress plugin through 1.7 does not sanitise or escape its QR settings, nor has any CSRF check in place, allowing attackers to make a logged in admin change the settings and perform Cross-Site Scripting attacks. + + +- [Live-Hack-CVE/CVE-2021-24615](https://github.com/Live-Hack-CVE/CVE-2021-24615) + ### CVE-2021-24618 (2021-09-20) @@ -13619,6 +13813,14 @@ The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape - [Live-Hack-CVE/CVE-2021-24618](https://github.com/Live-Hack-CVE/CVE-2021-24618) +### CVE-2021-24626 (2021-11-08) + + +The Chameleon CSS WordPress plugin through 1.2 does not have any CSRF and capability checks in all its AJAX calls, allowing any authenticated user, such as subscriber to call them and perform unauthorised actions. One of AJAX call, remove_css, also does not sanitise or escape the css_id POST parameter before using it in a SQL statement, leading to a SQL Injection + + +- [Live-Hack-CVE/CVE-2021-24626](https://github.com/Live-Hack-CVE/CVE-2021-24626) + ### CVE-2021-24639 (2021-09-20) @@ -13627,6 +13829,14 @@ The OMGF WordPress plugin before 4.5.4 does not enforce path validation, authori - [Live-Hack-CVE/CVE-2021-24639](https://github.com/Live-Hack-CVE/CVE-2021-24639) +### CVE-2021-24642 (2021-10-18) + + +The Scroll Baner WordPress plugin through 1.0 does not have CSRF check in place when saving its settings, nor perform any sanitisation, escaping or validation on them. This could allow attackers to make logged in admin change them and could lead to RCE (via a file upload) as well as XSS + + +- [Live-Hack-CVE/CVE-2021-24642](https://github.com/Live-Hack-CVE/CVE-2021-24642) + ### CVE-2021-24649 (2022-11-21) @@ -13635,6 +13845,38 @@ The WP User Frontend WordPress plugin before 3.5.29 uses a user supplied argumen - [Live-Hack-CVE/CVE-2021-24649](https://github.com/Live-Hack-CVE/CVE-2021-24649) +### CVE-2021-24651 (2021-10-11) + + +The Poll Maker WordPress plugin before 3.4.2 allows unauthenticated users to perform SQL injection via the ays_finish_poll AJAX action. While the result is not disclosed in the response, it is possible to use a timing attack to exfiltrate data such as password hash. + + +- [Live-Hack-CVE/CVE-2021-24651](https://github.com/Live-Hack-CVE/CVE-2021-24651) + +### CVE-2021-24683 (2021-10-11) + + +The Weather Effect WordPress plugin before 1.3.4 does not have any CSRF checks in place when saving its settings, and do not validate or escape them, which could lead to Stored Cross-Site Scripting issue. + + +- [Live-Hack-CVE/CVE-2021-24683](https://github.com/Live-Hack-CVE/CVE-2021-24683) + +### CVE-2021-24685 (2021-11-01) + + +The Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload) + + +- [Live-Hack-CVE/CVE-2021-24685](https://github.com/Live-Hack-CVE/CVE-2021-24685) + +### CVE-2021-24695 (2021-11-08) + + +The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernames + + +- [Live-Hack-CVE/CVE-2021-24695](https://github.com/Live-Hack-CVE/CVE-2021-24695) + ### CVE-2021-24728 (2021-09-13) @@ -13643,6 +13885,38 @@ The Membership & Content Restriction – Paid Member Subscriptions WordPress - [Live-Hack-CVE/CVE-2021-24728](https://github.com/Live-Hack-CVE/CVE-2021-24728) +### CVE-2021-24730 (2022-02-28) + + +The Logo Showcase with Slick Slider WordPress plugin before 1.2.5 does not have CSRF and authorisation checks in the lswss_save_attachment_data AJAX action, allowing any authenticated users, such as Subscriber, to change title, description, alt text, and URL of arbitrary uploaded media. + + +- [Live-Hack-CVE/CVE-2021-24730](https://github.com/Live-Hack-CVE/CVE-2021-24730) + +### CVE-2021-24739 (2021-12-21) + + +The Logo Carousel WordPress plugin before 3.4.2 allows users with a role as low as Contributor to duplicate and view arbitrary private posts made by other users via the Carousel Duplication feature + + +- [Live-Hack-CVE/CVE-2021-24739](https://github.com/Live-Hack-CVE/CVE-2021-24739) + +### CVE-2021-24822 (2021-11-29) + + +The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters + + +- [Live-Hack-CVE/CVE-2021-24822](https://github.com/Live-Hack-CVE/CVE-2021-24822) + +### CVE-2021-24930 (2021-12-06) + + +The WordPress Online Booking and Scheduling Plugin WordPress plugin before 20.3.1 does not escape the Staff Full Name field before outputting it back in a page, which could lead to a Stored Cross-Site Scripting issue + + +- [Live-Hack-CVE/CVE-2021-24930](https://github.com/Live-Hack-CVE/CVE-2021-24930) + ### CVE-2021-24957 (2022-04-25) @@ -13709,6 +13983,7 @@ The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used with - [darkpills/CVE-2021-25094-tatsu-preauth-rce](https://github.com/darkpills/CVE-2021-25094-tatsu-preauth-rce) - [TUANB4DUT/typehub-exploiter](https://github.com/TUANB4DUT/typehub-exploiter) - [xdx57/CVE-2021-25094](https://github.com/xdx57/CVE-2021-25094) +- [Live-Hack-CVE/CVE-2021-25094](https://github.com/Live-Hack-CVE/CVE-2021-25094) ### CVE-2021-25095 (2022-02-07) @@ -13726,6 +14001,14 @@ The LabTools WordPress plugin through 1.0 does not have proper authorisation and - [Live-Hack-CVE/CVE-2021-25097](https://github.com/Live-Hack-CVE/CVE-2021-25097) +### CVE-2021-25121 (2022-06-20) + + +The Rating by BestWebSoft WordPress plugin before 1.6 does not validate the submitted rating, allowing submission of long integer, causing a Denial of Service on the post/page when a user submit such rating + + +- [Live-Hack-CVE/CVE-2021-25121](https://github.com/Live-Hack-CVE/CVE-2021-25121) + ### CVE-2021-25219 (2021-10-27) @@ -14373,6 +14656,14 @@ org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect serv - [Live-Hack-CVE/CVE-2021-27582](https://github.com/Live-Hack-CVE/CVE-2021-27582) +### CVE-2021-27645 (2021-02-24) + + +The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. + + +- [Live-Hack-CVE/CVE-2021-27645](https://github.com/Live-Hack-CVE/CVE-2021-27645) + ### CVE-2021-27651 (2021-04-29) @@ -14382,6 +14673,14 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali - [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC) - [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651) +### CVE-2021-27815 (2021-04-14) + + +NULL Pointer Deference in the exif command line tool, when printing out XML formatted EXIF data, in exif v0.6.22 and earlier allows attackers to cause a Denial of Service (DoS) by uploading a malicious JPEG file, causing the application to crash. + + +- [Live-Hack-CVE/CVE-2021-27815](https://github.com/Live-Hack-CVE/CVE-2021-27815) + ### CVE-2021-27850 (2021-04-15) @@ -14392,6 +14691,14 @@ A critical unauthenticated remote code execution vulnerability was found all rec - [dorkerdevil/CVE-2021-27850_POC](https://github.com/dorkerdevil/CVE-2021-27850_POC) - [novysodope/CVE-2021-27850](https://github.com/novysodope/CVE-2021-27850) +### CVE-2021-27853 (2022-09-27) + + +Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers. + + +- [Live-Hack-CVE/CVE-2021-27853](https://github.com/Live-Hack-CVE/CVE-2021-27853) + ### CVE-2021-27890 (2021-03-15) @@ -14452,6 +14759,38 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha - [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965) - [Exploitables/CVE-2021-27965](https://github.com/Exploitables/CVE-2021-27965) +### CVE-2021-28275 (2022-03-23) + + +A Denial of Service vulnerability exists in jhead 3.04 and 3.05 due to a wild address read in the Get16u function in exif.c in will cause segmentation fault via a crafted_file. + + +- [Live-Hack-CVE/CVE-2021-28275](https://github.com/Live-Hack-CVE/CVE-2021-28275) + +### CVE-2021-28276 (2022-03-23) + + +A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a wild address read in the ProcessCanonMakerNoteDir function in makernote.c. + + +- [Live-Hack-CVE/CVE-2021-28276](https://github.com/Live-Hack-CVE/CVE-2021-28276) + +### CVE-2021-28277 (2022-03-23) + + +A Heap-based Buffer Overflow vulnerabilty exists in jhead 3.04 and 3.05 is affected by: Buffer Overflow via the RemoveUnknownSections function in jpgfile.c. + + +- [Live-Hack-CVE/CVE-2021-28277](https://github.com/Live-Hack-CVE/CVE-2021-28277) + +### CVE-2021-28278 (2022-03-23) + + +A Heap-based Buffer Overflow vulnerability exists in jhead 3.04 and 3.05 via the RemoveSectionType function in jpgfile.c. + + +- [Live-Hack-CVE/CVE-2021-28278](https://github.com/Live-Hack-CVE/CVE-2021-28278) + ### CVE-2021-28310 (2021-04-13) @@ -14476,7 +14815,6 @@ Hyper-V Remote Code Execution Vulnerability - [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476) - [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476) -- [2273852279qqs/0vercl0k](https://github.com/2273852279qqs/0vercl0k) - [dengyang123x/0vercl0k](https://github.com/dengyang123x/0vercl0k) ### CVE-2021-28480 (2021-04-13) @@ -14486,7 +14824,6 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni - [ZephrFish/CVE-2021-28480_HoneyPoC3](https://github.com/ZephrFish/CVE-2021-28480_HoneyPoC3) -- [Threonic/CVE-2021-28480](https://github.com/Threonic/CVE-2021-28480) ### CVE-2021-28482 (2021-04-13) @@ -14637,14 +14974,7 @@ Grav is a file based Web-platform. Twig processing of static pages can be enable - [CsEnox/CVE-2021-29440](https://github.com/CsEnox/CVE-2021-29440) - -### CVE-2021-29441 (2021-04-27) - - -Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server. - - -- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441) +- [Live-Hack-CVE/CVE-2021-29440](https://github.com/Live-Hack-CVE/CVE-2021-29440) ### CVE-2021-29447 (2021-04-15) @@ -14695,6 +15025,14 @@ In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 befo - [raymontag/cve-2021-29627](https://github.com/raymontag/cve-2021-29627) +### CVE-2021-29922 (2021-08-07) + + +library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. + + +- [Live-Hack-CVE/CVE-2021-29922](https://github.com/Live-Hack-CVE/CVE-2021-29922) + ### CVE-2021-29967 (2021-06-24) @@ -14866,6 +15204,14 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r - [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481) +### CVE-2021-30498 (2021-05-26) + + +A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences. + + +- [Live-Hack-CVE/CVE-2021-30498](https://github.com/Live-Hack-CVE/CVE-2021-30498) + ### CVE-2021-30547 (2021-06-15) @@ -14874,14 +15220,6 @@ Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a r - [Live-Hack-CVE/CVE-2021-30547](https://github.com/Live-Hack-CVE/CVE-2021-30547) -### CVE-2021-30682 (2021-09-08) - - -A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information. - - -- [threatnix/csp-playground](https://github.com/threatnix/csp-playground) - ### CVE-2021-30731 (2021-09-08) @@ -14912,11 +15250,6 @@ A memory corruption vulnerability was addressed with improved locking. This issu A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.1, watchOS 8.3, iOS 15.2 and iPadOS 15.2, tvOS 15.2. A malicious application may be able to execute arbitrary code with kernel privileges. -- [timb-machine-mirrors/CVE-2021-30955](https://github.com/timb-machine-mirrors/CVE-2021-30955) -- [nickorlow/CVE-2021-30955-POC](https://github.com/nickorlow/CVE-2021-30955-POC) -- [verygenericname/CVE-2021-30955-POC-IPA](https://github.com/verygenericname/CVE-2021-30955-POC-IPA) -- [b1n4r1b01/desc_race](https://github.com/b1n4r1b01/desc_race) -- [markie-dev/desc_race_A15](https://github.com/markie-dev/desc_race_A15) - [Dylbin/desc_race](https://github.com/Dylbin/desc_race) - [GeoSn0w/Pentagram-exploit-tester](https://github.com/GeoSn0w/Pentagram-exploit-tester) @@ -14949,7 +15282,6 @@ HTTP Protocol Stack Remote Code Execution Vulnerability - [zecopro/CVE-2021-31166](https://github.com/zecopro/CVE-2021-31166) - [bgsilvait/WIn-CVE-2021-31166](https://github.com/bgsilvait/WIn-CVE-2021-31166) - [Udyz/CVE-2021-31166](https://github.com/Udyz/CVE-2021-31166) -- [mauricelambert/CVE-2021-31166](https://github.com/mauricelambert/CVE-2021-31166) - [0xmaximus/Home-Demolisher](https://github.com/0xmaximus/Home-Demolisher) ### CVE-2021-31184 (2021-05-11) @@ -14960,6 +15292,14 @@ Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulner - [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184) +### CVE-2021-31525 (2021-05-27) + + +net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations. + + +- [Live-Hack-CVE/CVE-2021-31525](https://github.com/Live-Hack-CVE/CVE-2021-31525) + ### CVE-2021-31566 (2022-08-23) @@ -15153,6 +15493,14 @@ A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean - [Live-Hack-CVE/CVE-2021-32000](https://github.com/Live-Hack-CVE/CVE-2021-32000) +### CVE-2021-32001 (2021-07-28) + + +K3s in SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup, to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc.) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions. + + +- [Live-Hack-CVE/CVE-2021-32001](https://github.com/Live-Hack-CVE/CVE-2021-32001) + ### CVE-2021-32027 (2021-06-01) @@ -15169,14 +15517,6 @@ A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE co - [Live-Hack-CVE/CVE-2021-32028](https://github.com/Live-Hack-CVE/CVE-2021-32028) -### CVE-2021-32099 (2021-05-06) - - -A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass. - - -- [akr3ch/CVE-2021-32099](https://github.com/akr3ch/CVE-2021-32099) - ### CVE-2021-32156 (2022-04-11) @@ -15234,14 +15574,6 @@ A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 through - [Mesh3l911/CVE-2021-32162](https://github.com/Mesh3l911/CVE-2021-32162) -### CVE-2021-32399 (2021-05-10) - - -net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller. - - -- [nanopathi/linux-4.19.72_CVE-2021-32399](https://github.com/nanopathi/linux-4.19.72_CVE-2021-32399) - ### CVE-2021-32415 (2022-12-13) @@ -15274,6 +15606,14 @@ A denial-of-service risk was identified in the draft files area, due to it not r - [Live-Hack-CVE/CVE-2021-32476](https://github.com/Live-Hack-CVE/CVE-2021-32476) +### CVE-2021-32478 (2022-03-11) + + +The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected. + + +- [Live-Hack-CVE/CVE-2021-32478](https://github.com/Live-Hack-CVE/CVE-2021-32478) + ### CVE-2021-32537 (2021-07-07) @@ -15282,6 +15622,38 @@ Realtek HAD contains a driver crashed vulnerability which allows local side atta - [0vercl0k/CVE-2021-32537](https://github.com/0vercl0k/CVE-2021-32537) +### CVE-2021-32607 (2021-05-12) + + +An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/PrivateMessages/View.cshtml does not call HtmlUtils.SanitizeHtml on a private message. + + +- [Live-Hack-CVE/CVE-2021-32607](https://github.com/Live-Hack-CVE/CVE-2021-32607) + +### CVE-2021-32608 (2021-05-12) + + +An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/Boards/Partials/_ForumPost.cshtml does not call HtmlUtils.SanitizeHtml on certain text for a forum post. + + +- [Live-Hack-CVE/CVE-2021-32608](https://github.com/Live-Hack-CVE/CVE-2021-32608) + +### CVE-2021-32682 (2021-06-14) + + +elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication. + + +- [Live-Hack-CVE/CVE-2021-32682](https://github.com/Live-Hack-CVE/CVE-2021-32682) + +### CVE-2021-32686 (2021-07-23) + + +PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and destroy, due to the accepted socket having no group lock. Second, the SSL socket parent/listener may get destroyed during handshake. Both issues were reported to happen intermittently in heavy load TLS connections. They cause a crash, resulting in a denial of service. These are fixed in version 2.11.1. + + +- [Live-Hack-CVE/CVE-2021-32686](https://github.com/Live-Hack-CVE/CVE-2021-32686) + ### CVE-2021-32765 (2021-10-04) @@ -15330,13 +15702,13 @@ In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-fre - [Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2021-33034](https://github.com/Trinadh465/device_renesas_kernel_AOSP10_r33_CVE-2021-33034) -### CVE-2021-33044 (2021-09-15) +### CVE-2021-33064 (2022-11-11) -The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. +Uncontrolled search path in the software installer for Intel(R) System Studio for all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. -- [Alonzozzz/alonzzzo](https://github.com/Alonzozzz/alonzzzo) +- [Live-Hack-CVE/CVE-2021-33064](https://github.com/Live-Hack-CVE/CVE-2021-33064) ### CVE-2021-33159 (2022-11-11) @@ -15354,6 +15726,14 @@ Improper access control in BIOS firmware for some Intel(R) NUCs before version I - [Live-Hack-CVE/CVE-2021-33164](https://github.com/Live-Hack-CVE/CVE-2021-33164) +### CVE-2021-33196 (2021-08-02) + + +In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic. + + +- [Live-Hack-CVE/CVE-2021-33196](https://github.com/Live-Hack-CVE/CVE-2021-33196) + ### CVE-2021-33420 (2022-12-15) @@ -15445,6 +15825,14 @@ An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby a - [mlr0p/CVE-2021-33564](https://github.com/mlr0p/CVE-2021-33564) - [dorkerdevil/CVE-2021-33564](https://github.com/dorkerdevil/CVE-2021-33564) +### CVE-2021-33574 (2021-05-25) + + +The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. + + +- [Live-Hack-CVE/CVE-2021-33574](https://github.com/Live-Hack-CVE/CVE-2021-33574) + ### CVE-2021-33618 (2021-11-10) @@ -15578,6 +15966,62 @@ Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an - [Live-Hack-CVE/CVE-2021-34552](https://github.com/Live-Hack-CVE/CVE-2021-34552) +### CVE-2021-34566 (2022-11-09) + + +In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS. + + +- [Live-Hack-CVE/CVE-2021-34566](https://github.com/Live-Hack-CVE/CVE-2021-34566) + +### CVE-2021-34567 (2022-11-09) + + +In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read. + + +- [Live-Hack-CVE/CVE-2021-34567](https://github.com/Live-Hack-CVE/CVE-2021-34567) + +### CVE-2021-34568 (2022-11-09) + + +In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service. + + +- [Live-Hack-CVE/CVE-2021-34568](https://github.com/Live-Hack-CVE/CVE-2021-34568) + +### CVE-2021-34569 (2022-11-09) + + +In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory. + + +- [Live-Hack-CVE/CVE-2021-34569](https://github.com/Live-Hack-CVE/CVE-2021-34569) + +### CVE-2021-34577 (2022-11-09) + + +In the Kaden PICOFLUX AiR water meter an adversary can read the values through wireless M-Bus mode 5 with a hardcoded shared key while being adjacent to the device. + + +- [Live-Hack-CVE/CVE-2021-34577](https://github.com/Live-Hack-CVE/CVE-2021-34577) + +### CVE-2021-34579 (2022-11-09) + + +In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections. + + +- [Live-Hack-CVE/CVE-2021-34579](https://github.com/Live-Hack-CVE/CVE-2021-34579) + +### CVE-2021-34620 (2021-07-07) + + +The WP Fluent Forms plugin < 3.6.67 for WordPress is vulnerable to Cross-Site Request Forgery leading to stored Cross-Site Scripting and limited Privilege Escalation due to a missing nonce check in the access control function for administrative AJAX actions + + +- [Live-Hack-CVE/CVE-2021-34620](https://github.com/Live-Hack-CVE/CVE-2021-34620) + ### CVE-2021-34767 (2021-09-22) @@ -15683,13 +16127,13 @@ Vulnerability in the Oracle Database Enterprise Edition Unified Audit component - [emad-almousa/CVE-2021-35576](https://github.com/emad-almousa/CVE-2021-35576) -### CVE-2021-35587 (2022-01-19) +### CVE-2021-35937 (2022-08-25) -Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). +A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. -- [antx-code/CVE-2021-35587](https://github.com/antx-code/CVE-2021-35587) +- [Live-Hack-CVE/CVE-2021-35937](https://github.com/Live-Hack-CVE/CVE-2021-35937) ### CVE-2021-35938 (2022-08-25) @@ -15715,6 +16159,14 @@ An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Ap - [Live-Hack-CVE/CVE-2021-35940](https://github.com/Live-Hack-CVE/CVE-2021-35940) +### CVE-2021-35942 (2021-07-22) + + +The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. + + +- [Live-Hack-CVE/CVE-2021-35942](https://github.com/Live-Hack-CVE/CVE-2021-35942) + ### CVE-2021-35975 - [trump88/CVE-2021-35975](https://github.com/trump88/CVE-2021-35975) @@ -15736,6 +16188,22 @@ A command injection vulnerability in the web server of some Hikvision product. D - [tuntin9x/CheckHKRCE](https://github.com/tuntin9x/CheckHKRCE) - [Cuerz/CVE-2021-36260](https://github.com/Cuerz/CVE-2021-36260) +### CVE-2021-36317 (2021-12-21) + + +Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account. + + +- [Live-Hack-CVE/CVE-2021-36317](https://github.com/Live-Hack-CVE/CVE-2021-36317) + +### CVE-2021-36318 (2021-12-21) + + +Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage. + + +- [Live-Hack-CVE/CVE-2021-36318](https://github.com/Live-Hack-CVE/CVE-2021-36318) + ### CVE-2021-36338 (2022-01-21) @@ -15744,6 +16212,14 @@ Unisphere for PowerMax versions prior to 9.2.2.2 contains a privilege escalation - [Live-Hack-CVE/CVE-2021-36338](https://github.com/Live-Hack-CVE/CVE-2021-36338) +### CVE-2021-36369 (2022-10-12) + + +An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed. + + +- [Live-Hack-CVE/CVE-2021-36369](https://github.com/Live-Hack-CVE/CVE-2021-36369) + ### CVE-2021-36408 (2022-01-10) @@ -15841,6 +16317,22 @@ A Incorrect Authorization vulnerability in SUSE Rancher allows administrators of - [Live-Hack-CVE/CVE-2021-36778](https://github.com/Live-Hack-CVE/CVE-2021-36778) +### CVE-2021-36779 (2021-12-17) + + +A Missing Authentication for Critical Function vulnerability in SUSE Longhorn allows any workload in the cluster to execute any binary present in the image on the host without authentication. This issue affects: SUSE Longhorn longhorn versions prior to 1.1.3; longhorn versions prior to 1.2.3. + + +- [Live-Hack-CVE/CVE-2021-36779](https://github.com/Live-Hack-CVE/CVE-2021-36779) + +### CVE-2021-36780 (2021-12-17) + + +A Missing Authentication for Critical Function vulnerability in longhorn of SUSE Longhorn allows attackers to connect to a longhorn-engine replica instance granting it the ability to read and write data to and from a replica that they should not have access to. This issue affects: SUSE Longhorn longhorn versions prior to 1.1.3; longhorn versions prior to 1.2.3v. + + +- [Live-Hack-CVE/CVE-2021-36780](https://github.com/Live-Hack-CVE/CVE-2021-36780) + ### CVE-2021-36782 (2022-09-07) @@ -15849,6 +16341,14 @@ A Cleartext Storage of Sensitive Information vulnerability in SUSE Rancher allow - [fe-ax/tf-cve-2021-36782](https://github.com/fe-ax/tf-cve-2021-36782) +### CVE-2021-36783 (2022-09-07) + + +A Insufficiently Protected Credentials vulnerability in SUSE Rancher allows authenticated Cluster Owners, Cluster Members, Project Owners and Project Members to read credentials, passwords and API tokens that have been stored in cleartext and exposed via API endpoints. This issue affects: SUSE Rancher Rancher versions prior to 2.6.4; Rancher versions prior to 2.5.13. + + +- [Live-Hack-CVE/CVE-2021-36783](https://github.com/Live-Hack-CVE/CVE-2021-36783) + ### CVE-2021-36798 (2021-08-09) @@ -15865,6 +16365,22 @@ A Denial-of-Service (DoS) vulnerability was discovered in Team Server in HelpSys - [robertguetzkow/ets5-password-recovery](https://github.com/robertguetzkow/ets5-password-recovery) +### CVE-2021-36885 (2021-12-22) + + +Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.6.1). + + +- [Live-Hack-CVE/CVE-2021-36885](https://github.com/Live-Hack-CVE/CVE-2021-36885) + +### CVE-2021-36886 (2021-12-22) + + +Cross-Site Request Forgery (CSRF) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.5.9). + + +- [Live-Hack-CVE/CVE-2021-36886](https://github.com/Live-Hack-CVE/CVE-2021-36886) + ### CVE-2021-36905 (2022-11-17) @@ -15873,6 +16389,14 @@ Multiple Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities - [Live-Hack-CVE/CVE-2021-36905](https://github.com/Live-Hack-CVE/CVE-2021-36905) +### CVE-2021-36906 (2022-11-03) + + +Multiple Insecure Direct Object References (IDOR) vulnerabilities in ExpressTech Quiz And Survey Master plugin <= 7.3.6 on WordPress. + + +- [Live-Hack-CVE/CVE-2021-36906](https://github.com/Live-Hack-CVE/CVE-2021-36906) + ### CVE-2021-36934 (2021-07-22) @@ -16119,6 +16643,22 @@ A SQL injection vulnerability exits on the Simple Image Gallery System 1.0 appli - [m4sk0ff/CVE-2021-38819](https://github.com/m4sk0ff/CVE-2021-38819) - [Live-Hack-CVE/CVE-2021-38819](https://github.com/Live-Hack-CVE/CVE-2021-38819) +### CVE-2021-38827 (2022-11-13) + + +Xiongmai Camera XM-JPR2-LX V4.02.R12.A6420987.10002.147502.00000 is vulnerable to account takeover. + + +- [Live-Hack-CVE/CVE-2021-38827](https://github.com/Live-Hack-CVE/CVE-2021-38827) + +### CVE-2021-38828 (2022-11-13) + + +Xiongmai Camera XM-JPR2-LX V4.02.R12.A6420987.10002.147502.00000 is vulnerable to plain-text traffic sniffing. + + +- [Live-Hack-CVE/CVE-2021-38828](https://github.com/Live-Hack-CVE/CVE-2021-38828) + ### CVE-2021-38997 (2022-12-12) @@ -16135,6 +16675,14 @@ IBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 stores user c - [Live-Hack-CVE/CVE-2021-39077](https://github.com/Live-Hack-CVE/CVE-2021-39077) +### CVE-2021-39144 (2021-08-23) + + +XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. + + +- [Live-Hack-CVE/CVE-2021-39144](https://github.com/Live-Hack-CVE/CVE-2021-39144) + ### CVE-2021-39165 (2021-08-26) @@ -16216,6 +16764,14 @@ Cross Site Scripting (XSS) vulnerability in Users.php in eyoucms 1.5.4 allows re - [Live-Hack-CVE/CVE-2021-39428](https://github.com/Live-Hack-CVE/CVE-2021-39428) +### CVE-2021-39432 (2022-11-04) + + +diplib v3.0.0 is vulnerable to Double Free. + + +- [Live-Hack-CVE/CVE-2021-39432](https://github.com/Live-Hack-CVE/CVE-2021-39432) + ### CVE-2021-39434 (2022-12-05) @@ -16224,6 +16780,14 @@ A default username and password for an administrator account was discovered in Z - [Live-Hack-CVE/CVE-2021-39434](https://github.com/Live-Hack-CVE/CVE-2021-39434) +### CVE-2021-39473 (2022-11-04) + + +Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields. + + +- [Live-Hack-CVE/CVE-2021-39473](https://github.com/Live-Hack-CVE/CVE-2021-39473) + ### CVE-2021-39537 (2021-09-20) @@ -16248,6 +16812,14 @@ In TBD of TBD, there is a possible way to archive arbitrary code execution in ke - [Live-Hack-CVE/CVE-2021-39660](https://github.com/Live-Hack-CVE/CVE-2021-39660) +### CVE-2021-39661 (2022-11-08) + + +In _PMRLogicalOffsetToPhysicalOffset of the PowerVR kernel driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-246824784 + + +- [Live-Hack-CVE/CVE-2021-39661](https://github.com/Live-Hack-CVE/CVE-2021-39661) + ### CVE-2021-39674 (2022-02-11) @@ -16312,6 +16884,54 @@ Vulnerability of pointers being incorrectly used during data transmission in the - [Live-Hack-CVE/CVE-2021-40012](https://github.com/Live-Hack-CVE/CVE-2021-40012) +### CVE-2021-40017 (2022-09-16) + + +The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. + + +- [Live-Hack-CVE/CVE-2021-40017](https://github.com/Live-Hack-CVE/CVE-2021-40017) + +### CVE-2021-40158 (2022-01-25) + + +A maliciously crafted JT file in Autodesk Inventor 2022, 2021, 2020, 2019 and AutoCAD 2022 may be forced to read beyond allocated boundaries when parsing the JT file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. + + +- [Live-Hack-CVE/CVE-2021-40158](https://github.com/Live-Hack-CVE/CVE-2021-40158) + +### CVE-2021-40159 (2022-01-25) + + +An Information Disclosure vulnerability for JT files in Autodesk Inventor 2022, 2021, 2020, 2019 in conjunction with other vulnerabilities may lead to code execution through maliciously crafted JT files in the context of the current process. + + +- [Live-Hack-CVE/CVE-2021-40159](https://github.com/Live-Hack-CVE/CVE-2021-40159) + +### CVE-2021-40226 (2022-11-10) + + +xpdfreader 4.03 is vulnerable to Buffer Overflow. + + +- [Live-Hack-CVE/CVE-2021-40226](https://github.com/Live-Hack-CVE/CVE-2021-40226) + +### CVE-2021-40272 (2022-11-14) + + +OP5 Monitor 8.3.1, 8.3.2, and OP5 8.3.3 are vulnerable to Cross Site Scripting (XSS). + + +- [Live-Hack-CVE/CVE-2021-40272](https://github.com/Live-Hack-CVE/CVE-2021-40272) + +### CVE-2021-40289 (2022-11-10) + + +mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS). + + +- [Live-Hack-CVE/CVE-2021-40289](https://github.com/Live-Hack-CVE/CVE-2021-40289) + ### CVE-2021-40303 (2022-11-08) @@ -16319,6 +16939,15 @@ perfex crm 1.10 is vulnerable to Cross Site Scripting (XSS) via /clients/profile - [zecopro/CVE-2021-40303](https://github.com/zecopro/CVE-2021-40303) +- [Live-Hack-CVE/CVE-2021-40303](https://github.com/Live-Hack-CVE/CVE-2021-40303) + +### CVE-2021-40330 (2021-08-30) + + +git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring. + + +- [Live-Hack-CVE/CVE-2021-40330](https://github.com/Live-Hack-CVE/CVE-2021-40330) ### CVE-2021-40345 (2021-10-26) @@ -16327,6 +16956,7 @@ An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of th - [ArianeBlow/NagiosXI-RCE-all-version-CVE-2021-40345](https://github.com/ArianeBlow/NagiosXI-RCE-all-version-CVE-2021-40345) +- [Live-Hack-CVE/CVE-2021-40345](https://github.com/Live-Hack-CVE/CVE-2021-40345) ### CVE-2021-40346 (2021-09-08) @@ -16336,6 +16966,14 @@ An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can - [Vulnmachines/HAProxy_CVE-2021-40346](https://github.com/Vulnmachines/HAProxy_CVE-2021-40346) +### CVE-2021-40348 (2021-11-01) + + +Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1. + + +- [Live-Hack-CVE/CVE-2021-40348](https://github.com/Live-Hack-CVE/CVE-2021-40348) + ### CVE-2021-40365 (2022-12-13) @@ -16344,13 +16982,13 @@ A vulnerability has been identified in SIMATIC Drive Controller family (All vers - [Live-Hack-CVE/CVE-2021-40365](https://github.com/Live-Hack-CVE/CVE-2021-40365) -### CVE-2021-40373 (2021-09-10) +### CVE-2021-40369 (2021-11-24) -playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI. +A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later. -- [maikroservice/CVE-2021-40373](https://github.com/maikroservice/CVE-2021-40373) +- [Live-Hack-CVE/CVE-2021-40369](https://github.com/Live-Hack-CVE/CVE-2021-40369) ### CVE-2021-40438 (2021-09-16) @@ -16371,15 +17009,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability - [RedLeavesChilde/CVE-2021-40444](https://github.com/RedLeavesChilde/CVE-2021-40444) - [nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-](https://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-) -### CVE-2021-40449 (2021-10-12) - - -Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40450, CVE-2021-41357. - - -- [BL0odz/CVE-2021-40449-NtGdiResetDC-UAF](https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF) -- [SamuelTulach/voidmap](https://github.com/SamuelTulach/voidmap) - ### CVE-2021-40462 (2021-10-12) @@ -16444,6 +17073,14 @@ In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the applicatio - [l00neyhacker/CVE-2021-40650](https://github.com/l00neyhacker/CVE-2021-40650) +### CVE-2021-40776 (2022-06-15) + + +Adobe Lightroom Classic 10.3 (and earlier) are affected by a privilege escalation vulnerability in the Offline Lightroom Classic installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability. + + +- [Live-Hack-CVE/CVE-2021-40776](https://github.com/Live-Hack-CVE/CVE-2021-40776) + ### CVE-2021-40822 (2022-05-01) @@ -16460,14 +17097,6 @@ An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr - [JoyGhoshs/CVE-2021-40870](https://github.com/JoyGhoshs/CVE-2021-40870) -### CVE-2021-40875 (2021-09-22) - - -Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data. - - -- [Lul/TestRail-files.md5-IAC-scanner](https://github.com/Lul/TestRail-files.md5-IAC-scanner) - ### CVE-2021-40903 (2022-06-17) @@ -16509,14 +17138,6 @@ CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the inp - [nisdn/CVE-2021-40978](https://github.com/nisdn/CVE-2021-40978) -### CVE-2021-41073 (2021-09-19) - - -loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation. - - -- [chompie1337/Linux_LPE_io_uring_CVE-2021-41073](https://github.com/chompie1337/Linux_LPE_io_uring_CVE-2021-41073) - ### CVE-2021-41078 (2021-10-26) @@ -16533,6 +17154,22 @@ keypair is a a RSA PEM key generator written in javascript. keypair implements a - [badkeys/keypairvuln](https://github.com/badkeys/keypairvuln) +### CVE-2021-41141 (2022-01-04) + + +PJSIP is a free and open source multimedia communication library written in the C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In various parts of PJSIP, when error/failure occurs, it is found that the function returns without releasing the currently held locks. This could result in a system deadlock, which cause a denial of service for the users. No release has yet been made which contains the linked fix commit. All versions up to an including 2.11.1 are affected. Users may need to manually apply the patch. + + +- [Live-Hack-CVE/CVE-2021-41141](https://github.com/Live-Hack-CVE/CVE-2021-41141) + +### CVE-2021-41159 (2021-10-21) + + +FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway. + + +- [Live-Hack-CVE/CVE-2021-41159](https://github.com/Live-Hack-CVE/CVE-2021-41159) + ### CVE-2021-41160 (2021-10-21) @@ -16549,6 +17186,22 @@ CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerab - [Live-Hack-CVE/CVE-2021-41164](https://github.com/Live-Hack-CVE/CVE-2021-41164) +### CVE-2021-41182 (2021-10-26) + + +jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector. A workaround is to not accept the value of the `altField` option from untrusted sources. + + +- [Live-Hack-CVE/CVE-2021-41182](https://github.com/Live-Hack-CVE/CVE-2021-41182) + +### CVE-2021-41183 (2021-10-26) + + +jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. + + +- [Live-Hack-CVE/CVE-2021-41183](https://github.com/Live-Hack-CVE/CVE-2021-41183) + ### CVE-2021-41184 (2021-10-26) @@ -16556,6 +17209,15 @@ jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0 - [gabrielolivra/Exploit-Medium-CVE-2021-41184](https://github.com/gabrielolivra/Exploit-Medium-CVE-2021-41184) +- [Live-Hack-CVE/CVE-2021-41184](https://github.com/Live-Hack-CVE/CVE-2021-41184) + +### CVE-2021-41229 (2021-11-12) + + +BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash. + + +- [Live-Hack-CVE/CVE-2021-41229](https://github.com/Live-Hack-CVE/CVE-2021-41229) ### CVE-2021-41277 (2021-11-17) @@ -16564,15 +17226,14 @@ Metabase is an open source data analytics platform. In affected versions a secur - [Vulnmachines/Metabase_CVE-2021-41277](https://github.com/Vulnmachines/Metabase_CVE-2021-41277) -- [Chen-ling-afk/CVE-2021-41277](https://github.com/Chen-ling-afk/CVE-2021-41277) -### CVE-2021-41338 (2021-10-12) +### CVE-2021-41313 (2021-10-31) -Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability +Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7. -- [Mario-Kart-Felix/firewall-cve](https://github.com/Mario-Kart-Felix/firewall-cve) +- [Live-Hack-CVE/CVE-2021-41313](https://github.com/Live-Hack-CVE/CVE-2021-41313) ### CVE-2021-41349 (2021-11-09) @@ -16582,6 +17243,14 @@ Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE- - [0xrobiul/CVE-2021-41349](https://github.com/0xrobiul/CVE-2021-41349) +### CVE-2021-41381 (2021-09-23) + + +Payara Micro Community 5.2021.6 and below allows Directory Traversal. + + +- [Live-Hack-CVE/CVE-2021-41381](https://github.com/Live-Hack-CVE/CVE-2021-41381) + ### CVE-2021-41556 (2022-07-28) @@ -16590,6 +17259,14 @@ sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an out-of-bound - [Live-Hack-CVE/CVE-2021-41556](https://github.com/Live-Hack-CVE/CVE-2021-41556) +### CVE-2021-41771 (2021-11-08) + + +ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation. + + +- [Live-Hack-CVE/CVE-2021-41771](https://github.com/Live-Hack-CVE/CVE-2021-41771) + ### CVE-2021-41773 (2021-10-05) @@ -16604,16 +17281,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2. - [noflowpls/CVE-2021-41773](https://github.com/noflowpls/CVE-2021-41773) - [LudovicPatho/CVE-2021-41773](https://github.com/LudovicPatho/CVE-2021-41773) - [walnutsecurity/cve-2021-41773](https://github.com/walnutsecurity/cve-2021-41773) -- [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773) -- [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773) -- [the29a/CVE-2021-41773](https://github.com/the29a/CVE-2021-41773) -- [thehackersbrain/CVE-2021-41773](https://github.com/thehackersbrain/CVE-2021-41773) -- [honypot/CVE-2021-41773](https://github.com/honypot/CVE-2021-41773) -- [Fa1c0n35/CVE-2021-41773](https://github.com/Fa1c0n35/CVE-2021-41773) -- [Evil-d0Zz/CVE-2021-41773-](https://github.com/Evil-d0Zz/CVE-2021-41773-) -- [puckiestyle/CVE-2021-41773](https://github.com/puckiestyle/CVE-2021-41773) - [n3utr1n00/CVE-2021-41773](https://github.com/n3utr1n00/CVE-2021-41773) -- [DoTuan1/Reserch-CVE-2021-41773](https://github.com/DoTuan1/Reserch-CVE-2021-41773) - [bernardas/netsec-polygon](https://github.com/bernardas/netsec-polygon) - [CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit](https://github.com/CalfCrusher/Path-traversal-RCE-Apache-2.4.49-2.4.50-Exploit) - [vuongnv3389-sec/cve-2021-41773](https://github.com/vuongnv3389-sec/cve-2021-41773) @@ -16682,9 +17350,6 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in - [Vulnmachines/cve-2021-42013](https://github.com/Vulnmachines/cve-2021-42013) - [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013) - [jas9reet/CVE-2021-42013-LAB](https://github.com/jas9reet/CVE-2021-42013-LAB) -- [tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway](https://github.com/tangxiaofeng7/CVE-2022-22947-Spring-Cloud-Gateway) -- [mauricelambert/CVE-2021-42013](https://github.com/mauricelambert/CVE-2021-42013) -- [honypot/CVE-2021-42013](https://github.com/honypot/CVE-2021-42013) - [Adashz/CVE-2021-42013](https://github.com/Adashz/CVE-2021-42013) - [viliuspovilaika/cve-2021-42013](https://github.com/viliuspovilaika/cve-2021-42013) - [theykillmeslowly/CVE-2021-42013](https://github.com/theykillmeslowly/CVE-2021-42013) @@ -16725,6 +17390,14 @@ Konga v0.14.9 is affected by an incorrect access control vulnerability where a s - [Live-Hack-CVE/CVE-2021-42192](https://github.com/Live-Hack-CVE/CVE-2021-42192) +### CVE-2021-42205 (2022-11-07) + + +ELAN Miniport touchpad Windows driver before 24.21.51.2, as used in PC hardware from multiple manufacturers, allows local users to cause a system crash by sending a certain IOCTL request, because that request is handled twice. + + +- [Live-Hack-CVE/CVE-2021-42205](https://github.com/Live-Hack-CVE/CVE-2021-42205) + ### CVE-2021-42230 (2022-04-15) @@ -16809,6 +17482,30 @@ In logback version 1.2.7 and prior versions, an attacker with the required privi - [maweil/bidi_char_detector](https://github.com/maweil/bidi_char_detector) +### CVE-2021-42612 (2022-05-24) + + +A use after free in cleanup_index in index.c in Halibut 1.2 allows an attacker to cause a segmentation fault or possibly have other unspecified impact via a crafted text document. + + +- [Live-Hack-CVE/CVE-2021-42612](https://github.com/Live-Hack-CVE/CVE-2021-42612) + +### CVE-2021-42613 (2022-05-24) + + +A double free in cleanup_index in index.c in Halibut 1.2 allows an attacker to cause a denial of service or possibly have other unspecified impact via a crafted text document. + + +- [Live-Hack-CVE/CVE-2021-42613](https://github.com/Live-Hack-CVE/CVE-2021-42613) + +### CVE-2021-42614 (2022-05-24) + + +A use after free in info_width_internal in bk_info.c in Halibut 1.2 allows an attacker to cause a segmentation fault or possibly have unspecified other impact via a crafted text document. + + +- [Live-Hack-CVE/CVE-2021-42614](https://github.com/Live-Hack-CVE/CVE-2021-42614) + ### CVE-2021-42646 (2022-05-11) @@ -16817,62 +17514,6 @@ XML External Entity (XXE) vulnerability in the file based service provider creat - [Live-Hack-CVE/CVE-2021-42646](https://github.com/Live-Hack-CVE/CVE-2021-42646) -### CVE-2021-42662 (2021-11-05) - - -A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more. - - -- [0xDeku/CVE-2021-42662](https://github.com/0xDeku/CVE-2021-42662) - -### CVE-2021-42663 (2021-11-05) - - -An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice. - - -- [0xDeku/CVE-2021-42663](https://github.com/0xDeku/CVE-2021-42663) - -### CVE-2021-42664 (2021-11-05) - - -A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more. - - -- [0xDeku/CVE-2021-42664](https://github.com/0xDeku/CVE-2021-42664) - -### CVE-2021-42665 (2021-11-05) - - -An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication. - - -- [0xDeku/CVE-2021-42665](https://github.com/0xDeku/CVE-2021-42665) - -### CVE-2021-42666 (2021-11-05) - - -A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server. - - -- [0xDeku/CVE-2021-42666](https://github.com/0xDeku/CVE-2021-42666) - -### CVE-2021-42667 (2021-11-05) - - -A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server. - - -- [0xDeku/CVE-2021-42667](https://github.com/0xDeku/CVE-2021-42667) - -### CVE-2021-42668 (2021-11-05) - - -A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server. - - -- [0xDeku/CVE-2021-42668](https://github.com/0xDeku/CVE-2021-42668) - ### CVE-2021-42669 (2021-11-05) @@ -16881,22 +17522,6 @@ A file upload vulnerability exists in Sourcecodester Engineers Online Portal in - [0xDeku/CVE-2021-42669](https://github.com/0xDeku/CVE-2021-42669) -### CVE-2021-42670 (2021-11-05) - - -A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server. - - -- [0xDeku/CVE-2021-42670](https://github.com/0xDeku/CVE-2021-42670) - -### CVE-2021-42671 (2021-11-05) - - -An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization. - - -- [0xDeku/CVE-2021-42671](https://github.com/0xDeku/CVE-2021-42671) - ### CVE-2021-42694 (2021-10-31) @@ -16921,21 +17546,13 @@ ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafte - [EkamSinghWalia/Detection-and-Mitigation-script-for-CVE-2021-42717](https://github.com/EkamSinghWalia/Detection-and-Mitigation-script-for-CVE-2021-42717) -### CVE-2021-42948 (2022-09-16) +### CVE-2021-42739 (2021-10-20) -HotelDruid Hotel Management Software v3.0.3 and below was discovered to have exposed session tokens in multiple links via GET parameters, allowing attackers to access user session id's. +A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. -- [dhammon/HotelDruid-CVE-2021-42948](https://github.com/dhammon/HotelDruid-CVE-2021-42948) - -### CVE-2021-42949 (2022-09-16) - - -The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing attackers to bypass authentication via bruteforce attacks. - - -- [dhammon/HotelDruid-CVE-2021-42949](https://github.com/dhammon/HotelDruid-CVE-2021-42949) +- [Live-Hack-CVE/CVE-2021-42739](https://github.com/Live-Hack-CVE/CVE-2021-42739) ### CVE-2021-43008 (2022-04-04) @@ -17146,6 +17763,14 @@ In GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page - [Live-Hack-CVE/CVE-2021-43332](https://github.com/Live-Hack-CVE/CVE-2021-43332) +### CVE-2021-43400 (2021-11-04) + + +An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call. + + +- [Live-Hack-CVE/CVE-2021-43400](https://github.com/Live-Hack-CVE/CVE-2021-43400) + ### CVE-2021-43408 (2021-11-19) @@ -17292,9 +17917,7 @@ A Stored Cross-site scripting (XSS) vulnerability via MAster.php in Sourcecodete Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline. -- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana) - [Jroo1053/GrafanaDirInclusion](https://github.com/Jroo1053/GrafanaDirInclusion) -- [yasin-cs-ko-ak/grafana-cve-2021-43798](https://github.com/yasin-cs-ko-ak/grafana-cve-2021-43798) - [hupe1980/CVE-2021-43798](https://github.com/hupe1980/CVE-2021-43798) - [trhacknon/exploit-grafana-CVE-2021-43798](https://github.com/trhacknon/exploit-grafana-CVE-2021-43798) - [YourKeeper/SunScope](https://github.com/YourKeeper/SunScope) @@ -17355,13 +17978,21 @@ Visual Studio Code Spoofing Vulnerability - [Sudistark/vscode-rce-electrovolt](https://github.com/Sudistark/vscode-rce-electrovolt) -### CVE-2021-43936 (2021-12-06) +### CVE-2021-43946 (2022-01-04) -The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution. +Affected versions of Atlassian Jira Server and Data Center allow authenticated remote attackers to add administrator groups to filter subscriptions via a Broken Access Control vulnerability in the /secure/EditSubscription.jspa endpoint. The affected versions are before version 8.13.21, and from version 8.14.0 before 8.20.9. -- [LongWayHomie/CVE-2021-43936](https://github.com/LongWayHomie/CVE-2021-43936) +- [Live-Hack-CVE/CVE-2021-43946](https://github.com/Live-Hack-CVE/CVE-2021-43946) + +### CVE-2021-43980 (2022-09-28) + + +The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. + + +- [Live-Hack-CVE/CVE-2021-43980](https://github.com/Live-Hack-CVE/CVE-2021-43980) ### CVE-2021-44103 - [paulotrindadec/CVE-2021-44103](https://github.com/paulotrindadec/CVE-2021-44103) @@ -17374,32 +18005,14 @@ A Cross Site Request Forgery (CSRF) vulnerability exists in TheDayLightStudio Fu - [warmachine-57/CVE-2021-44117](https://github.com/warmachine-57/CVE-2021-44117) -### CVE-2021-44132 (2022-02-25) - - -A command injection vulnerability in the function formImportOMCIShell of C-DATA ONU4FERW V2.1.13_X139 allows attackers to execute arbitrary commands via a crafted file. - - -- [exploitwritter/CVE-2021-44132](https://github.com/exploitwritter/CVE-2021-44132) - ### CVE-2021-44142 (2022-02-21) The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. -- [hrsman/Samba-CVE-2021-44142](https://github.com/hrsman/Samba-CVE-2021-44142) -- [horizon3ai/CVE-2021-44142](https://github.com/horizon3ai/CVE-2021-44142) - [gudyrmik/CVE-2021-44142](https://github.com/gudyrmik/CVE-2021-44142) -### CVE-2021-44217 (2022-01-18) - - -In Ericsson CodeChecker through 6.18.0, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API. - - -- [Hyperkopite/CVE-2021-44217](https://github.com/Hyperkopite/CVE-2021-44217) - ### CVE-2021-44227 (2021-12-01) @@ -17422,52 +18035,29 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner) - [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner) - [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground) -- [mergebase/log4j-detector](https://github.com/mergebase/log4j-detector) - [corretto/hotpatch-for-apache-log4j2](https://github.com/corretto/hotpatch-for-apache-log4j2) -- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector) -- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell) - [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc) - [fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan) - [thecyberneh/Log4j-RCE-Exploiter](https://github.com/thecyberneh/Log4j-RCE-Exploiter) - [avwolferen/Sitecore.Solr-log4j-mitigation](https://github.com/avwolferen/Sitecore.Solr-log4j-mitigation) -- [LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228](https://github.com/LutziGoz/Log4J_Exploitation-Vulnerabiliy__CVE-2021-44228) - [irgoncalves/f5-waf-quick-patch-cve-2021-44228](https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228) -- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228) - [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools) - [0xInfection/LogMePwn](https://github.com/0xInfection/LogMePwn) -- [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder) -- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner) - [isuruwa/Log4j](https://github.com/isuruwa/Log4j) - [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent) -- [michaelsanford/Log4Shell-Honeypot](https://github.com/michaelsanford/Log4Shell-Honeypot) - [thomaspatzke/Log4Pot](https://github.com/thomaspatzke/Log4Pot) - [Joefreedy/Log4j-Windows-Scanner](https://github.com/Joefreedy/Log4j-Windows-Scanner) -- [andalik/log4j-filescan](https://github.com/andalik/log4j-filescan) - [Kr0ff/CVE-2021-44228](https://github.com/Kr0ff/CVE-2021-44228) - [nu11secur1ty/CVE-2021-44228-VULN-APP](https://github.com/nu11secur1ty/CVE-2021-44228-VULN-APP) -- [DANSI/PowerShell-Log4J-Scanner](https://github.com/DANSI/PowerShell-Log4J-Scanner) - [intel-xeon/CVE-2021-44228---detection-with-PowerShell](https://github.com/intel-xeon/CVE-2021-44228---detection-with-PowerShell) -- [erickrr-bd/TekiumLog4jApp](https://github.com/erickrr-bd/TekiumLog4jApp) -- [BabooPan/Log4Shell-CVE-2021-44228-Demo](https://github.com/BabooPan/Log4Shell-CVE-2021-44228-Demo) - [puzzlepeaches/Log4jUnifi](https://github.com/puzzlepeaches/Log4jUnifi) - [marcourbano/CVE-2021-44228](https://github.com/marcourbano/CVE-2021-44228) -- [bsigouin/log4shell-vulnerable-app](https://github.com/bsigouin/log4shell-vulnerable-app) -- [felipe8398/ModSec-log4j2](https://github.com/felipe8398/ModSec-log4j2) - [mazhar-hassan/log4j-vulnerability](https://github.com/mazhar-hassan/log4j-vulnerability) -- [s-retlaw/l4s_poc](https://github.com/s-retlaw/l4s_poc) -- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io) - [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-) - [Vulnmachines/log4jshell_CVE-2021-44228](https://github.com/Vulnmachines/log4jshell_CVE-2021-44228) -- [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer) - [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin) - [hotpotcookie/log4shell-white-box](https://github.com/hotpotcookie/log4shell-white-box) - [s-retlaw/l4srs](https://github.com/s-retlaw/l4srs) -- [Ananya-0306/Log-4j-scanner](https://github.com/Ananya-0306/Log-4j-scanner) -- [paulvkitor/log4shellwithlog4j2_13_3](https://github.com/paulvkitor/log4shellwithlog4j2_13_3) -- [MiguelM001/vulescanjndilookup](https://github.com/MiguelM001/vulescanjndilookup) -- [Jun-5heng/CVE-2021-44228](https://github.com/Jun-5heng/CVE-2021-44228) -- [honypot/CVE-2021-44228](https://github.com/honypot/CVE-2021-44228) -- [honypot/CVE-2021-44228-vuln-app](https://github.com/honypot/CVE-2021-44228-vuln-app) - [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner) - [TPower2112/Writing-Sample-1](https://github.com/TPower2112/Writing-Sample-1) - [Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228](https://github.com/Willian-2-0-0-1/Log4j-Exploit-CVE-2021-44228) @@ -17490,14 +18080,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [trhacknon/CVE-2021-44228-Scanner](https://github.com/trhacknon/CVE-2021-44228-Scanner) - [Live-Hack-CVE/CVE-2021-44228](https://github.com/Live-Hack-CVE/CVE-2021-44228) -### CVE-2021-44255 (2022-01-31) - - -Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server. - - -- [pizza-power/motioneye-authenticated-RCE](https://github.com/pizza-power/motioneye-authenticated-RCE) - ### CVE-2021-44467 (2022-10-24) @@ -17520,7 +18102,6 @@ In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Director When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE. -- [WoodenKlaas/CVE-2021-44521](https://github.com/WoodenKlaas/CVE-2021-44521) - [Yeyvo/poc-CVE-2021-44521](https://github.com/Yeyvo/poc-CVE-2021-44521) ### CVE-2021-44529 (2021-12-08) @@ -17529,7 +18110,6 @@ When running Apache Cassandra with the following configuration: enable_user_defi A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody). -- [jkana/CVE-2021-44529](https://github.com/jkana/CVE-2021-44529) - [jax7sec/CVE-2021-44529](https://github.com/jax7sec/CVE-2021-44529) ### CVE-2021-44582 (2022-06-10) @@ -17564,6 +18144,14 @@ A vulnerability has been identified in SIMATIC Drive Controller family (All vers - [Live-Hack-CVE/CVE-2021-44695](https://github.com/Live-Hack-CVE/CVE-2021-44695) +### CVE-2021-44716 (2021-12-31) + + +net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests. + + +- [Live-Hack-CVE/CVE-2021-44716](https://github.com/Live-Hack-CVE/CVE-2021-44716) + ### CVE-2021-44731 (2022-02-17) @@ -17588,14 +18176,6 @@ A broken access control vulnerability in the SubNet_handler_func function of spx - [Live-Hack-CVE/CVE-2021-44776](https://github.com/Live-Hack-CVE/CVE-2021-44776) -### CVE-2021-44827 (2022-03-04) - - -There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges. - - -- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827) - ### CVE-2021-44852 (2022-01-01) @@ -17604,21 +18184,13 @@ An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. - [Exploitables/CVE-2021-44852](https://github.com/Exploitables/CVE-2021-44852) -### CVE-2021-45007 (2022-02-20) +### CVE-2021-44862 (2022-11-03) -** DISPUTED ** Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users. +Netskope client is impacted by a vulnerability where an authenticated, local attacker can view sensitive information stored in NSClient logs which should be restricted. The vulnerability exists because the sensitive information is not masked/scrubbed before writing in the logs. A malicious user can use the sensitive information to download data and impersonate another user. -- [AS4mir/CVE-2021-45007](https://github.com/AS4mir/CVE-2021-45007) - -### CVE-2021-45008 (2022-02-21) - - -** DISPUTED ** Plesk CMS 18.0.37 is affected by an insecure permissions vulnerability that allows privilege Escalation from user to admin rights. OTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users. - - -- [AS4mir/CVE-2021-45008](https://github.com/AS4mir/CVE-2021-45008) +- [Live-Hack-CVE/CVE-2021-44862](https://github.com/Live-Hack-CVE/CVE-2021-44862) ### CVE-2021-45010 (2022-03-15) @@ -17626,7 +18198,6 @@ An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager before 2.4.7 allows remote attackers (with valid user accounts) to upload malicious PHP files to the webroot, leading to code execution. -- [febinrev/CVE-2021-45010-TinyFileManager-Exploit](https://github.com/febinrev/CVE-2021-45010-TinyFileManager-Exploit) - [BKreisel/CVE-2021-45010](https://github.com/BKreisel/CVE-2021-45010) ### CVE-2021-45036 (2022-11-28) @@ -17661,6 +18232,22 @@ In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks an - [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack) +### CVE-2021-45342 (2022-01-25) + + +A buffer overflow vulnerability in CDataList of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document. + + +- [Live-Hack-CVE/CVE-2021-45342](https://github.com/Live-Hack-CVE/CVE-2021-45342) + +### CVE-2021-45343 (2022-01-25) + + +In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of libdxfrw allows an attacker to crash the application using a crafted DXF document. + + +- [Live-Hack-CVE/CVE-2021-45343](https://github.com/Live-Hack-CVE/CVE-2021-45343) + ### CVE-2021-45346 (2022-02-14) @@ -17669,6 +18256,22 @@ In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks an - [Live-Hack-CVE/CVE-2021-45346](https://github.com/Live-Hack-CVE/CVE-2021-45346) +### CVE-2021-45446 (2022-11-02) + + +A vulnerability in Hitachi Vantara Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 does not cascade the hidden property to the children of the Home folder. This directory listing provides an attacker with the complete index of all the resources located inside the directory. + + +- [Live-Hack-CVE/CVE-2021-45446](https://github.com/Live-Hack-CVE/CVE-2021-45446) + +### CVE-2021-45447 (2022-11-02) + + +Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.2 and 8.3.0.25 with the Data Lineage feature enabled transmits database passwords in clear text. The transmission of sensitive data in clear text allows unauthorized actors with access to the network to sniff and obtain sensitive information that can be later used to gain unauthorized access. + + +- [Live-Hack-CVE/CVE-2021-45447](https://github.com/Live-Hack-CVE/CVE-2021-45447) + ### CVE-2021-45450 (2021-12-21) @@ -17693,6 +18296,14 @@ In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_co - [Satheesh575555/linux-4.19.72_CVE-2021-45485](https://github.com/Satheesh575555/linux-4.19.72_CVE-2021-45485) +### CVE-2021-45848 (2022-03-15) + + +Denial of service (DoS) vulnerability in Nicotine+ 3.0.3 and later allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character. + + +- [Live-Hack-CVE/CVE-2021-45848](https://github.com/Live-Hack-CVE/CVE-2021-45848) + ### CVE-2021-45901 (2022-02-10) @@ -17733,6 +18344,14 @@ OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineComp - [Live-Hack-CVE/CVE-2021-45942](https://github.com/Live-Hack-CVE/CVE-2021-45942) +### CVE-2021-45943 (2021-12-31) + + +GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment). + + +- [Live-Hack-CVE/CVE-2021-45943](https://github.com/Live-Hack-CVE/CVE-2021-45943) + ### CVE-2021-45960 (2022-01-01) @@ -17782,14 +18401,6 @@ File upload vulnerability in mingSoft MCMS through 5.2.5, allows remote attacker - [Live-Hack-CVE/CVE-2021-46386](https://github.com/Live-Hack-CVE/CVE-2021-46386) -### CVE-2021-46398 (2022-02-04) - - -A Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE. - - -- [febinrev/CVE-2021-46398_Chamilo-LMS-RCE](https://github.com/febinrev/CVE-2021-46398_Chamilo-LMS-RCE) - ### CVE-2021-46417 (2022-04-07) @@ -17818,14 +18429,6 @@ Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability - [polerstar/CVE-2021-46422-poc](https://github.com/polerstar/CVE-2021-46422-poc) - [kailing0220/CVE-2021-46422](https://github.com/kailing0220/CVE-2021-46422) -### CVE-2021-46702 (2022-02-25) - - -Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory. - - -- [malakkf/CVE-2021-46702](https://github.com/malakkf/CVE-2021-46702) - ### CVE-2021-46741 (2022-07-11) @@ -17866,6 +18469,22 @@ GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affe - [Live-Hack-CVE/CVE-2021-46848](https://github.com/Live-Hack-CVE/CVE-2021-46848) +### CVE-2021-46851 (2022-11-09) + + +The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. + + +- [Live-Hack-CVE/CVE-2021-46851](https://github.com/Live-Hack-CVE/CVE-2021-46851) + +### CVE-2021-46852 (2022-11-09) + + +The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. + + +- [Live-Hack-CVE/CVE-2021-46852](https://github.com/Live-Hack-CVE/CVE-2021-46852) + ### CVE-2021-46853 (2022-11-03) @@ -17910,7 +18529,6 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou - [leommxj/cve-2020-0022](https://github.com/leommxj/cve-2020-0022) - [k3vinlusec/Bluefrag_CVE-2020-0022](https://github.com/k3vinlusec/Bluefrag_CVE-2020-0022) - [Polo35/CVE-2020-0022](https://github.com/Polo35/CVE-2020-0022) -- [5k1l/cve-2020-0022](https://github.com/5k1l/cve-2020-0022) - [lsw29475/CVE-2020-0022](https://github.com/lsw29475/CVE-2020-0022) - [devdanqtuan/poc-for-cve-2020-0022](https://github.com/devdanqtuan/poc-for-cve-2020-0022) @@ -17953,14 +18571,6 @@ In startActivities of ActivityStartController.java, there is a possible escalati - [liuyun201990/StrandHogg2](https://github.com/liuyun201990/StrandHogg2) - [tea9/CVE-2020-0096-StrandHogg2](https://github.com/tea9/CVE-2020-0096-StrandHogg2) -### CVE-2020-0113 (2020-06-10) - - -In sendCaptureResult of Camera3OutputUtils.cpp, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-150944913 - - -- [XDo0/ServiceCheater](https://github.com/XDo0/ServiceCheater) - ### CVE-2020-0121 (2020-06-10) @@ -18486,8 +19096,6 @@ An elevation of privilege vulnerability exists when the Windows Background Intel - [cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) -- [MasterSploit/CVE-2020-0787](https://github.com/MasterSploit/CVE-2020-0787) -- [MasterSploit/CVE-2020-0787-BitsArbitraryFileMove-master](https://github.com/MasterSploit/CVE-2020-0787-BitsArbitraryFileMove-master) - [yanghaoi/CVE-2020-0787](https://github.com/yanghaoi/CVE-2020-0787) ### CVE-2020-0796 (2020-03-12) @@ -18555,7 +19163,6 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve - [1060275195/SMBGhost](https://github.com/1060275195/SMBGhost) - [Almorabea/SMBGhost-LPE-Metasploit-Module](https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module) - [datntsec/CVE-2020-0796](https://github.com/datntsec/CVE-2020-0796) -- [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796) - [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796) - [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner) - [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker) @@ -18765,12 +19372,8 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu - [zeronetworks/zerologon](https://github.com/zeronetworks/zerologon) - [sv3nbeast/CVE-2020-1472](https://github.com/sv3nbeast/CVE-2020-1472) - [Fa1c0n35/CVE-2020-1472-02-](https://github.com/Fa1c0n35/CVE-2020-1472-02-) -- [Whippet0/CVE-2020-1472](https://github.com/Whippet0/CVE-2020-1472) - [CPO-EH/CVE-2020-1472_ZeroLogonChecker](https://github.com/CPO-EH/CVE-2020-1472_ZeroLogonChecker) - [puckiestyle/CVE-2020-1472](https://github.com/puckiestyle/CVE-2020-1472) -- [JayP232/The_big_Zero](https://github.com/JayP232/The_big_Zero) -- [b1ack0wl/CVE-2020-1472](https://github.com/b1ack0wl/CVE-2020-1472) -- [SaharAttackit/CVE-2020-1472](https://github.com/SaharAttackit/CVE-2020-1472) - [wrathfulDiety/zerologon](https://github.com/wrathfulDiety/zerologon) - [YossiSassi/ZeroLogon-Exploitation-Check](https://github.com/YossiSassi/ZeroLogon-Exploitation-Check) - [sho-luv/zerologon](https://github.com/sho-luv/zerologon) @@ -18819,6 +19422,30 @@ A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an a - [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611) +### CVE-2020-1706 (2020-03-09) + + +It has been found that in openshift-enterprise version 3.11 and openshift-enterprise versions 4.1 up to, including 4.3, multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the openshift/apb-tools-container. + + +- [Live-Hack-CVE/CVE-2020-1706](https://github.com/Live-Hack-CVE/CVE-2020-1706) + +### CVE-2020-1707 (2020-03-20) + + +A vulnerability was found in all openshift/postgresql-apb 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the container openshift/postgresql-apb. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. + + +- [Live-Hack-CVE/CVE-2020-1707](https://github.com/Live-Hack-CVE/CVE-2020-1707) + +### CVE-2020-1709 (2020-03-20) + + +A vulnerability was found in all openshift/mediawiki 4.x.x versions prior to 4.3.0, where an insecure modification vulnerability in the /etc/passwd file was found in the openshift/mediawiki. An attacker with access to the container could use this flaw to modify /etc/passwd and escalate their privileges. + + +- [Live-Hack-CVE/CVE-2020-1709](https://github.com/Live-Hack-CVE/CVE-2020-1709) + ### CVE-2020-1712 (2020-03-31) @@ -18827,6 +19454,22 @@ A heap use-after-free vulnerability was found in systemd before version v245-rc1 - [Live-Hack-CVE/CVE-2020-1712](https://github.com/Live-Hack-CVE/CVE-2020-1712) +### CVE-2020-1730 (2020-04-13) + + +A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability. + + +- [Live-Hack-CVE/CVE-2020-1730](https://github.com/Live-Hack-CVE/CVE-2020-1730) + +### CVE-2020-1744 (2020-03-24) + + +A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events. + + +- [Live-Hack-CVE/CVE-2020-1744](https://github.com/Live-Hack-CVE/CVE-2020-1744) + ### CVE-2020-1937 (2020-02-24) @@ -18862,7 +19505,6 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc - [doggycheng/CNVD-2020-10487](https://github.com/doggycheng/CNVD-2020-10487) - [I-Runtime-Error/CVE-2020-1938](https://github.com/I-Runtime-Error/CVE-2020-1938) - [Umesh2807/Ghostcat](https://github.com/Umesh2807/Ghostcat) -- [kukudechen-chen/cve-2020-1938](https://github.com/kukudechen-chen/cve-2020-1938) - [acodervic/CVE-2020-1938-MSF-MODULE](https://github.com/acodervic/CVE-2020-1938-MSF-MODULE) - [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat) - [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938) @@ -18924,13 +19566,13 @@ The Raccoon attack exploits a flaw in the TLS specification which can lead to an - [Live-Hack-CVE/CVE-2020-1968](https://github.com/Live-Hack-CVE/CVE-2020-1968) -### CVE-2020-1971 (2020-12-08) +### CVE-2020-2026 (2020-06-10) -The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w). +A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; Kata Containers 1.9 and earlier versions. -- [MBHudson/CVE-2020-1971](https://github.com/MBHudson/CVE-2020-1971) +- [Live-Hack-CVE/CVE-2020-2026](https://github.com/Live-Hack-CVE/CVE-2020-2026) ### CVE-2020-2038 (2020-09-09) @@ -18940,6 +19582,14 @@ An OS Command Injection vulnerability in the PAN-OS management interface that al - [und3sc0n0c1d0/CVE-2020-2038](https://github.com/und3sc0n0c1d0/CVE-2020-2038) +### CVE-2020-2091 (2020-01-15) + + +A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. + + +- [Live-Hack-CVE/CVE-2020-2091](https://github.com/Live-Hack-CVE/CVE-2020-2091) + ### CVE-2020-2333 - [section-c/CVE-2020-2333](https://github.com/section-c/CVE-2020-2333) @@ -19044,7 +19694,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [Y4er/CVE-2020-2883](https://github.com/Y4er/CVE-2020-2883) - [MagicZer0/Weblogic_CVE-2020-2883_POC](https://github.com/MagicZer0/Weblogic_CVE-2020-2883_POC) - [ZZZWD/CVE-2020-2883](https://github.com/ZZZWD/CVE-2020-2883) -- [Al1ex/CVE-2020-2883](https://github.com/Al1ex/CVE-2020-2883) - [Qynklee/POC_CVE-2020-2883](https://github.com/Qynklee/POC_CVE-2020-2883) ### CVE-2020-2950 (2020-04-15) @@ -19097,8 +19746,6 @@ A vulnerability in the web services interface of Cisco Adaptive Security Applian - [paran0id34/CVE-2020-3452](https://github.com/paran0id34/CVE-2020-3452) -- [grim3/CVE-2020-3452](https://github.com/grim3/CVE-2020-3452) -- [cygenta/CVE-2020-3452](https://github.com/cygenta/CVE-2020-3452) - [darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter](https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter) - [fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal](https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal) - [faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner](https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner) @@ -19168,17 +19815,8 @@ VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x be OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution. -- [HynekPetrak/CVE-2019-5544_CVE-2020-3992](https://github.com/HynekPetrak/CVE-2019-5544_CVE-2020-3992) - [dgh05t/VMware_ESXI_OpenSLP_PoCs](https://github.com/dgh05t/VMware_ESXI_OpenSLP_PoCs) -### CVE-2020-4040 (2020-06-08) - - -Bolt CMS before version 3.7.1 lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. This has been fixed in Bolt 3.7.1 - - -- [jpvispo/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041](https://github.com/jpvispo/RCE-Exploit-Bolt-3.7.0-CVE-2020-4040-4041) - ### CVE-2020-4276 (2020-03-26) @@ -19391,6 +20029,14 @@ In versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, - [Live-Hack-CVE/CVE-2020-5913](https://github.com/Live-Hack-CVE/CVE-2020-5913) +### CVE-2020-6020 (2020-09-24) + + +Check Point Security Management's Internal CA web management before Jumbo HFAs R80.10 Take 278, R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38, can be manipulated to run commands as a high privileged user or crash, due to weak input validation on inputs by a trusted management administrator. + + +- [Live-Hack-CVE/CVE-2020-6020](https://github.com/Live-Hack-CVE/CVE-2020-6020) + ### CVE-2020-6096 (2020-04-01) @@ -19422,7 +20068,6 @@ SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410 - [InitRoot/CVE-2020-6308-PoC](https://github.com/InitRoot/CVE-2020-6308-PoC) -- [freeFV/CVE-2020-6308-mass-exploiter](https://github.com/freeFV/CVE-2020-6308-mass-exploiter) - [TheMMMdev/CVE-2020-6308](https://github.com/TheMMMdev/CVE-2020-6308) ### CVE-2020-6364 (2020-10-14) @@ -19460,6 +20105,22 @@ Policy bypass in CORS in Google Chrome prior to 84.0.4147.89 allowed a remote at - [CENSUS/whatsapp-mitd-mitm](https://github.com/CENSUS/whatsapp-mitd-mitm) +### CVE-2020-6624 (2020-01-08) + + +jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c. + + +- [Live-Hack-CVE/CVE-2020-6624](https://github.com/Live-Hack-CVE/CVE-2020-6624) + +### CVE-2020-6625 (2020-01-08) + + +jhead through 3.04 has a heap-based buffer over-read in Get32s when called from ProcessGpsInfo in gpsinfo.c. + + +- [Live-Hack-CVE/CVE-2020-6625](https://github.com/Live-Hack-CVE/CVE-2020-6625) + ### CVE-2020-6627 (2022-12-06) @@ -19487,6 +20148,14 @@ A flawed protocol design in the Ledger Monero app before 1.5.1 for Ledger Nano a ### CVE-2020-6888 - [section-c/CVE-2020-6888](https://github.com/section-c/CVE-2020-6888) +### CVE-2020-7016 (2020-07-27) + + +Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive. + + +- [Live-Hack-CVE/CVE-2020-7016](https://github.com/Live-Hack-CVE/CVE-2020-7016) + ### CVE-2020-7048 (2020-01-16) @@ -19519,6 +20188,7 @@ A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An a - [arafatansari/SecAssignment](https://github.com/arafatansari/SecAssignment) - [pswalia2u/CVE-2020-7246](https://github.com/pswalia2u/CVE-2020-7246) +- [Live-Hack-CVE/CVE-2020-7246](https://github.com/Live-Hack-CVE/CVE-2020-7246) ### CVE-2020-7247 (2020-01-29) @@ -19629,6 +20299,14 @@ querymen prior to 2.1.4 allows modification of object properties. The parameters - [Live-Hack-CVE/CVE-2020-7600](https://github.com/Live-Hack-CVE/CVE-2020-7600) +### CVE-2020-7608 (2020-03-16) + + +yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload. + + +- [Live-Hack-CVE/CVE-2020-7608](https://github.com/Live-Hack-CVE/CVE-2020-7608) + ### CVE-2020-7616 (2020-04-07) @@ -19902,6 +20580,14 @@ All versions of package gedi are vulnerable to Prototype Pollution via the set f - [Live-Hack-CVE/CVE-2020-7727](https://github.com/Live-Hack-CVE/CVE-2020-7727) +### CVE-2020-7729 (2020-09-03) + + +The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML. + + +- [Live-Hack-CVE/CVE-2020-7729](https://github.com/Live-Hack-CVE/CVE-2020-7729) + ### CVE-2020-7736 (2020-10-02) @@ -20018,7 +20704,6 @@ Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows - [wcxxxxx/CVE-2020-7961](https://github.com/wcxxxxx/CVE-2020-7961) - [thelostworldFree/CVE-2020-7961-payloads](https://github.com/thelostworldFree/CVE-2020-7961-payloads) - [shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui](https://github.com/shacojx/LifeRCEJsonWSTool-POC-CVE-2020-7961-Gui) -- [shacojx/POC-CVE-2020-7961-Token-iterate](https://github.com/shacojx/POC-CVE-2020-7961-Token-iterate) - [Udyz/CVE-2020-7961-Mass](https://github.com/Udyz/CVE-2020-7961-Mass) - [ShutdownRepo/CVE-2020-7961](https://github.com/ShutdownRepo/CVE-2020-7961) - [pashayogi/CVE-2020-7961-Mass](https://github.com/pashayogi/CVE-2020-7961-Mass) @@ -20136,7 +20821,6 @@ A deserialization of untrusted data vulnernerability exists in rails < 5.2.4. - [masahiro331/CVE-2020-8165](https://github.com/masahiro331/CVE-2020-8165) -- [umiterkol/CVE-2020-8165--Auto-Shell](https://github.com/umiterkol/CVE-2020-8165--Auto-Shell) - [taipansec/CVE-2020-8165](https://github.com/taipansec/CVE-2020-8165) - [hybryx/CVE-2020-8165](https://github.com/hybryx/CVE-2020-8165) - [AssassinUKG/CVE-2020-8165](https://github.com/AssassinUKG/CVE-2020-8165) @@ -20152,14 +20836,6 @@ Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker t - [knokbak/get-pixels-updated](https://github.com/knokbak/get-pixels-updated) - [knokbak/save-pixels-updated](https://github.com/knokbak/save-pixels-updated) -### CVE-2020-8209 (2020-08-17) - - -Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files. - - -- [B1anda0/CVE-2020-8209](https://github.com/B1anda0/CVE-2020-8209) - ### CVE-2020-8218 (2020-07-30) @@ -20190,7 +20866,6 @@ A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface cou A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1. -- [masahiro331/CVE-2020-8277](https://github.com/masahiro331/CVE-2020-8277) - [AndrewIjano/CVE-2020-8277](https://github.com/AndrewIjano/CVE-2020-8277) ### CVE-2020-8287 (2021-01-06) @@ -20265,10 +20940,17 @@ Kubernetes API server in all versions allow an attacker who is able to create a - [rancher/externalip-webhook](https://github.com/rancher/externalip-webhook) - [jrmurray000/CVE-2020-8554](https://github.com/jrmurray000/CVE-2020-8554) -- [twistlock/k8s-cve-2020-8554-mitigations](https://github.com/twistlock/k8s-cve-2020-8554-mitigations) - [Dviejopomata/CVE-2020-8554](https://github.com/Dviejopomata/CVE-2020-8554) - [alebedev87/gatekeeper-cve-2020-8554](https://github.com/alebedev87/gatekeeper-cve-2020-8554) +### CVE-2020-8555 (2020-06-04) + + +The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services). + + +- [Live-Hack-CVE/CVE-2020-8555](https://github.com/Live-Hack-CVE/CVE-2020-8555) + ### CVE-2020-8597 (2020-02-03) @@ -20757,6 +21439,14 @@ FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction betwee - [harry1080/CVE-2020-10673](https://github.com/harry1080/CVE-2020-10673) - [Al1ex/CVE-2020-10673](https://github.com/Al1ex/CVE-2020-10673) +### CVE-2020-10684 (2020-03-24) + + +A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. + + +- [Live-Hack-CVE/CVE-2020-10684](https://github.com/Live-Hack-CVE/CVE-2020-10684) + ### CVE-2020-10685 (2020-05-11) @@ -20765,6 +21455,14 @@ A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x befor - [Live-Hack-CVE/CVE-2020-10685](https://github.com/Live-Hack-CVE/CVE-2020-10685) +### CVE-2020-10699 (2020-04-15) + + +A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. + + +- [Live-Hack-CVE/CVE-2020-10699](https://github.com/Live-Hack-CVE/CVE-2020-10699) + ### CVE-2020-10704 (2020-05-06) @@ -20781,6 +21479,46 @@ A flaw was found where the Plaintext Candlepin password is disclosed while updat - [Live-Hack-CVE/CVE-2020-10710](https://github.com/Live-Hack-CVE/CVE-2020-10710) +### CVE-2020-10713 (2020-07-30) + + +A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. + + +- [Live-Hack-CVE/CVE-2020-10713](https://github.com/Live-Hack-CVE/CVE-2020-10713) + +### CVE-2020-10714 (2020-09-23) + + +A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. + + +- [Live-Hack-CVE/CVE-2020-10714](https://github.com/Live-Hack-CVE/CVE-2020-10714) + +### CVE-2020-10717 (2020-05-04) + + +A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host. + + +- [Live-Hack-CVE/CVE-2020-10717](https://github.com/Live-Hack-CVE/CVE-2020-10717) + +### CVE-2020-10732 (2020-06-12) + + +A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. + + +- [Live-Hack-CVE/CVE-2020-10732](https://github.com/Live-Hack-CVE/CVE-2020-10732) + +### CVE-2020-10735 (2022-09-09) + + +A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability. + + +- [Live-Hack-CVE/CVE-2020-10735](https://github.com/Live-Hack-CVE/CVE-2020-10735) + ### CVE-2020-10737 (2020-05-26) @@ -20813,6 +21551,14 @@ A PGP signature bypass flaw was found in fwupd (all versions), which could lead - [justinsteven/CVE-2020-10759-poc](https://github.com/justinsteven/CVE-2020-10759-poc) +### CVE-2020-10761 (2020-06-09) + + +An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service. + + +- [Live-Hack-CVE/CVE-2020-10761](https://github.com/Live-Hack-CVE/CVE-2020-10761) + ### CVE-2020-10770 (2020-12-15) @@ -20820,6 +21566,39 @@ A flaw was found in Keycloak before 13.0.0, where it is possible to force the se - [ColdFusionX/Keycloak-12.0.1-CVE-2020-10770](https://github.com/ColdFusionX/Keycloak-12.0.1-CVE-2020-10770) +- [Live-Hack-CVE/CVE-2020-10770](https://github.com/Live-Hack-CVE/CVE-2020-10770) + +### CVE-2020-10781 (2020-09-16) + + +A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. + + +- [Live-Hack-CVE/CVE-2020-10781](https://github.com/Live-Hack-CVE/CVE-2020-10781) + +### CVE-2020-10802 (2020-03-21) + + +In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. + + +- [Live-Hack-CVE/CVE-2020-10802](https://github.com/Live-Hack-CVE/CVE-2020-10802) + +### CVE-2020-10803 (2020-03-21) + + +In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. + + +- [Live-Hack-CVE/CVE-2020-10803](https://github.com/Live-Hack-CVE/CVE-2020-10803) + +### CVE-2020-10804 (2020-03-21) + + +In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was found in retrieval of the current username (in libraries/classes/Server/Privileges.php and libraries/classes/UserPassword.php). A malicious user with access to the server could create a crafted username, and then trick the victim into performing specific actions with that user account (such as editing its privileges). + + +- [Live-Hack-CVE/CVE-2020-10804](https://github.com/Live-Hack-CVE/CVE-2020-10804) ### CVE-2020-10915 (2020-04-22) @@ -20829,6 +21608,14 @@ This vulnerability allows remote attackers to execute arbitrary code on affected - [Cinnamon1212/Modified-CVE-2020-10915-MsfModule](https://github.com/Cinnamon1212/Modified-CVE-2020-10915-MsfModule) +### CVE-2020-10936 (2020-05-27) + + +Sympa before 6.2.56 allows privilege escalation. + + +- [Live-Hack-CVE/CVE-2020-10936](https://github.com/Live-Hack-CVE/CVE-2020-10936) + ### CVE-2020-10963 (2020-03-25) @@ -20845,7 +21632,6 @@ GitLab EE/CE 8.5 to 12.9 is vulnerable to a an path traversal when moving an iss - [KooroshRZ/CVE-2020-10977](https://github.com/KooroshRZ/CVE-2020-10977) - [thewhiteh4t/cve-2020-10977](https://github.com/thewhiteh4t/cve-2020-10977) -- [JustMichi/CVE-2020-10977.py](https://github.com/JustMichi/CVE-2020-10977.py) - [JayHerlth/cve-2020-10977](https://github.com/JayHerlth/cve-2020-10977) - [erk3/gitlab-12.9.0-file-read](https://github.com/erk3/gitlab-12.9.0-file-read) - [liath/CVE-2020-10977](https://github.com/liath/CVE-2020-10977) @@ -21016,7 +21802,6 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2 - [lovelyjuice/cve-2020-11651-exp-plus](https://github.com/lovelyjuice/cve-2020-11651-exp-plus) - [heikanet/CVE-2020-11651-CVE-2020-11652-EXP](https://github.com/heikanet/CVE-2020-11651-CVE-2020-11652-EXP) - [RakhithJK/CVE-2020-11651](https://github.com/RakhithJK/CVE-2020-11651) -- [appcheck-ng/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652](https://github.com/appcheck-ng/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652) - [puckiestyle/cve-2020-11651](https://github.com/puckiestyle/cve-2020-11651) ### CVE-2020-11652 (2020-04-30) @@ -21036,6 +21821,54 @@ An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x befor - [Live-Hack-CVE/CVE-2020-11653](https://github.com/Live-Hack-CVE/CVE-2020-11653) +### CVE-2020-11759 (2020-04-14) + + +An issue was discovered in OpenEXR before 2.4.1. Because of integer overflows in CompositeDeepScanLine::Data::handleDeepFrameBuffer and readSampleCountForLineBlock, an attacker can write to an out-of-bounds pointer. + + +- [Live-Hack-CVE/CVE-2020-11759](https://github.com/Live-Hack-CVE/CVE-2020-11759) + +### CVE-2020-11760 (2020-04-14) + + +An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during RLE uncompression in rleUncompress in ImfRle.cpp. + + +- [Live-Hack-CVE/CVE-2020-11760](https://github.com/Live-Hack-CVE/CVE-2020-11760) + +### CVE-2020-11761 (2020-04-14) + + +An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read during Huffman uncompression, as demonstrated by FastHufDecoder::refill in ImfFastHuf.cpp. + + +- [Live-Hack-CVE/CVE-2020-11761](https://github.com/Live-Hack-CVE/CVE-2020-11761) + +### CVE-2020-11762 (2020-04-14) + + +An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds read and write in DwaCompressor::uncompress in ImfDwaCompressor.cpp when handling the UNKNOWN compression case. + + +- [Live-Hack-CVE/CVE-2020-11762](https://github.com/Live-Hack-CVE/CVE-2020-11762) + +### CVE-2020-11763 (2020-04-14) + + +An issue was discovered in OpenEXR before 2.4.1. There is an std::vector out-of-bounds read and write, as demonstrated by ImfTileOffsets.cpp. + + +- [Live-Hack-CVE/CVE-2020-11763](https://github.com/Live-Hack-CVE/CVE-2020-11763) + +### CVE-2020-11764 (2020-04-14) + + +An issue was discovered in OpenEXR before 2.4.1. There is an out-of-bounds write in copyIntoFrameBuffer in ImfMisc.cpp. + + +- [Live-Hack-CVE/CVE-2020-11764](https://github.com/Live-Hack-CVE/CVE-2020-11764) + ### CVE-2020-11794 - [w4cky/CVE-2020-11794](https://github.com/w4cky/CVE-2020-11794) @@ -21071,6 +21904,22 @@ Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, a - [ch1nghz/CVE-2020-11851](https://github.com/ch1nghz/CVE-2020-11851) +### CVE-2020-11853 (2020-10-22) + + +Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code. + + +- [Live-Hack-CVE/CVE-2020-11853](https://github.com/Live-Hack-CVE/CVE-2020-11853) + +### CVE-2020-11858 (2020-10-27) + + +Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges. + + +- [Live-Hack-CVE/CVE-2020-11858](https://github.com/Live-Hack-CVE/CVE-2020-11858) + ### CVE-2020-11881 (2020-09-14) @@ -21121,14 +21970,6 @@ It was discovered that the Subiquity installer for Ubuntu Server logged the LUKS - [Staubgeborener/CVE-2020-11932](https://github.com/Staubgeborener/CVE-2020-11932) - [code-developers/CVE-2020-11932](https://github.com/code-developers/CVE-2020-11932) -### CVE-2020-11975 (2020-06-05) - - -Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process. - - -- [1135/unomi_exploit](https://github.com/1135/unomi_exploit) - ### CVE-2020-11978 (2020-07-16) @@ -21186,6 +22027,14 @@ Zoho ManageEngine OpManager Stable build before 124196 and Released build before - [BeetleChunks/CVE-2020-12116](https://github.com/BeetleChunks/CVE-2020-12116) +### CVE-2020-12137 (2020-04-24) + + +GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code. + + +- [Live-Hack-CVE/CVE-2020-12137](https://github.com/Live-Hack-CVE/CVE-2020-12137) + ### CVE-2020-12255 (2020-05-18) @@ -21194,6 +22043,14 @@ rConfig 3.9.4 is vulnerable to remote code execution due to improper validation - [vishwaraj101/CVE-2020-12255](https://github.com/vishwaraj101/CVE-2020-12255) +### CVE-2020-12272 (2020-04-27) + + +OpenDMARC through 1.3.2 and 1.4.x allows attacks that inject authentication results to provide false information about the domain that originated an e-mail message. This is caused by incorrect parsing and interpretation of SPF/DKIM authentication results, as demonstrated by the example.net(.example.com substring. + + +- [Live-Hack-CVE/CVE-2020-12272](https://github.com/Live-Hack-CVE/CVE-2020-12272) + ### CVE-2020-12351 (2020-11-23) @@ -21211,6 +22068,30 @@ OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 has improper null terminat - [Live-Hack-CVE/CVE-2020-12460](https://github.com/Live-Hack-CVE/CVE-2020-12460) +### CVE-2020-12507 (2022-11-15) + + +In s::can moni::tools before version 4.2 an authenticated attacker could get full access to the database through SQL injection. This may result in loss of confidentiality, loss of integrity and DoS. + + +- [Live-Hack-CVE/CVE-2020-12507](https://github.com/Live-Hack-CVE/CVE-2020-12507) + +### CVE-2020-12508 (2022-11-15) + + +In s::can moni::tools in versions below 4.2 an unauthenticated attacker could get any file from the device by path traversal in the image-relocator module. + + +- [Live-Hack-CVE/CVE-2020-12508](https://github.com/Live-Hack-CVE/CVE-2020-12508) + +### CVE-2020-12509 (2022-11-07) + + +In s::can moni::tools in versions below 4.2 an unauthenticated attacker could get any file from the device by path traversal in the camera-file module. + + +- [Live-Hack-CVE/CVE-2020-12509](https://github.com/Live-Hack-CVE/CVE-2020-12509) + ### CVE-2020-12593 (2020-11-18) @@ -21227,6 +22108,14 @@ include/class.sla.php in osTicket before 1.14.2 allows XSS via the SLA Name. - [mkelepce/CVE-2020-12629](https://github.com/mkelepce/CVE-2020-12629) +### CVE-2020-12672 (2020-05-05) + + +GraphicsMagick through 1.3.35 has a heap-based buffer overflow in ReadMNGImage in coders/png.c. + + +- [Live-Hack-CVE/CVE-2020-12672](https://github.com/Live-Hack-CVE/CVE-2020-12672) + ### CVE-2020-12688 - [TheCyberGeek/Centreon-20.04](https://github.com/TheCyberGeek/Centreon-20.04) @@ -21280,6 +22169,22 @@ An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, a - [shinyquagsire23/CVE-2020-12753-PoC](https://github.com/shinyquagsire23/CVE-2020-12753-PoC) +### CVE-2020-12762 (2020-05-09) + + +json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend. + + +- [Live-Hack-CVE/CVE-2020-12762](https://github.com/Live-Hack-CVE/CVE-2020-12762) + +### CVE-2020-12783 (2020-05-11) + + +Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. + + +- [Live-Hack-CVE/CVE-2020-12783](https://github.com/Live-Hack-CVE/CVE-2020-12783) + ### CVE-2020-12800 (2020-06-08) @@ -21328,6 +22233,30 @@ A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device - [Live-Hack-CVE/CVE-2020-12861](https://github.com/Live-Hack-CVE/CVE-2020-12861) +### CVE-2020-12862 (2020-06-24) + + +An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082. + + +- [Live-Hack-CVE/CVE-2020-12862](https://github.com/Live-Hack-CVE/CVE-2020-12862) + +### CVE-2020-12863 (2020-06-24) + + +An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083. + + +- [Live-Hack-CVE/CVE-2020-12863](https://github.com/Live-Hack-CVE/CVE-2020-12863) + +### CVE-2020-12865 (2020-06-24) + + +A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084. + + +- [Live-Hack-CVE/CVE-2020-12865](https://github.com/Live-Hack-CVE/CVE-2020-12865) + ### CVE-2020-12866 (2020-06-24) @@ -21336,6 +22265,22 @@ A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious dev - [Live-Hack-CVE/CVE-2020-12866](https://github.com/Live-Hack-CVE/CVE-2020-12866) +### CVE-2020-12867 (2020-06-01) + + +A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075. + + +- [Live-Hack-CVE/CVE-2020-12867](https://github.com/Live-Hack-CVE/CVE-2020-12867) + +### CVE-2020-12888 (2020-05-15) + + +The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space. + + +- [Live-Hack-CVE/CVE-2020-12888](https://github.com/Live-Hack-CVE/CVE-2020-12888) + ### CVE-2020-12928 (2020-10-13) @@ -21400,6 +22345,14 @@ The DMS/ECM module in Dolibarr 11.0.4 allows users with the 'Setup documents dir - [Live-Hack-CVE/CVE-2020-13240](https://github.com/Live-Hack-CVE/CVE-2020-13240) +### CVE-2020-13249 (2020-05-20) + + +libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle. + + +- [Live-Hack-CVE/CVE-2020-13249](https://github.com/Live-Hack-CVE/CVE-2020-13249) + ### CVE-2020-13254 (2020-06-03) @@ -21408,6 +22361,14 @@ An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cas - [danpalmer/django-cve-2020-13254](https://github.com/danpalmer/django-cve-2020-13254) +### CVE-2020-13285 (2020-08-13) + + +For GitLab before 13.0.12, 13.1.6, 13.2.3 a cross-site scripting (XSS) vulnerability exists in the issue reference number tooltip. + + +- [Live-Hack-CVE/CVE-2020-13285](https://github.com/Live-Hack-CVE/CVE-2020-13285) + ### CVE-2020-13294 (2020-08-10) @@ -21440,6 +22401,22 @@ An issue was discovered in Docker Engine before 19.03.11. An attacker in a conta - [arax-zaeimi/Docker-Container-CVE-2020-13401](https://github.com/arax-zaeimi/Docker-Container-CVE-2020-13401) +### CVE-2020-13410 (2020-08-26) + + +An issue was discovered in MoscaJS Aedes 0.42.0. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream. + + +- [Live-Hack-CVE/CVE-2020-13410](https://github.com/Live-Hack-CVE/CVE-2020-13410) + +### CVE-2020-13422 (2021-04-06) + + +OpenIAM before 4.2.0.3 does not verify if a user has permissions to perform /webconsole/rest/api/* administrative actions. + + +- [Live-Hack-CVE/CVE-2020-13422](https://github.com/Live-Hack-CVE/CVE-2020-13422) + ### CVE-2020-13457 - [alt3kx/CVE-2020-13457](https://github.com/alt3kx/CVE-2020-13457) @@ -21451,6 +22428,22 @@ An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parse - [Live-Hack-CVE/CVE-2020-13498](https://github.com/Live-Hack-CVE/CVE-2020-13498) +### CVE-2020-13614 (2020-05-26) + + +An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification. + + +- [Live-Hack-CVE/CVE-2020-13614](https://github.com/Live-Hack-CVE/CVE-2020-13614) + +### CVE-2020-13659 (2020-06-02) + + +address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer. + + +- [Live-Hack-CVE/CVE-2020-13659](https://github.com/Live-Hack-CVE/CVE-2020-13659) + ### CVE-2020-13692 (2020-06-04) @@ -21485,6 +22478,14 @@ Dolibarr 11.0.4 is affected by multiple stored Cross-Site Scripting (XSS) vulner - [Live-Hack-CVE/CVE-2020-13828](https://github.com/Live-Hack-CVE/CVE-2020-13828) +### CVE-2020-13882 (2020-06-18) + + +CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks. + + +- [Live-Hack-CVE/CVE-2020-13882](https://github.com/Live-Hack-CVE/CVE-2020-13882) + ### CVE-2020-13884 (2020-06-08) @@ -21549,11 +22550,6 @@ Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5. It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem. -- [lp008/CVE-2020-13942](https://github.com/lp008/CVE-2020-13942) -- [eugenebmx/CVE-2020-13942](https://github.com/eugenebmx/CVE-2020-13942) -- [shifa123/CVE-2020-13942-POC-](https://github.com/shifa123/CVE-2020-13942-POC-) -- [blackmarketer/CVE-2020-13942](https://github.com/blackmarketer/CVE-2020-13942) -- [yaunsky/Unomi-CVE-2020-13942](https://github.com/yaunsky/Unomi-CVE-2020-13942) - [hoanx4/apche_unomi_rce](https://github.com/hoanx4/apche_unomi_rce) - [Prodrious/CVE-2020-13942](https://github.com/Prodrious/CVE-2020-13942) @@ -21589,6 +22585,22 @@ Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents - [s-index/CVE-2020-13957](https://github.com/s-index/CVE-2020-13957) +### CVE-2020-13963 (2021-03-21) + + +SOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account). + + +- [Live-Hack-CVE/CVE-2020-13963](https://github.com/Live-Hack-CVE/CVE-2020-13963) + +### CVE-2020-14004 (2020-06-12) + + +An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user. + + +- [Live-Hack-CVE/CVE-2020-14004](https://github.com/Live-Hack-CVE/CVE-2020-14004) + ### CVE-2020-14043 (2020-08-24) @@ -21697,6 +22709,23 @@ A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL - [0z09e/CVE-2020-14295](https://github.com/0z09e/CVE-2020-14295) - [mrg3ntl3m4n/CVE-2020-14295](https://github.com/mrg3ntl3m4n/CVE-2020-14295) +- [Live-Hack-CVE/CVE-2020-14295](https://github.com/Live-Hack-CVE/CVE-2020-14295) + +### CVE-2020-14306 (2020-09-16) + + +An incorrect access control flaw was found in the operator, openshift-service-mesh/istio-rhel8-operator all versions through 1.1.3. This flaw allows an attacker with a basic level of access to the cluster to deploy a custom gateway/pod to any namespace, potentially gaining access to privileged service account tokens. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. + + +- [Live-Hack-CVE/CVE-2020-14306](https://github.com/Live-Hack-CVE/CVE-2020-14306) + +### CVE-2020-14307 (2020-07-24) + + +A vulnerability was found in Wildfly's Enterprise Java Beans (EJB) versions shipped with Red Hat JBoss EAP 7, where SessionOpenInvocations are never removed from the remote InvocationTracker after a response is received in the EJB Client, as well as the server. This flaw allows an attacker to craft a denial of service attack to make the service unavailable. + + +- [Live-Hack-CVE/CVE-2020-14307](https://github.com/Live-Hack-CVE/CVE-2020-14307) ### CVE-2020-14321 (2022-08-16) @@ -21717,6 +22746,38 @@ In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, yui_combo needed to limit the a - [Live-Hack-CVE/CVE-2020-14322](https://github.com/Live-Hack-CVE/CVE-2020-14322) +### CVE-2020-14330 (2020-09-11) + + +An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality. + + +- [Live-Hack-CVE/CVE-2020-14330](https://github.com/Live-Hack-CVE/CVE-2020-14330) + +### CVE-2020-14334 (2020-07-31) + + +A flaw was found in Red Hat Satellite 6 which allows privileged attacker to read cache files. These cache credentials could help attacker to gain complete control of the Satellite instance. + + +- [Live-Hack-CVE/CVE-2020-14334](https://github.com/Live-Hack-CVE/CVE-2020-14334) + +### CVE-2020-14339 (2020-12-03) + + +A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. + + +- [Live-Hack-CVE/CVE-2020-14339](https://github.com/Live-Hack-CVE/CVE-2020-14339) + +### CVE-2020-14342 (2020-09-09) + + +It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges. + + +- [Live-Hack-CVE/CVE-2020-14342](https://github.com/Live-Hack-CVE/CVE-2020-14342) + ### CVE-2020-14343 (2021-02-09) @@ -21735,6 +22796,14 @@ An integer overflow leading to a heap-buffer overflow was found in The X Input M - [Live-Hack-CVE/CVE-2020-14344](https://github.com/Live-Hack-CVE/CVE-2020-14344) +### CVE-2020-14346 (2020-09-15) + + +A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. + + +- [Live-Hack-CVE/CVE-2020-14346](https://github.com/Live-Hack-CVE/CVE-2020-14346) + ### CVE-2020-14355 (2020-10-07) @@ -21760,6 +22829,7 @@ An out-of-bounds read/write access flaw was found in the USB emulator of the QEM - [gejian-iscas/CVE-2020-14364](https://github.com/gejian-iscas/CVE-2020-14364) - [y-f00l/CVE-2020-14364](https://github.com/y-f00l/CVE-2020-14364) +- [Live-Hack-CVE/CVE-2020-14364](https://github.com/Live-Hack-CVE/CVE-2020-14364) ### CVE-2020-14367 (2020-08-24) @@ -21777,6 +22847,14 @@ A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeRea - [codingchili/CVE-2020-14368](https://github.com/codingchili/CVE-2020-14368) +### CVE-2020-14370 (2020-09-23) + + +An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables. + + +- [Live-Hack-CVE/CVE-2020-14370](https://github.com/Live-Hack-CVE/CVE-2020-14370) + ### CVE-2020-14372 (2021-03-03) @@ -21785,6 +22863,14 @@ A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enable - [kukrimate/CVE-2020-14372](https://github.com/kukrimate/CVE-2020-14372) +### CVE-2020-14378 (2020-09-30) + + +An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period. + + +- [Live-Hack-CVE/CVE-2020-14378](https://github.com/Live-Hack-CVE/CVE-2020-14378) + ### CVE-2020-14381 (2020-12-03) @@ -21801,6 +22887,14 @@ A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file syste - [Live-Hack-CVE/CVE-2020-14385](https://github.com/Live-Hack-CVE/CVE-2020-14385) +### CVE-2020-14389 (2020-11-16) + + +It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have. + + +- [Live-Hack-CVE/CVE-2020-14389](https://github.com/Live-Hack-CVE/CVE-2020-14389) + ### CVE-2020-14393 (2020-09-16) @@ -21817,6 +22911,30 @@ An infinite loop flaw was found in the USB xHCI controller emulation of QEMU whi - [Live-Hack-CVE/CVE-2020-14394](https://github.com/Live-Hack-CVE/CVE-2020-14394) +### CVE-2020-14444 (2020-06-18) + + +An issue was discovered in WSO2 Identity Server through 5.9.0 and WSO2 IS as Key Manager through 5.9.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console Policy Administration user interface. + + +- [Live-Hack-CVE/CVE-2020-14444](https://github.com/Live-Hack-CVE/CVE-2020-14444) + +### CVE-2020-14445 (2020-06-18) + + +An issue was discovered in WSO2 Identity Server through 5.9.0 and WSO2 IS as Key Manager through 5.9.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Management Console Basic Policy Editor user Interface. + + +- [Live-Hack-CVE/CVE-2020-14445](https://github.com/Live-Hack-CVE/CVE-2020-14445) + +### CVE-2020-14446 (2020-06-18) + + +An issue was discovered in WSO2 Identity Server through 5.10.0 and WSO2 IS as Key Manager through 5.10.0. An open redirect exists. + + +- [Live-Hack-CVE/CVE-2020-14446](https://github.com/Live-Hack-CVE/CVE-2020-14446) + ### CVE-2020-14475 (2020-06-19) @@ -21831,7 +22949,6 @@ A reflected cross-site scripting (XSS) vulnerability in Dolibarr 11.0.3 allows r Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). -- [HYWZ36/CVE-2020-14645-code](https://github.com/HYWZ36/CVE-2020-14645-code) - [Schira4396/CVE-2020-14645](https://github.com/Schira4396/CVE-2020-14645) ### CVE-2020-14723 (2020-07-15) @@ -21866,13 +22983,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware - [zhzyker/exphub](https://github.com/zhzyker/exphub) -- [jas502n/CVE-2020-14882](https://github.com/jas502n/CVE-2020-14882) -- [Umarovm/-Patched-McMaster-University-Blind-Command-Injection](https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection) -- [GGyao/CVE-2020-14882_POC](https://github.com/GGyao/CVE-2020-14882_POC) - [GGyao/CVE-2020-14882_ALL](https://github.com/GGyao/CVE-2020-14882_ALL) -- [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE) -- [xfiftyone/CVE-2020-14882](https://github.com/xfiftyone/CVE-2020-14882) -- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882) - [adm1in/CodeTest](https://github.com/adm1in/CodeTest) - [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic) - [milo2012/CVE-2020-14882](https://github.com/milo2012/CVE-2020-14882) @@ -21899,15 +23010,6 @@ On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to th - [g-rubert/CVE-2020-14965](https://github.com/g-rubert/CVE-2020-14965) -### CVE-2020-15002 (2020-10-23) - - -OX App Suite through 7.10.3 allows SSRF via the the /ajax/messaging/message message API. - - -- [skr0x1c0/Blind-SSRF-CVE-2020-15002](https://github.com/skr0x1c0/Blind-SSRF-CVE-2020-15002) -- [skr0x1c0/SSRF-CVE-2020-15002](https://github.com/skr0x1c0/SSRF-CVE-2020-15002) - ### CVE-2020-15113 (2020-08-05) @@ -21916,6 +23018,14 @@ In etcd before versions 3.3.23 and 3.4.10, certain directory paths are created ( - [Live-Hack-CVE/CVE-2020-15113](https://github.com/Live-Hack-CVE/CVE-2020-15113) +### CVE-2020-15166 (2020-09-11) + + +In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3. + + +- [Live-Hack-CVE/CVE-2020-15166](https://github.com/Live-Hack-CVE/CVE-2020-15166) + ### CVE-2020-15175 (2020-10-07) @@ -21930,16 +23040,15 @@ In GLPI before version 9.5.2, the `​pluginimage.send.php​` endpoint allows a Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework. -- [filipsedivy/CVE-2020-15227](https://github.com/filipsedivy/CVE-2020-15227) - [VottusCode/cve-2020-15227](https://github.com/VottusCode/cve-2020-15227) -### CVE-2020-15228 (2020-10-01) +### CVE-2020-15229 (2020-10-14) -In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution. +Singularity (an open source container platform) from version 3.1.1 through 3.6.3 has a vulnerability. Due to insecure handling of path traversal and the lack of path sanitization within `unsquashfs`, it is possible to overwrite/create any files on the host filesystem during the extraction with a crafted squashfs filesystem. The extraction occurs automatically for unprivileged (either installation or with `allow setuid = no`) run of Singularity when a user attempt to run an image which is a local SIF image or a single file containing a squashfs filesystem and is coming from remote sources `library://` or `shub://`. Image build is also impacted in a more serious way as it can be used by a root user, allowing an attacker to overwrite/create files leading to a system compromise, so far bootstrap methods `library`, `shub` and `localimage` are triggering the squashfs extraction. This issue is addressed in Singularity 3.6.4. All users are advised to upgrade to 3.6.4 especially if they use Singularity mainly for building image as root user. There is no solid workaround except to temporary avoid to use unprivileged mode with single file images in favor of sandbox images instead. Regarding image build, temporary avoid to build from `library` and `shub` sources and as much as possible use `--fakeroot` or a VM for that. -- [guettli/fix-CVE-2020-15228](https://github.com/guettli/fix-CVE-2020-15228) +- [Live-Hack-CVE/CVE-2020-15229](https://github.com/Live-Hack-CVE/CVE-2020-15229) ### CVE-2020-15257 (2020-11-30) @@ -21957,13 +23066,13 @@ On Windows the Veyon Service before version 4.4.2 contains an unquoted service p - [yaoyao-cool/CVE-2020-15261](https://github.com/yaoyao-cool/CVE-2020-15261) -### CVE-2020-15349 (2020-11-16) +### CVE-2020-15309 (2020-08-21) -BinaryNights ForkLift 3.x before 3.4 has a local privilege escalation vulnerability because the privileged helper tool implements an XPC interface that allows file operations to any process (copy, move, delete) as root and changing permissions. +An issue was discovered in wolfSSL before 4.5.0, when single precision is not employed. Local attackers can conduct a cache-timing attack against public key operations. These attackers may already have obtained sensitive information if the affected system has been used for private key operations (e.g., signing with a private key). -- [Traxes/Forklift_LPE](https://github.com/Traxes/Forklift_LPE) +- [Live-Hack-CVE/CVE-2020-15309](https://github.com/Live-Hack-CVE/CVE-2020-15309) ### CVE-2020-15366 (2020-07-15) @@ -21997,6 +23106,22 @@ A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2. - [inflixim4be/CVE-2020-15392](https://github.com/inflixim4be/CVE-2020-15392) +### CVE-2020-15395 (2020-06-30) + + +In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based buffer over-read in Streams_Fill_PerStream in Multiple/File_MpegPs.cpp (aka an off-by-one during MpegPs parsing). + + +- [Live-Hack-CVE/CVE-2020-15395](https://github.com/Live-Hack-CVE/CVE-2020-15395) + +### CVE-2020-15500 (2020-07-01) + + +An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS. + + +- [Live-Hack-CVE/CVE-2020-15500](https://github.com/Live-Hack-CVE/CVE-2020-15500) + ### CVE-2020-15503 (2020-07-02) @@ -22029,6 +23154,38 @@ By observing the stack trace for JavaScript errors in web workers, it was possib - [Live-Hack-CVE/CVE-2020-15652](https://github.com/Live-Hack-CVE/CVE-2020-15652) +### CVE-2020-15676 (2020-10-01) + + +Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3. + + +- [Live-Hack-CVE/CVE-2020-15676](https://github.com/Live-Hack-CVE/CVE-2020-15676) + +### CVE-2020-15677 (2020-10-01) + + +By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3. + + +- [Live-Hack-CVE/CVE-2020-15677](https://github.com/Live-Hack-CVE/CVE-2020-15677) + +### CVE-2020-15678 (2020-10-01) + + +When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3. + + +- [Live-Hack-CVE/CVE-2020-15678](https://github.com/Live-Hack-CVE/CVE-2020-15678) + +### CVE-2020-15706 (2020-07-29) + + +GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions. + + +- [Live-Hack-CVE/CVE-2020-15706](https://github.com/Live-Hack-CVE/CVE-2020-15706) + ### CVE-2020-15778 (2020-07-24) @@ -22053,6 +23210,7 @@ Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka - [francozappa/blur](https://github.com/francozappa/blur) +- [Live-Hack-CVE/CVE-2020-15802](https://github.com/Live-Hack-CVE/CVE-2020-15802) ### CVE-2020-15808 - [manucuf/CVE202015808](https://github.com/manucuf/CVE202015808) @@ -22081,6 +23239,22 @@ In Nagios XI before 5.7.3, ajaxhelper.php allows remote authenticated attackers - [Live-Hack-CVE/CVE-2020-15901](https://github.com/Live-Hack-CVE/CVE-2020-15901) +### CVE-2020-15902 (2020-07-22) + + +Graph Explorer in Nagios XI before 5.7.2 allows XSS via the link url option. + + +- [Live-Hack-CVE/CVE-2020-15902](https://github.com/Live-Hack-CVE/CVE-2020-15902) + +### CVE-2020-15917 (2020-07-23) + + +common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled. + + +- [Live-Hack-CVE/CVE-2020-15917](https://github.com/Live-Hack-CVE/CVE-2020-15917) + ### CVE-2020-15999 (2020-11-02) @@ -22099,6 +23273,14 @@ Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280 - [aleksejspopovs/cve-2020-16012](https://github.com/aleksejspopovs/cve-2020-16012) +### CVE-2020-16150 (2020-09-02) + + +A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length. + + +- [Live-Hack-CVE/CVE-2020-16150](https://github.com/Live-Hack-CVE/CVE-2020-16150) + ### CVE-2020-16152 (2021-11-14) @@ -22170,7 +23352,6 @@ A remote code execution vulnerability exists when the Windows TCP/IP stack impro A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka 'Microsoft Outlook Remote Code Execution Vulnerability'. -- [MasterSploit/CVE-2020-16947](https://github.com/MasterSploit/CVE-2020-16947) - [Live-Hack-CVE/CVE-2020-16947](https://github.com/Live-Hack-CVE/CVE-2020-16947) ### CVE-2020-17008 @@ -22190,7 +23371,6 @@ Windows Kernel Elevation of Privilege Vulnerability Windows Win32k Elevation of Privilege Vulnerability -- [ze0r/cve-2020-17057](https://github.com/ze0r/cve-2020-17057) - [lsw29475/CVE-2020-17057](https://github.com/lsw29475/CVE-2020-17057) ### CVE-2020-17087 (2020-11-11) @@ -22199,7 +23379,6 @@ Windows Win32k Elevation of Privilege Vulnerability Windows Kernel Local Elevation of Privilege Vulnerability -- [revengsh/CVE-2020-17087](https://github.com/revengsh/CVE-2020-17087) - [ykg88/OHTS_IE6052-CVE-2020-17087](https://github.com/ykg88/OHTS_IE6052-CVE-2020-17087) - [vp777/Windows-Non-Paged-Pool-Overflow-Exploitation](https://github.com/vp777/Windows-Non-Paged-Pool-Overflow-Exploitation) @@ -22219,7 +23398,14 @@ Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique fro - [Airboi/CVE-2020-17144-EXP](https://github.com/Airboi/CVE-2020-17144-EXP) -- [zcgonvh/CVE-2020-17144](https://github.com/zcgonvh/CVE-2020-17144) + +### CVE-2020-17373 (2020-08-12) + + +SugarCRM before 10.1.0 (Q3 2020) allows SQL Injection. + + +- [Live-Hack-CVE/CVE-2020-17373](https://github.com/Live-Hack-CVE/CVE-2020-17373) ### CVE-2020-17382 (2020-10-02) @@ -22314,11 +23500,6 @@ While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25. -- [ka1n4t/CVE-2020-17530](https://github.com/ka1n4t/CVE-2020-17530) -- [wuzuowei/CVE-2020-17530](https://github.com/wuzuowei/CVE-2020-17530) -- [Al1ex/CVE-2020-17530](https://github.com/Al1ex/CVE-2020-17530) -- [fengziHK/CVE-2020-17530-strust2-061](https://github.com/fengziHK/CVE-2020-17530-strust2-061) -- [ludy-dev/freemarker_RCE_struts2_s2-061](https://github.com/ludy-dev/freemarker_RCE_struts2_s2-061) - [CyborgSecurity/CVE-2020-17530](https://github.com/CyborgSecurity/CVE-2020-17530) - [uzzzval/CVE-2020-17530](https://github.com/uzzzval/CVE-2020-17530) - [killmonday/CVE-2020-17530-s2-061](https://github.com/killmonday/CVE-2020-17530-s2-061) @@ -22329,16 +23510,15 @@ Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version. -- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531) - [Live-Hack-CVE/CVE-2020-17531](https://github.com/Live-Hack-CVE/CVE-2020-17531) -### CVE-2020-17533 (2020-12-29) +### CVE-2020-17541 (2021-06-01) -Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties. +Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service. -- [pazeray/CVE-2020-17533](https://github.com/pazeray/CVE-2020-17533) +- [Live-Hack-CVE/CVE-2020-17541](https://github.com/Live-Hack-CVE/CVE-2020-17541) ### CVE-2020-18324 (2022-03-04) @@ -22380,6 +23560,38 @@ Cross Site Scripting (XSS) vulnerability in configMap parameters in Yellowfin Bu - [Deepak983/CVE-2020-19587](https://github.com/Deepak983/CVE-2020-19587) +### CVE-2020-19716 (2021-07-13) + + +A buffer overflow vulnerability in the Databuf function in types.cpp of Exiv2 v0.27.1 leads to a denial of service (DOS). + + +- [Live-Hack-CVE/CVE-2020-19716](https://github.com/Live-Hack-CVE/CVE-2020-19716) + +### CVE-2020-20213 (2021-07-07) + + +Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an stack exhaustion vulnerability in the /nova/bin/net process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. + + +- [Live-Hack-CVE/CVE-2020-20213](https://github.com/Live-Hack-CVE/CVE-2020-20213) + +### CVE-2020-20217 (2021-07-08) + + +Mikrotik RouterOs before 6.47 (stable tree) suffers from an uncontrolled resource consumption vulnerability in the /nova/bin/route process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. + + +- [Live-Hack-CVE/CVE-2020-20217](https://github.com/Live-Hack-CVE/CVE-2020-20217) + +### CVE-2020-20248 (2021-07-19) + + +Mikrotik RouterOs before stable 6.47 suffers from an uncontrolled resource consumption in the memtest process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU. + + +- [Live-Hack-CVE/CVE-2020-20248](https://github.com/Live-Hack-CVE/CVE-2020-20248) + ### CVE-2020-20277 (2020-12-18) @@ -22420,6 +23632,14 @@ A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4. - [MzzdToT/CVE-2020-21224](https://github.com/MzzdToT/CVE-2020-21224) +### CVE-2020-21365 (2022-08-15) + + +Directory traversal vulnerability in wkhtmltopdf through 0.12.5 allows remote attackers to read local files and disclose sensitive information via a crafted html file running with the default configurations. + + +- [Live-Hack-CVE/CVE-2020-21365](https://github.com/Live-Hack-CVE/CVE-2020-21365) + ### CVE-2020-21378 (2020-12-21) @@ -22436,6 +23656,14 @@ libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zs - [Live-Hack-CVE/CVE-2020-21599](https://github.com/Live-Hack-CVE/CVE-2020-21599) +### CVE-2020-21675 (2021-08-10) + + +A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format. + + +- [Live-Hack-CVE/CVE-2020-21675](https://github.com/Live-Hack-CVE/CVE-2020-21675) + ### CVE-2020-21676 (2021-08-10) @@ -22492,6 +23720,22 @@ A global buffer overflow in the put_font in genpict2e.c of fig2dev 3.2.7b allows - [Live-Hack-CVE/CVE-2020-21684](https://github.com/Live-Hack-CVE/CVE-2020-21684) +### CVE-2020-23036 (2021-10-22) + + +MEDIA NAVI Inc SMACom v1.2 was discovered to contain an insecure session validation vulnerability in the session handling of the `password` authentication parameter of the wifi photo transfer module. This vulnerability allows attackers with network access privileges or on public wifi networks to read the authentication credentials and follow-up requests containing the user password via a man in the middle attack. + + +- [Live-Hack-CVE/CVE-2020-23036](https://github.com/Live-Hack-CVE/CVE-2020-23036) + +### CVE-2020-23050 (2021-10-22) + + +TAO Open Source Assessment Platform v3.3.0 RC02 was discovered to contain a HTML injection vulnerability in the userFirstName parameter of the user account input field. This vulnerability allows attackers to execute phishing attacks, external redirects, and arbitrary code. + + +- [Live-Hack-CVE/CVE-2020-23050](https://github.com/Live-Hack-CVE/CVE-2020-23050) + ### CVE-2020-23160 (2021-01-22) @@ -22516,6 +23760,14 @@ The import.json.php file before 8.9 for Avideo is vulnerable to a File Deletion - [ahussam/AVideo3xploit](https://github.com/ahussam/AVideo3xploit) +### CVE-2020-23533 (2021-04-06) + + +Union Pay up to 1.2.0, for web based versions contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability, allows attackers to shop for free in merchants' websites and mobile apps, via a crafted authentication code (MAC) which is generated based on a secret key which is NULL. + + +- [Live-Hack-CVE/CVE-2020-23533](https://github.com/Live-Hack-CVE/CVE-2020-23533) + ### CVE-2020-23582 (2022-11-21) @@ -22708,13 +23960,13 @@ A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 - [meicookies/CVE-2020-24186](https://github.com/meicookies/CVE-2020-24186) - [Sakura-501/CVE-2020-24186-exploit](https://github.com/Sakura-501/CVE-2020-24186-exploit) -### CVE-2020-24227 (2020-11-23) +### CVE-2020-24223 (2020-08-30) -Playground Sessions v2.5.582 (and earlier) for Windows, stores the user credentials in plain text allowing anyone with access to UserProfiles.sol to extract the email and password. +Mara CMS 7.5 allows cross-site scripting (XSS) in contact.php via the theme or pagetheme parameters. -- [nathunandwani/CVE-2020-24227](https://github.com/nathunandwani/CVE-2020-24227) +- [Live-Hack-CVE/CVE-2020-24223](https://github.com/Live-Hack-CVE/CVE-2020-24223) ### CVE-2020-24332 (2020-08-13) @@ -22732,6 +23984,30 @@ Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversa - [Live-Hack-CVE/CVE-2020-24368](https://github.com/Live-Hack-CVE/CVE-2020-24368) +### CVE-2020-24373 (2020-09-16) + + +A CSRF vulnerability in the UPnP MediaServer implementation in Freebox Server before 4.2.3. + + +- [Live-Hack-CVE/CVE-2020-24373](https://github.com/Live-Hack-CVE/CVE-2020-24373) + +### CVE-2020-24374 (2020-09-16) + + +A DNS rebinding vulnerability in Freebox v5 before 1.5.29. + + +- [Live-Hack-CVE/CVE-2020-24374](https://github.com/Live-Hack-CVE/CVE-2020-24374) + +### CVE-2020-24377 (2020-09-16) + + +A DNS rebinding vulnerability in the Freebox OS web interface in Freebox Server before 4.2.3. + + +- [Live-Hack-CVE/CVE-2020-24377](https://github.com/Live-Hack-CVE/CVE-2020-24377) + ### CVE-2020-24379 (2020-09-09) @@ -22776,6 +24052,14 @@ FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction betwee - [Al1ex/CVE-2020-24750](https://github.com/Al1ex/CVE-2020-24750) +### CVE-2020-24771 (2022-03-29) + + +Incorrect access control in NexusPHP 1.5.beta5.20120707 allows unauthorized attackers to access published content. + + +- [Live-Hack-CVE/CVE-2020-24771](https://github.com/Live-Hack-CVE/CVE-2020-24771) + ### CVE-2020-24855 (2022-12-15) @@ -22824,6 +24108,30 @@ Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an aut - [r90tpass/CVE-2020-24949](https://github.com/r90tpass/CVE-2020-24949) +### CVE-2020-24972 (2020-08-29) + + +The Kleopatra component before 3.1.12 (and before 20.07.80) for GnuPG allows remote attackers to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to load an arbitrary DLL. + + +- [Live-Hack-CVE/CVE-2020-24972](https://github.com/Live-Hack-CVE/CVE-2020-24972) + +### CVE-2020-24987 (2020-09-04) + + +Tenda AC18 Router through V15.03.05.05_EN and through V15.03.05.19(6318) CN devices could cause a remote code execution due to incorrect authentication handling of vulnerable logincheck() function in /usr/lib/lua/ngx_authserver/ngx_wdas.lua file if the administrator UI Interface is set to "radius". + + +- [Live-Hack-CVE/CVE-2020-24987](https://github.com/Live-Hack-CVE/CVE-2020-24987) + +### CVE-2020-25015 (2020-09-16) + + +A specific router allows changing the Wi-Fi password remotely. Genexis Platinum 4410 V2-1.28, a compact router generally used at homes and offices was found to be vulnerable to Broken Access Control and CSRF which could be combined to remotely change the WIFI access point’s password. + + +- [Live-Hack-CVE/CVE-2020-25015](https://github.com/Live-Hack-CVE/CVE-2020-25015) + ### CVE-2020-25042 (2020-09-03) @@ -22850,13 +24158,20 @@ An issue was discovered in Observium Professional, Enterprise & Community 20 - [ynsmroztas/CVE-2020-25134](https://github.com/ynsmroztas/CVE-2020-25134) +### CVE-2020-25211 (2020-09-09) + + +In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff. + + +- [Live-Hack-CVE/CVE-2020-25211](https://github.com/Live-Hack-CVE/CVE-2020-25211) + ### CVE-2020-25213 (2020-09-09) The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020. -- [kakamband/WPKiller](https://github.com/kakamband/WPKiller) - [forse01/CVE-2020-25213-Wordpress](https://github.com/forse01/CVE-2020-25213-Wordpress) - [0000000O0Oo/Wordpress-CVE-2020-25213](https://github.com/0000000O0Oo/Wordpress-CVE-2020-25213) - [piruprohacking/CVE-2020-25213](https://github.com/piruprohacking/CVE-2020-25213) @@ -22879,14 +24194,6 @@ An issue was discovered in Hyland OnBase through 18.0.0.32 and 19.x through 19.8 - [Live-Hack-CVE/CVE-2020-25247](https://github.com/Live-Hack-CVE/CVE-2020-25247) -### CVE-2020-25265 (2020-12-02) - - -AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a system-installed .desktop file by providing a .desktop file that contains Name= with path components. - - -- [refi64/CVE-2020-25265-25266](https://github.com/refi64/CVE-2020-25265-25266) - ### CVE-2020-25478 - [santokum/CVE-2020-25478--ASUS-RT-AC87U-TFTP-is-vulnerable-to-Denial-of-Service-DoS-attack](https://github.com/santokum/CVE-2020-25478--ASUS-RT-AC87U-TFTP-is-vulnerable-to-Denial-of-Service-DoS-attack) @@ -22970,7 +24277,7 @@ A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation al A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. -- [brahmiboudjema/CVE-2020-25637-libvirt-double-free](https://github.com/brahmiboudjema/CVE-2020-25637-libvirt-double-free) +- [Live-Hack-CVE/CVE-2020-25637](https://github.com/Live-Hack-CVE/CVE-2020-25637) ### CVE-2020-25638 (2020-12-02) @@ -22988,6 +24295,22 @@ A flaw was found in the Linux kernel's implementation of biovecs in versions bef - [Live-Hack-CVE/CVE-2020-25641](https://github.com/Live-Hack-CVE/CVE-2020-25641) +### CVE-2020-25644 (2020-10-06) + + +A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability. + + +- [Live-Hack-CVE/CVE-2020-25644](https://github.com/Live-Hack-CVE/CVE-2020-25644) + +### CVE-2020-25662 (2020-11-05) + + +A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel's Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality. + + +- [Live-Hack-CVE/CVE-2020-25662](https://github.com/Live-Hack-CVE/CVE-2020-25662) + ### CVE-2020-25685 (2021-01-20) @@ -23004,6 +24327,14 @@ A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq - [knqyf263/dnspooq](https://github.com/knqyf263/dnspooq) +### CVE-2020-25689 (2020-10-30) + + +A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability. + + +- [Live-Hack-CVE/CVE-2020-25689](https://github.com/Live-Hack-CVE/CVE-2020-25689) + ### CVE-2020-25691 (2022-04-01) @@ -23012,15 +24343,38 @@ A flaw was found in darkhttpd. Invalid error handling allows remote attackers to - [Live-Hack-CVE/CVE-2020-25691](https://github.com/Live-Hack-CVE/CVE-2020-25691) +### CVE-2020-25699 (2020-11-19) + + +In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10. + + +- [Live-Hack-CVE/CVE-2020-25699](https://github.com/Live-Hack-CVE/CVE-2020-25699) + ### CVE-2020-25705 (2020-11-16) A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version -- [tdwyer/CVE-2020-25705](https://github.com/tdwyer/CVE-2020-25705) - [nanopathi/linux-4.19.72_CVE-2020-25705](https://github.com/nanopathi/linux-4.19.72_CVE-2020-25705) +### CVE-2020-25711 (2020-12-03) + + +A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role. + + +- [Live-Hack-CVE/CVE-2020-25711](https://github.com/Live-Hack-CVE/CVE-2020-25711) + +### CVE-2020-25718 (2022-02-18) + + +A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. + + +- [Live-Hack-CVE/CVE-2020-25718](https://github.com/Live-Hack-CVE/CVE-2020-25718) + ### CVE-2020-25736 (2021-07-15) @@ -23029,9 +24383,6 @@ Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local pri - [Live-Hack-CVE/CVE-2020-25736](https://github.com/Live-Hack-CVE/CVE-2020-25736) -### CVE-2020-25769 -- [lagartojuancho/CVE-2020-25769](https://github.com/lagartojuancho/CVE-2020-25769) - ### CVE-2020-25782 (2021-01-27) @@ -23047,6 +24398,7 @@ An issue was discovered on Accfly Wireless Security IR Camera 720P System with s - [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790) +- [Live-Hack-CVE/CVE-2020-25790](https://github.com/Live-Hack-CVE/CVE-2020-25790) ### CVE-2020-25860 (2020-12-21) @@ -23064,6 +24416,14 @@ SoPlanning before 1.47 doesn't correctly check the security key used to publicly - [thomasfady/CVE-2020-25867](https://github.com/thomasfady/CVE-2020-25867) +### CVE-2020-26117 (2020-09-26) + + +In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception. + + +- [Live-Hack-CVE/CVE-2020-26117](https://github.com/Live-Hack-CVE/CVE-2020-26117) + ### CVE-2020-26185 (2022-06-01) @@ -23078,7 +24438,6 @@ Dell BSAFE Micro Edition Suite, versions prior to 4.5.1, contain a Buffer Over-R XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14. -- [novysodope/CVE-2020-26217-XStream-RCE-POC](https://github.com/novysodope/CVE-2020-26217-XStream-RCE-POC) - [Al1ex/CVE-2020-26217](https://github.com/Al1ex/CVE-2020-26217) ### CVE-2020-26233 (2020-12-08) @@ -23104,7 +24463,6 @@ XStream is a Java library to serialize objects to XML and back again. In XStream XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories. -- [jas502n/CVE-2020-26259](https://github.com/jas502n/CVE-2020-26259) - [Al1ex/CVE-2020-26259](https://github.com/Al1ex/CVE-2020-26259) ### CVE-2020-26291 (2020-12-30) @@ -23123,6 +24481,14 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro - [Kento-Sec/GitLab-Graphql-CVE-2020-26413](https://github.com/Kento-Sec/GitLab-Graphql-CVE-2020-26413) +### CVE-2020-26558 (2021-05-24) + + +Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. + + +- [Live-Hack-CVE/CVE-2020-26558](https://github.com/Live-Hack-CVE/CVE-2020-26558) + ### CVE-2020-26732 (2021-01-14) @@ -23147,8 +24513,21 @@ Ruckus through 1.5.1.0.21 is affected by remote command injection. An authentica - [htarsoo/CVE-2020-26878](https://github.com/htarsoo/CVE-2020-26878) -### CVE-2020-27190 -- [qlh831/x-CVE-2020-27190](https://github.com/qlh831/x-CVE-2020-27190) +### CVE-2020-26880 (2020-10-07) + + +Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable. + + +- [Live-Hack-CVE/CVE-2020-26880](https://github.com/Live-Hack-CVE/CVE-2020-26880) + +### CVE-2020-26932 (2020-10-10) + + +debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group) + + +- [Live-Hack-CVE/CVE-2020-26932](https://github.com/Live-Hack-CVE/CVE-2020-26932) ### CVE-2020-27194 (2020-10-16) @@ -23199,6 +24578,38 @@ An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authe - [Live-Hack-CVE/CVE-2020-27386](https://github.com/Live-Hack-CVE/CVE-2020-27386) +### CVE-2020-27652 (2020-10-29) + + +Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. + + +- [Live-Hack-CVE/CVE-2020-27652](https://github.com/Live-Hack-CVE/CVE-2020-27652) + +### CVE-2020-27653 (2020-10-29) + + +Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors. + + +- [Live-Hack-CVE/CVE-2020-27653](https://github.com/Live-Hack-CVE/CVE-2020-27653) + +### CVE-2020-27654 (2020-10-29) + + +Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp. + + +- [Live-Hack-CVE/CVE-2020-27654](https://github.com/Live-Hack-CVE/CVE-2020-27654) + +### CVE-2020-27655 (2020-10-29) + + +Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic. + + +- [Live-Hack-CVE/CVE-2020-27655](https://github.com/Live-Hack-CVE/CVE-2020-27655) + ### CVE-2020-27688 (2020-11-05) @@ -23207,6 +24618,14 @@ RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords - [matthiasmaes/CVE-2020-27688](https://github.com/matthiasmaes/CVE-2020-27688) +### CVE-2020-27751 (2020-12-08) + + +A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0. + + +- [Live-Hack-CVE/CVE-2020-27751](https://github.com/Live-Hack-CVE/CVE-2020-27751) + ### CVE-2020-27786 (2020-12-10) @@ -23239,30 +24658,6 @@ A memory corruption issue was addressed with improved input validation. This iss - [FunPhishing/Apple-Safari-Remote-Code-Execution-CVE-2020-27930](https://github.com/FunPhishing/Apple-Safari-Remote-Code-Execution-CVE-2020-27930) -### CVE-2020-27935 (2021-04-02) - - -Multiple issues were addressed with improved logic. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A sandboxed process may be able to circumvent sandbox restrictions. - - -- [LIJI32/SnatchBox](https://github.com/LIJI32/SnatchBox) - -### CVE-2020-27949 (2021-04-02) - - -This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may cause unexpected changes in memory belonging to processes traced by DTrace. - - -- [seemoo-lab/dtrace-memaccess_cve-2020-27949](https://github.com/seemoo-lab/dtrace-memaccess_cve-2020-27949) - -### CVE-2020-27950 (2020-12-08) - - -A memory initialization issue was addressed. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. A malicious application may be able to disclose kernel memory. - - -- [synacktiv/CVE-2020-27950](https://github.com/synacktiv/CVE-2020-27950) - ### CVE-2020-27955 (2020-11-05) @@ -23270,10 +24665,6 @@ Git LFS 2.12.0 allows Remote Code Execution. - [ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955](https://github.com/ExploitBox/git-lfs-RCE-exploit-CVE-2020-27955) -- [yhsung/cve-2020-27955-poc](https://github.com/yhsung/cve-2020-27955-poc) -- [r00t4dm/CVE-2020-27955](https://github.com/r00t4dm/CVE-2020-27955) -- [williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell](https://github.com/williamgoulois/git-lfs-RCE-exploit-CVE-2020-27955-revshell) -- [shubham0d/CVE-2020-27955](https://github.com/shubham0d/CVE-2020-27955) - [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955) - [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955) - [DeeLMind/CVE-2020-27955-LFS](https://github.com/DeeLMind/CVE-2020-27955-LFS) @@ -23310,17 +24701,8 @@ WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Reques An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. -- [madstap/bouncy-castle-generative-test-poc](https://github.com/madstap/bouncy-castle-generative-test-poc) - [kurenaif/CVE-2020-28052_PoC](https://github.com/kurenaif/CVE-2020-28052_PoC) -### CVE-2020-28054 (2020-11-19) - - -JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request. - - -- [VoidSec/Tivoli-Madness](https://github.com/VoidSec/Tivoli-Madness) - ### CVE-2020-28148 - [fengchenzxc/CVE-2020-28148](https://github.com/fengchenzxc/CVE-2020-28148) @@ -23364,14 +24746,6 @@ Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allo - [Live-Hack-CVE/CVE-2020-28271](https://github.com/Live-Hack-CVE/CVE-2020-28271) -### CVE-2020-28328 (2020-11-06) - - -SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root. - - -- [mcorybillington/SuiteCRM-RCE](https://github.com/mcorybillington/SuiteCRM-RCE) - ### CVE-2020-28367 (2020-11-18) @@ -23736,14 +25110,6 @@ A code execution vulnerability exists in the Nef polygon-parsing functionality o - [Live-Hack-CVE/CVE-2020-28636](https://github.com/Live-Hack-CVE/CVE-2020-28636) -### CVE-2020-28647 (2020-11-17) - - -In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS). - - -- [SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647](https://github.com/SECFORCE/Progress-MOVEit-Transfer-2020.1-Stored-XSS-CVE-2020-28647) - ### CVE-2020-28653 (2021-02-03) @@ -23776,7 +25142,6 @@ ReadyMedia (aka MiniDLNA) before versions 1.3.0 allows remote code execution. Se Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. -- [0x240x23elu/CVE-2020-28948-and-CVE-2020-28949](https://github.com/0x240x23elu/CVE-2020-28948-and-CVE-2020-28949) - [nopdata/cve-2020-28948](https://github.com/nopdata/cve-2020-28948) - [JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949](https://github.com/JinHao-L/PoC-for-CVE-2020-28948-CVE-2020-28949) @@ -23788,17 +25153,6 @@ Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blo - [Live-Hack-CVE/CVE-2020-28975](https://github.com/Live-Hack-CVE/CVE-2020-28975) -### CVE-2020-29007 -- [seqred-s-a/cve-2020-29007](https://github.com/seqred-s-a/cve-2020-29007) - -### CVE-2020-29070 (2020-11-25) - - -osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters. - - -- [aslanemre/cve-2020-29070](https://github.com/aslanemre/cve-2020-29070) - ### CVE-2020-29134 (2021-03-05) @@ -23807,14 +25161,6 @@ The TOTVS Fluig platform allows path traversal through the parameter "file - [Ls4ss/CVE-2020-29134](https://github.com/Ls4ss/CVE-2020-29134) -### CVE-2020-29156 (2020-12-27) - - -The WooCommerce plugin before 4.7.0 for WordPress allows remote attackers to view the status of arbitrary orders via the order_id parameter in a fetch_order_status action. - - -- [Ko-kn3t/CVE-2020-29156](https://github.com/Ko-kn3t/CVE-2020-29156) - ### CVE-2020-29254 (2020-12-11) @@ -23823,14 +25169,6 @@ TikiWiki 21.2 allows templates to be edited without CSRF protection. This could - [S1lkys/CVE-2020-29254](https://github.com/S1lkys/CVE-2020-29254) -### CVE-2020-29364 (2020-11-30) - - -In NetArt News Lister 1.0.0, the news headlines vulnerable to stored xss attacks. Attackers can inject codes in news titles. - - -- [aslanemre/CVE-2020-29364](https://github.com/aslanemre/CVE-2020-29364) - ### CVE-2020-29370 (2020-11-28) @@ -23903,30 +25241,6 @@ A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows - [0xAbbarhSF/CVE-2020-29607](https://github.com/0xAbbarhSF/CVE-2020-29607) -### CVE-2020-29666 (2020-12-10) - - -In Lan ATMService M3 ATM Monitoring System 6.1.0, due to a directory-listing vulnerability, a remote attacker can view log files, located in /websocket/logs/, that contain a user's cookie values and the predefined developer's cookie value. - - -- [jet-pentest/CVE-2020-29666](https://github.com/jet-pentest/CVE-2020-29666) - -### CVE-2020-29667 (2020-12-10) - - -In Lan ATMService M3 ATM Monitoring System 6.1.0, a remote attacker able to use a default cookie value, such as PHPSESSID=LANIT-IMANAGER, can achieve control over the system because of Insufficient Session Expiration. - - -- [jet-pentest/CVE-2020-29667](https://github.com/jet-pentest/CVE-2020-29667) - -### CVE-2020-29669 (2020-12-13) - - -In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is able to reset its own password. This process has a vulnerability which can be used to take over the administrator account and results in shell access. As the admin user may read the /etc/shadow file, the password hashes of each user (including root) can be dumped. The root hash can be cracked easily which results in a complete system compromise. - - -- [code-byter/CVE-2020-29669](https://github.com/code-byter/CVE-2020-29669) - ### CVE-2020-35136 (2020-12-23) @@ -23968,6 +25282,14 @@ A remote code execution vulnerability in the installUpdateThemePluginAction func - [ybdegit2020/wonderplugin](https://github.com/ybdegit2020/wonderplugin) - [AkashLingayat/WonderCMS-CVE-2020-35314](https://github.com/AkashLingayat/WonderCMS-CVE-2020-35314) +### CVE-2020-35473 (2022-11-08) + + +An information leakage vulnerability in the Bluetooth Low Energy advertisement scan response in Bluetooth Core Specifications 4.0 through 5.2, and extended scan response in Bluetooth Core Specifications 5.0 through 5.2, may be used to identify devices using Resolvable Private Addressing (RPA) by their response or non-response to specific scan requests from remote addresses. RPAs that have been associated with a specific remote device may also be used to identify a peer in the same manner by using its reaction to an active scan request. This has also been called an allowlist-based side channel. + + +- [Live-Hack-CVE/CVE-2020-35473](https://github.com/Live-Hack-CVE/CVE-2020-35473) + ### CVE-2020-35476 (2020-12-16) @@ -24317,6 +25639,14 @@ libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (ca - [Live-Hack-CVE/CVE-2020-36430](https://github.com/Live-Hack-CVE/CVE-2020-36430) +### CVE-2020-36457 (2021-08-08) + + +An issue was discovered in the lever crate before 0.1.1 for Rust. AtomicBox<T> implements the Send and Sync traits for all types T. + + +- [Live-Hack-CVE/CVE-2020-36457](https://github.com/Live-Hack-CVE/CVE-2020-36457) + ### CVE-2020-36518 (2022-03-11) @@ -24511,7 +25841,6 @@ When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in - [pyn3rd/CVE-2019-0232](https://github.com/pyn3rd/CVE-2019-0232) - [jas502n/CVE-2019-0232](https://github.com/jas502n/CVE-2019-0232) - [cyy95/CVE-2019-0232-EXP](https://github.com/cyy95/CVE-2019-0232-EXP) -- [setrus/CVE-2019-0232](https://github.com/setrus/CVE-2019-0232) - [Nicoslo/Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232-](https://github.com/Nicoslo/Windows-exploitation-Apache-Tomcat-8.5.19-CVE-2019-0232-) - [Nicoslo/Windows-Exploitation-Web-Server-Tomcat-8.5.39-CVE-2019-0232](https://github.com/Nicoslo/Windows-Exploitation-Web-Server-Tomcat-8.5.39-CVE-2019-0232) - [jaiguptanick/CVE-2019-0232](https://github.com/jaiguptanick/CVE-2019-0232) @@ -24619,11 +25948,8 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly - [wdfcc/CVE-2019-0708](https://github.com/wdfcc/CVE-2019-0708) - [cvencoder/cve-2019-0708](https://github.com/cvencoder/cve-2019-0708) - [andripwn/CVE-2019-0708](https://github.com/andripwn/CVE-2019-0708) -- [0xeb-bp/bluekeep](https://github.com/0xeb-bp/bluekeep) -- [fade-vivida/CVE-2019-0708-test](https://github.com/fade-vivida/CVE-2019-0708-test) - [Cyb0r9/ispy](https://github.com/Cyb0r9/ispy) - [lwtz/CVE-2019-0708](https://github.com/lwtz/CVE-2019-0708) -- [ulisesrc/-2-CVE-2019-0708](https://github.com/ulisesrc/-2-CVE-2019-0708) - [worawit/CVE-2019-0708](https://github.com/worawit/CVE-2019-0708) - [cbwang505/CVE-2019-0708-EXP-Windows](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows) - [eastmountyxz/CVE-2019-0708-Windows](https://github.com/eastmountyxz/CVE-2019-0708-Windows) @@ -24697,6 +26023,14 @@ An elevation of privilege vulnerability exists when Windows AppX Deployment Serv - [0x00-0x00/CVE-2019-0841-BYPASS](https://github.com/0x00-0x00/CVE-2019-0841-BYPASS) - [mappl3/CVE-2019-0841](https://github.com/mappl3/CVE-2019-0841) +### CVE-2019-0845 (2019-04-09) + + +A remote code execution vulnerability exists when the IOleCvt interface renders ASP webpage content, aka 'Windows IOleCvt Interface Remote Code Execution Vulnerability'. + + +- [Live-Hack-CVE/CVE-2019-0845](https://github.com/Live-Hack-CVE/CVE-2019-0845) + ### CVE-2019-0859 (2019-04-09) @@ -24858,36 +26192,10 @@ An elevation of privilege vulnerability exists when the Windows AppX Deployment An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'. -- [jas502n/CVE-2019-1388](https://github.com/jas502n/CVE-2019-1388) -- [jaychouzzk/CVE-2019-1388](https://github.com/jaychouzzk/CVE-2019-1388) - [sv3nbeast/CVE-2019-1388](https://github.com/sv3nbeast/CVE-2019-1388) - [nobodyatall648/CVE-2019-1388](https://github.com/nobodyatall648/CVE-2019-1388) - [suprise4u/CVE-2019-1388](https://github.com/suprise4u/CVE-2019-1388) -### CVE-2019-1402 (2019-11-12) - - -An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Information Disclosure Vulnerability'. - - -- [lauxjpn/CorruptQueryAccessWorkaround](https://github.com/lauxjpn/CorruptQueryAccessWorkaround) - -### CVE-2019-1405 (2019-11-12) - - -An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'. - - -- [apt69/COMahawk](https://github.com/apt69/COMahawk) - -### CVE-2019-1422 (2019-11-12) - - -An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1420, CVE-2019-1423. - - -- [ze0r/cve-2019-1422](https://github.com/ze0r/cve-2019-1422) - ### CVE-2019-1458 (2019-12-10) @@ -24899,14 +26207,6 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon - [DreamoneOnly/CVE-2019-1458-malware](https://github.com/DreamoneOnly/CVE-2019-1458-malware) - [Eternit7/CVE-2019-1458](https://github.com/Eternit7/CVE-2019-1458) -### CVE-2019-1476 (2019-12-10) - - -An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1483. - - -- [sgabe/CVE-2019-1476](https://github.com/sgabe/CVE-2019-1476) - ### CVE-2019-1477 (2019-12-10) @@ -25019,7 +26319,6 @@ In ProxyResolverV8::SetPacScript of proxy_resolver_v8.cc, there is a possible me A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 -- [timwr/CVE-2019-2215](https://github.com/timwr/CVE-2019-2215) - [marcinguy/CVE-2019-2215](https://github.com/marcinguy/CVE-2019-2215) - [LIznzn/CVE-2019-2215](https://github.com/LIznzn/CVE-2019-2215) - [DimitriFourny/cve-2019-2215](https://github.com/DimitriFourny/cve-2019-2215) @@ -25065,7 +26364,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [jas502n/cve-2019-2618](https://github.com/jas502n/cve-2019-2618) - [wsfengfan/CVE-2019-2618-](https://github.com/wsfengfan/CVE-2019-2618-) - [dr0op/WeblogicScan](https://github.com/dr0op/WeblogicScan) -- [ianxtianxt/cve-2019-2618](https://github.com/ianxtianxt/cve-2019-2618) - [0xn0ne/weblogicScanner](https://github.com/0xn0ne/weblogicScanner) ### CVE-2019-2725 (2019-04-26) @@ -25087,7 +26385,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [jiansiting/CVE-2019-2725](https://github.com/jiansiting/CVE-2019-2725) - [kerlingcode/CVE-2019-2725](https://github.com/kerlingcode/CVE-2019-2725) - [black-mirror/Weblogic](https://github.com/black-mirror/Weblogic) -- [N0b1e6/CVE-2019-2725-POC](https://github.com/N0b1e6/CVE-2019-2725-POC) - [GGyao/weblogic_2019_2725_wls_batch](https://github.com/GGyao/weblogic_2019_2725_wls_batch) - [ludy-dev/Oracle-WLS-Weblogic-RCE](https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE) - [1stPeak/CVE-2019-2725-environment](https://github.com/1stPeak/CVE-2019-2725-environment) @@ -25102,6 +26399,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar - [ruthlezs/CVE-2019-2729-Exploit](https://github.com/ruthlezs/CVE-2019-2729-Exploit) - [pizza-power/weblogic-CVE-2019-2729-POC](https://github.com/pizza-power/weblogic-CVE-2019-2729-POC) - [Luchoane/CVE-2019-2729_creal](https://github.com/Luchoane/CVE-2019-2729_creal) +- [Live-Hack-CVE/CVE-2019-2729](https://github.com/Live-Hack-CVE/CVE-2019-2729) ### CVE-2019-2890 (2019-10-16) @@ -25109,9 +26407,6 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). -- [SukaraLin/CVE-2019-2890](https://github.com/SukaraLin/CVE-2019-2890) -- [jas502n/CVE-2019-2890](https://github.com/jas502n/CVE-2019-2890) -- [ianxtianxt/CVE-2019-2890](https://github.com/ianxtianxt/CVE-2019-2890) - [zhzhdoai/Weblogic_Vuln](https://github.com/zhzhdoai/Weblogic_Vuln) ### CVE-2019-2938 (2019-10-16) @@ -25146,8 +26441,6 @@ The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 - [quanpt103/CVE-2019-3396](https://github.com/quanpt103/CVE-2019-3396) - [vntest11/confluence_CVE-2019-3396](https://github.com/vntest11/confluence_CVE-2019-3396) - [JonathanZhou348/CVE-2019-3396TEST](https://github.com/JonathanZhou348/CVE-2019-3396TEST) -- [am6539/CVE-2019-3396](https://github.com/am6539/CVE-2019-3396) -- [W2Ning/CVE-2019-3396](https://github.com/W2Ning/CVE-2019-3396) - [yuehanked/cve-2019-3396](https://github.com/yuehanked/cve-2019-3396) - [abdallah-elsharif/cve-2019-3396](https://github.com/abdallah-elsharif/cve-2019-3396) - [46o60/CVE-2019-3396_Confluence](https://github.com/46o60/CVE-2019-3396_Confluence) @@ -25251,6 +26544,30 @@ Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defen - [funoverip/mcafee_atd_CVE-2019-3663](https://github.com/funoverip/mcafee_atd_CVE-2019-3663) +### CVE-2019-3692 (2020-01-24) + + +The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions. + + +- [Live-Hack-CVE/CVE-2019-3692](https://github.com/Live-Hack-CVE/CVE-2019-3692) + +### CVE-2019-3693 (2020-01-24) + + +A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions. + + +- [Live-Hack-CVE/CVE-2019-3693](https://github.com/Live-Hack-CVE/CVE-2019-3693) + +### CVE-2019-3694 (2020-01-24) + + +A Symbolic Link (Symlink) Following vulnerability in the packaging of munin in openSUSE Factory, Leap 15.1 allows local attackers to escalate from user munin to root. This issue affects: openSUSE Factory munin version 2.0.49-4.2 and prior versions. openSUSE Leap 15.1 munin version 2.0.40-lp151.1.1 and prior versions. + + +- [Live-Hack-CVE/CVE-2019-3694](https://github.com/Live-Hack-CVE/CVE-2019-3694) + ### CVE-2019-3719 (2019-04-18) @@ -25268,6 +26585,14 @@ Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0. - [mpgn/CVE-2019-3799](https://github.com/mpgn/CVE-2019-3799) - [Corgizz/SpringCloud](https://github.com/Corgizz/SpringCloud) +### CVE-2019-3804 (2019-03-26) + + +It was found that cockpit before version 184 used glib's base64 decode functionality incorrectly resulting in a denial of service attack. An unauthenticated attacker could send a specially crafted request with an invalid base64-encoded cookie which could cause the web service to crash. + + +- [Live-Hack-CVE/CVE-2019-3804](https://github.com/Live-Hack-CVE/CVE-2019-3804) + ### CVE-2019-3810 (2019-03-25) @@ -25275,6 +26600,15 @@ A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3. - [farisv/Moodle-CVE-2019-3810](https://github.com/farisv/Moodle-CVE-2019-3810) +- [Live-Hack-CVE/CVE-2019-3810](https://github.com/Live-Hack-CVE/CVE-2019-3810) + +### CVE-2019-3816 (2019-03-14) + + +Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server. + + +- [Live-Hack-CVE/CVE-2019-3816](https://github.com/Live-Hack-CVE/CVE-2019-3816) ### CVE-2019-3837 (2019-04-11) @@ -25291,6 +26625,15 @@ A vulnerability was found in moodle before versions 3.6.3, 3.5.5, 3.4.8 and 3.1. - [danielthatcher/moodle-login-csrf](https://github.com/danielthatcher/moodle-login-csrf) +- [Live-Hack-CVE/CVE-2019-3847](https://github.com/Live-Hack-CVE/CVE-2019-3847) + +### CVE-2019-3848 (2019-03-26) + + +A vulnerability was found in moodle before versions 3.6.3, 3.5.5 and 3.4.8. Permissions were not correctly checked before loading event information into the calendar's edit event modal popup, so logged in non-guest users could view unauthorised calendar events. (Note: It was read-only access, users could not edit the events.) + + +- [Live-Hack-CVE/CVE-2019-3848](https://github.com/Live-Hack-CVE/CVE-2019-3848) ### CVE-2019-3876 (2019-04-01) @@ -25300,6 +26643,30 @@ A flaw was found in the /oauth/token/request custom endpoint of the OpenShift OA - [Live-Hack-CVE/CVE-2019-3876](https://github.com/Live-Hack-CVE/CVE-2019-3876) +### CVE-2019-3881 (2020-09-04) + + +Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed. + + +- [Live-Hack-CVE/CVE-2019-3881](https://github.com/Live-Hack-CVE/CVE-2019-3881) + +### CVE-2019-3886 (2019-04-04) + + +An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block. + + +- [Live-Hack-CVE/CVE-2019-3886](https://github.com/Live-Hack-CVE/CVE-2019-3886) + +### CVE-2019-3887 (2019-04-09) + + +A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue. + + +- [Live-Hack-CVE/CVE-2019-3887](https://github.com/Live-Hack-CVE/CVE-2019-3887) + ### CVE-2019-3893 (2019-04-09) @@ -25380,14 +26747,6 @@ Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 allow any - [Live-Hack-CVE/CVE-2019-3928](https://github.com/Live-Hack-CVE/CVE-2019-3928) -### CVE-2019-3929 (2019-04-30) - - -The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root. - - -- [xfox64x/CVE-2019-3929](https://github.com/xfox64x/CVE-2019-3929) - ### CVE-2019-3932 (2019-04-30) @@ -26554,7 +27913,6 @@ There is a File Content Disclosure vulnerability in Action View <5.2.2.1, < - [mpgn/Rails-doubletap-RCE](https://github.com/mpgn/Rails-doubletap-RCE) - [takeokunn/CVE-2019-5418](https://github.com/takeokunn/CVE-2019-5418) - [Bad3r/RailroadBandit](https://github.com/Bad3r/RailroadBandit) -- [random-robbie/CVE-2019-5418](https://github.com/random-robbie/CVE-2019-5418) - [kailing0220/CVE-2019-5418](https://github.com/kailing0220/CVE-2019-5418) ### CVE-2019-5420 (2019-03-27) @@ -26665,14 +28023,6 @@ A Cross-Site Request Forgery (CSRF) vulnerability was found in Rapid7 Nexpose In - [rbeede/CVE-2019-5630](https://github.com/rbeede/CVE-2019-5630) -### CVE-2019-5700 (2019-10-09) - - -NVIDIA Shield TV Experience prior to v8.0.1, NVIDIA Tegra software contains a vulnerability in the bootloader, where it does not validate the fields of the boot image, which may lead to code execution, denial of service, escalation of privileges, and information disclosure. - - -- [oscardagrach/CVE-2019-5700](https://github.com/oscardagrach/CVE-2019-5700) - ### CVE-2019-5736 (2019-02-11) @@ -26693,8 +28043,6 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow - [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp) - [panzouh/Docker-Runc-Exploit](https://github.com/panzouh/Docker-Runc-Exploit) - [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC) -- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc) -- [epsteina16/Docker-Escape-Miner](https://github.com/epsteina16/Docker-Escape-Miner) - [geropl/CVE-2019-5736](https://github.com/geropl/CVE-2019-5736) - [GiverOfGifts/CVE-2019-5736-Custom-Runtime](https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime) - [Billith/CVE-2019-5736-PoC](https://github.com/Billith/CVE-2019-5736-PoC) @@ -26738,14 +28086,6 @@ Inappropriate implementation in Blink in Google Chrome prior to 74.0.3729.108 al - [Silence-Rain/14-828_Exploitation_of_CVE-2019-5822](https://github.com/Silence-Rain/14-828_Exploitation_of_CVE-2019-5822) -### CVE-2019-5825 (2019-11-25) - - -Out of bounds write in JavaScript in Google Chrome prior to 73.0.3683.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. - - -- [timwr/CVE-2019-5825](https://github.com/timwr/CVE-2019-5825) - ### CVE-2019-5893 (2019-01-10) @@ -27027,13 +28367,13 @@ Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS config - [gquere/CVE-2019-6693](https://github.com/gquere/CVE-2019-6693) -### CVE-2019-6715 (2019-04-01) +### CVE-2019-6706 (2019-01-23) -pub/sns.php in the W3 Total Cache plugin before 0.9.4 for WordPress allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data. +Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships. -- [random-robbie/cve-2019-6715](https://github.com/random-robbie/cve-2019-6715) +- [Live-Hack-CVE/CVE-2019-6706](https://github.com/Live-Hack-CVE/CVE-2019-6706) ### CVE-2019-6811 (2019-09-17) @@ -27233,7 +28573,6 @@ Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw - [mpgn/CVE-2019-7609](https://github.com/mpgn/CVE-2019-7609) - [LandGrey/CVE-2019-7609](https://github.com/LandGrey/CVE-2019-7609) -- [hekadan/CVE-2019-7609](https://github.com/hekadan/CVE-2019-7609) - [rhbb/CVE-2019-7609](https://github.com/rhbb/CVE-2019-7609) - [dnr6419/CVE-2019-7609](https://github.com/dnr6419/CVE-2019-7609) - [wolf1892/CVE-2019-7609](https://github.com/wolf1892/CVE-2019-7609) @@ -27371,6 +28710,22 @@ A memory corruption issue was addressed with improved memory handling. This issu - [pattern-f/CVE-2019-8852](https://github.com/pattern-f/CVE-2019-8852) +### CVE-2019-8921 (2021-11-29) + + +An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same. + + +- [Live-Hack-CVE/CVE-2019-8921](https://github.com/Live-Hack-CVE/CVE-2019-8921) + +### CVE-2019-8922 (2021-11-29) + + +A heap-based buffer overflow was discovered in bluetoothd in BlueZ through 5.48. There isn't any check on whether there is enough space in the destination buffer. The function simply appends all data passed to it. The values of all attributes that are requested are appended to the output buffer. There are no size checks whatsoever, resulting in a simple heap overflow if one can craft a request where the response is large enough to overflow the preallocated buffer. This issue exists in service_attr_req gets called by process_request (in sdpd-request.c), which also allocates the response buffer. + + +- [Live-Hack-CVE/CVE-2019-8922](https://github.com/Live-Hack-CVE/CVE-2019-8922) + ### CVE-2019-8936 (2019-05-15) @@ -27623,14 +28978,6 @@ Incorrect access control in the CxUtilSvc component of the Synaptics Sound Devic - [jthuraisamy/CVE-2019-9730](https://github.com/jthuraisamy/CVE-2019-9730) -### CVE-2019-9745 (2019-10-14) - - -CloudCTI HIP Integrator Recognition Configuration Tool allows privilege escalation via its EXQUISE integration. This tool communicates with a service (Recognition Update Client Service) via an insecure communication channel (Named Pipe). The data (JSON) sent via this channel is used to import data from CRM software using plugins (.dll files). The plugin to import data from the EXQUISE software (DatasourceExquiseExporter.dll) can be persuaded to start arbitrary programs (including batch files) that are executed using the same privileges as Recognition Update Client Service (NT AUTHORITY\SYSTEM), thus elevating privileges. This occurs because a higher-privileged process executes scripts from a directory writable by a lower-privileged user. - - -- [KPN-CISO/CVE-2019-9745](https://github.com/KPN-CISO/CVE-2019-9745) - ### CVE-2019-9766 (2019-03-14) @@ -27704,6 +29051,14 @@ In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was rep - [motikan2010/CVE-2019-10092_Docker](https://github.com/motikan2010/CVE-2019-10092_Docker) +### CVE-2019-10135 (2019-07-11) + + +A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files. + + +- [Live-Hack-CVE/CVE-2019-10135](https://github.com/Live-Hack-CVE/CVE-2019-10135) + ### CVE-2019-10149 (2019-06-05) @@ -27719,6 +29074,7 @@ A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation - [Dilshan-Eranda/CVE-2019-10149](https://github.com/Dilshan-Eranda/CVE-2019-10149) - [cloudflare/exim-cve-2019-10149-data](https://github.com/cloudflare/exim-cve-2019-10149-data) - [Stick-U235/CVE-2019-10149-Exploit](https://github.com/Stick-U235/CVE-2019-10149-Exploit) +- [Live-Hack-CVE/CVE-2019-10149](https://github.com/Live-Hack-CVE/CVE-2019-10149) ### CVE-2019-10171 (2019-08-02) @@ -27744,6 +29100,14 @@ PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4 - [Live-Hack-CVE/CVE-2019-10203](https://github.com/Live-Hack-CVE/CVE-2019-10203) +### CVE-2019-10206 (2019-11-22) + + +ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them. + + +- [Live-Hack-CVE/CVE-2019-10206](https://github.com/Live-Hack-CVE/CVE-2019-10206) + ### CVE-2019-10207 (2019-11-25) @@ -27752,6 +29116,14 @@ A flaw was found in the Linux kernel's Bluetooth implementation of UART, all ver - [butterflyhack/CVE-2019-10207](https://github.com/butterflyhack/CVE-2019-10207) +### CVE-2019-10210 (2019-10-29) + + +Postgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via superuser writing password to unprotected temporary file. + + +- [Live-Hack-CVE/CVE-2019-10210](https://github.com/Live-Hack-CVE/CVE-2019-10210) + ### CVE-2019-10220 (2019-11-27) @@ -27826,6 +29198,14 @@ In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or - [Live-Hack-CVE/CVE-2019-10768](https://github.com/Live-Hack-CVE/CVE-2019-10768) +### CVE-2019-10800 (2022-07-13) + + +This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method. + + +- [Live-Hack-CVE/CVE-2019-10800](https://github.com/Live-Hack-CVE/CVE-2019-10800) + ### CVE-2019-10806 (2020-03-09) @@ -27873,12 +29253,8 @@ The D-Link DCS series of Wi-Fi cameras contains a stack-based buffer overflow in In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution. -- [neex/phuip-fpizdam](https://github.com/neex/phuip-fpizdam) - [jas502n/CVE-2019-11043](https://github.com/jas502n/CVE-2019-11043) - [AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-](https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043-) -- [0th3rs-Security-Team/CVE-2019-11043](https://github.com/0th3rs-Security-Team/CVE-2019-11043) -- [k8gege/CVE-2019-11043](https://github.com/k8gege/CVE-2019-11043) -- [moniik/CVE-2019-11043_env](https://github.com/moniik/CVE-2019-11043_env) - [kriskhub/CVE-2019-11043](https://github.com/kriskhub/CVE-2019-11043) - [alokaranasinghe/cve-2019-11043](https://github.com/alokaranasinghe/cve-2019-11043) - [corifeo/CVE-2019-11043](https://github.com/corifeo/CVE-2019-11043) @@ -27943,6 +29319,38 @@ Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthen - [livehybrid/poc-cribl-rce](https://github.com/livehybrid/poc-cribl-rce) +### CVE-2019-11089 (2019-11-14) + + +Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access. + + +- [Live-Hack-CVE/CVE-2019-11089](https://github.com/Live-Hack-CVE/CVE-2019-11089) + +### CVE-2019-11111 (2019-11-14) + + +Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access. + + +- [Live-Hack-CVE/CVE-2019-11111](https://github.com/Live-Hack-CVE/CVE-2019-11111) + +### CVE-2019-11113 (2019-11-14) + + +Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access. + + +- [Live-Hack-CVE/CVE-2019-11113](https://github.com/Live-Hack-CVE/CVE-2019-11113) + +### CVE-2019-11139 (2019-11-14) + + +Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access. + + +- [Live-Hack-CVE/CVE-2019-11139](https://github.com/Live-Hack-CVE/CVE-2019-11139) + ### CVE-2019-11157 (2019-12-16) @@ -28021,6 +29429,14 @@ In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before - [0xDezzy/CVE-2019-11539](https://github.com/0xDezzy/CVE-2019-11539) +### CVE-2019-11556 (2020-09-25) + + +Pagure before 5.6 allows XSS via the templates/blame.html blame view. + + +- [Live-Hack-CVE/CVE-2019-11556](https://github.com/Live-Hack-CVE/CVE-2019-11556) + ### CVE-2019-11580 (2019-06-03) @@ -28035,7 +29451,6 @@ Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin inco There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability. -- [kobs0N/CVE-2019-11581](https://github.com/kobs0N/CVE-2019-11581) - [PetrusViet/CVE-2019-11581](https://github.com/PetrusViet/CVE-2019-11581) ### CVE-2019-11687 (2019-05-02) @@ -28078,6 +29493,14 @@ An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer derefer - [Live-Hack-CVE/CVE-2019-11810](https://github.com/Live-Hack-CVE/CVE-2019-11810) +### CVE-2019-11823 (2020-05-04) + + +CRLF injection vulnerability in Network Center in Synology Router Manager (SRM) before 1.2.3-8017-2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic. + + +- [Live-Hack-CVE/CVE-2019-11823](https://github.com/Live-Hack-CVE/CVE-2019-11823) + ### CVE-2019-11881 (2019-06-10) @@ -28086,15 +29509,6 @@ A vulnerability exists in Rancher 2.1.4 in the login component, where the errorM - [MauroEldritch/VanCleef](https://github.com/MauroEldritch/VanCleef) -### CVE-2019-11931 (2019-11-14) - - -A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100. - - -- [kasif-dekel/whatsapp-rce-patched](https://github.com/kasif-dekel/whatsapp-rce-patched) -- [nop-team/CVE-2019-11931](https://github.com/nop-team/CVE-2019-11931) - ### CVE-2019-11932 (2019-10-03) @@ -28102,9 +29516,7 @@ A double free vulnerability in the DDGifSlurp function in decoding.c in the andr - [dorkerdevil/CVE-2019-11932](https://github.com/dorkerdevil/CVE-2019-11932) -- [awakened1712/CVE-2019-11932](https://github.com/awakened1712/CVE-2019-11932) - [fastmo/CVE-2019-11932](https://github.com/fastmo/CVE-2019-11932) -- [SmoZy92/CVE-2019-11932](https://github.com/SmoZy92/CVE-2019-11932) - [dashtic172/https-github.com-awakened171](https://github.com/dashtic172/https-github.com-awakened171) - [Err0r-ICA/WhatsPayloadRCE](https://github.com/Err0r-ICA/WhatsPayloadRCE) - [starling021/CVE-2019-11932-SupportApp](https://github.com/starling021/CVE-2019-11932-SupportApp) @@ -28180,22 +29592,6 @@ An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS - [falconz/CVE-2019-12189](https://github.com/falconz/CVE-2019-12189) -### CVE-2019-12255 (2019-08-09) - - -Wind River VxWorks has a Buffer Overflow in the TCP component (issue 1 of 4). This is a IPNET security vulnerability: TCP Urgent Pointer = 0 that leads to an integer underflow. - - -- [sud0woodo/Urgent11-Suricata-LUA-scripts](https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts) - -### CVE-2019-12272 (2019-05-23) - - -In OpenWrt LuCI through 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability. - - -- [roguedream/lede-17.01.3](https://github.com/roguedream/lede-17.01.3) - ### CVE-2019-12384 (2019-06-24) @@ -28204,14 +29600,6 @@ FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a va - [MagicZer0/Jackson_RCE-CVE-2019-12384](https://github.com/MagicZer0/Jackson_RCE-CVE-2019-12384) -### CVE-2019-12409 (2019-11-18) - - -The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server. - - -- [jas502n/CVE-2019-12409](https://github.com/jas502n/CVE-2019-12409) - ### CVE-2019-12460 (2019-05-30) @@ -28347,7 +29735,6 @@ The Bobronix JEditor editor before 3.0.6 for Jira allows an attacker to add a UR In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi. -- [KrE80r/webmin_cve-2019-12840_poc](https://github.com/KrE80r/webmin_cve-2019-12840_poc) - [anasbousselham/webminscan](https://github.com/anasbousselham/webminscan) - [zAbuQasem/CVE-2019-12840](https://github.com/zAbuQasem/CVE-2019-12840) - [WizzzStark/CVE-2019-12840.py](https://github.com/WizzzStark/CVE-2019-12840.py) @@ -28360,14 +29747,6 @@ An issue was discovered in zlib_decompress_extra in modules/demux/mkv/util.cpp i - [ahaShiyu/CVE-2019-12874](https://github.com/ahaShiyu/CVE-2019-12874) -### CVE-2019-12890 (2019-06-19) - - -RedwoodHQ 2.5.5 does not require any authentication for database operations, which allows remote attackers to create admin users via a con.automationframework users insert_one call. - - -- [EthicalHCOP/CVE-2019-12890_RedxploitHQ](https://github.com/EthicalHCOP/CVE-2019-12890_RedxploitHQ) - ### CVE-2019-12949 (2019-06-25) @@ -28376,14 +29755,6 @@ In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated ad - [tarantula-team/CVE-2019-12949](https://github.com/tarantula-team/CVE-2019-12949) -### CVE-2019-13024 (2019-07-01) - - -Centreon 18.x before 18.10.6, 19.x before 19.04.3, and Centreon web before 2.8.29 allows the attacker to execute arbitrary system commands by using the value "init_script"-"Monitoring Engine Binary" in main.get.php to insert a arbitrary command into the database, and execute it by calling the vulnerable page www/include/configuration/configGenerate/xml/generateFiles.php (which passes the inserted value to the database to shell_exec without sanitizing it, allowing one to execute system arbitrary commands). - - -- [get-get-get-get/Centreon-RCE](https://github.com/get-get-get-get/Centreon-RCE) - ### CVE-2019-13025 (2019-10-02) @@ -28432,22 +29803,6 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the - [alidnf/CVE-2019-13404](https://github.com/alidnf/CVE-2019-13404) -### CVE-2019-13496 (2019-11-04) - - -One Identity Cloud Access Manager before 8.1.4 Hotfix 1 allows OTP bypass via vectors involving a man in the middle, the One Identity Defender product, and replacing a failed SAML response with a successful SAML response. - - -- [FurqanKhan1/CVE-2019-13496](https://github.com/FurqanKhan1/CVE-2019-13496) - -### CVE-2019-13498 (2019-07-29) - - -One Identity Cloud Access Manager 8.1.3 does not use HTTP Strict Transport Security (HSTS), which may allow man-in-the-middle (MITM) attacks. This issue is fixed in version 8.1.4. - - -- [FurqanKhan1/CVE-2019-13498](https://github.com/FurqanKhan1/CVE-2019-13498) - ### CVE-2019-13633 (2020-10-19) @@ -28544,12 +29899,8 @@ In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can - [CashWilliams/CVE-2019-14287-demo](https://github.com/CashWilliams/CVE-2019-14287-demo) - [shallvhack/Sudo-Security-Bypass-CVE-2019-14287](https://github.com/shallvhack/Sudo-Security-Bypass-CVE-2019-14287) -- [huang919/cve-2019-14287-PPT](https://github.com/huang919/cve-2019-14287-PPT) -- [wenyu1999/sudo-](https://github.com/wenyu1999/sudo-) -- [Sindadziy/cve-2019-14287](https://github.com/Sindadziy/cve-2019-14287) - [Sindayifu/CVE-2019-14287-CVE-2014-6271](https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271) - [CMNatic/Dockerized-CVE-2019-14287](https://github.com/CMNatic/Dockerized-CVE-2019-14287) -- [axax002/sudo-vulnerability-CVE-2019-14287](https://github.com/axax002/sudo-vulnerability-CVE-2019-14287) - [SachinthaDeSilva-cmd/Exploit-CVE-2019-14287](https://github.com/SachinthaDeSilva-cmd/Exploit-CVE-2019-14287) - [HussyCool/CVE-2019-14287-IT18030372-](https://github.com/HussyCool/CVE-2019-14287-IT18030372-) - [ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287](https://github.com/ShianTrish/sudo-Security-Bypass-vulnerability-CVE-2019-14287) @@ -28621,6 +29972,30 @@ An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via - [sec-it/exploit-CVE-2019-14530](https://github.com/sec-it/exploit-CVE-2019-14530) +### CVE-2019-14574 (2019-11-14) + + +Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access. + + +- [Live-Hack-CVE/CVE-2019-14574](https://github.com/Live-Hack-CVE/CVE-2019-14574) + +### CVE-2019-14590 (2019-11-14) + + +Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access. + + +- [Live-Hack-CVE/CVE-2019-14590](https://github.com/Live-Hack-CVE/CVE-2019-14590) + +### CVE-2019-14591 (2019-11-14) + + +Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access. + + +- [Live-Hack-CVE/CVE-2019-14591](https://github.com/Live-Hack-CVE/CVE-2019-14591) + ### CVE-2019-14615 (2020-01-17) @@ -28629,6 +30004,14 @@ Insufficient control flow in certain data structures for some Intel(R) Processor - [HE-Wenjian/iGPU-Leak](https://github.com/HE-Wenjian/iGPU-Leak) +### CVE-2019-14818 (2019-11-14) + + +A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition. + + +- [Live-Hack-CVE/CVE-2019-14818](https://github.com/Live-Hack-CVE/CVE-2019-14818) + ### CVE-2019-14824 (2019-11-08) @@ -28637,6 +30020,14 @@ A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'se - [Live-Hack-CVE/CVE-2019-14824](https://github.com/Live-Hack-CVE/CVE-2019-14824) +### CVE-2019-14825 (2019-11-25) + + +A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.0.9. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. + + +- [Live-Hack-CVE/CVE-2019-14825](https://github.com/Live-Hack-CVE/CVE-2019-14825) + ### CVE-2019-14842 (2019-11-26) @@ -28645,6 +30036,14 @@ Structured reply is a feature of the newstyle NBD protocol allowing the server t - [Live-Hack-CVE/CVE-2019-14842](https://github.com/Live-Hack-CVE/CVE-2019-14842) +### CVE-2019-14855 (2020-03-20) + + +A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18. + + +- [Live-Hack-CVE/CVE-2019-14855](https://github.com/Live-Hack-CVE/CVE-2019-14855) + ### CVE-2019-14870 (2019-12-10) @@ -28653,6 +30052,22 @@ All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before - [Live-Hack-CVE/CVE-2019-14870](https://github.com/Live-Hack-CVE/CVE-2019-14870) +### CVE-2019-14885 (2020-01-23) + + +A flaw was found in the JBoss EAP Vault system in all versions before 7.2.6.GA. Confidential information of the system property's security attribute value is revealed in the JBoss EAP log file when executing a JBoss CLI 'reload' command. This flaw can lead to the exposure of confidential information. + + +- [Live-Hack-CVE/CVE-2019-14885](https://github.com/Live-Hack-CVE/CVE-2019-14885) + +### CVE-2019-14886 (2020-03-05) + + +A vulnerability was found in business-central, as shipped in rhdm-7.5.1 and rhpam-7.5.1, where encoded passwords are stored in errai_security_context. The encoding used for storing the passwords is Base64, not an encryption algorithm, and any recovery of these passwords could lead to user passwords being exposed. + + +- [Live-Hack-CVE/CVE-2019-14886](https://github.com/Live-Hack-CVE/CVE-2019-14886) + ### CVE-2019-14900 (2020-07-06) @@ -28661,6 +30076,14 @@ A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Be - [shanika04/hibernate-orm](https://github.com/shanika04/hibernate-orm) +### CVE-2019-14907 (2020-01-21) + + +All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless). + + +- [Live-Hack-CVE/CVE-2019-14907](https://github.com/Live-Hack-CVE/CVE-2019-14907) + ### CVE-2019-15043 (2019-09-03) @@ -28669,13 +30092,20 @@ In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthentic - [h0ffayyy/CVE-2019-15043](https://github.com/h0ffayyy/CVE-2019-15043) +### CVE-2019-15062 (2019-08-14) + + +An issue was discovered in Dolibarr 11.0.0-alpha. A user can store an IFRAME element (containing a user/card.php CSRF request) in his Linked Files settings page. When visited by the admin, this could completely take over the admin account. (The protection mechanism for CSRF is to check the Referer header; however, because the attack is from one of the application's own settings pages, this mechanism is bypassed.) + + +- [Live-Hack-CVE/CVE-2019-15062](https://github.com/Live-Hack-CVE/CVE-2019-15062) + ### CVE-2019-15107 (2019-08-15) An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability. -- [ianxtianxt/CVE-2019-15107](https://github.com/ianxtianxt/CVE-2019-15107) - [hannob/webminex](https://github.com/hannob/webminex) - [ChakoMoonFish/webmin_CVE-2019-15107](https://github.com/ChakoMoonFish/webmin_CVE-2019-15107) - [cdedmondson/Modified-CVE-2019-15107](https://github.com/cdedmondson/Modified-CVE-2019-15107) @@ -28695,14 +30125,6 @@ An issue was discovered in Webmin <=1.920. The parameter old in password_chan - [lolminerxmrig/CVE-2019-15107](https://github.com/lolminerxmrig/CVE-2019-15107) - [TheAlpha19/MiniExploit](https://github.com/TheAlpha19/MiniExploit) -### CVE-2019-15120 (2019-08-16) - - -The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode. - - -- [h3llraiser/CVE-2019-15120](https://github.com/h3llraiser/CVE-2019-15120) - ### CVE-2019-15126 (2020-02-05) @@ -28741,13 +30163,13 @@ The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.o ### CVE-2019-15231 - [SlizBinksman/THM-Source-CVE-2019-15231](https://github.com/SlizBinksman/THM-Source-CVE-2019-15231) -### CVE-2019-15511 (2019-11-21) +### CVE-2019-15505 (2019-08-23) -An exploitable local privilege escalation vulnerability exists in the GalaxyClientService installed by GOG Galaxy. Due to Improper Access Control, an attacker can send unauthenticated local TCP packets to the service to gain SYSTEM privileges in Windows system where GOG Galaxy software is installed. All GOG Galaxy versions before 1.2.60 and all corresponding versions of GOG Galaxy 2.0 Beta are affected. +drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir). -- [adenkiewicz/CVE-2019-15511](https://github.com/adenkiewicz/CVE-2019-15511) +- [Live-Hack-CVE/CVE-2019-15505](https://github.com/Live-Hack-CVE/CVE-2019-15505) ### CVE-2019-15514 (2019-08-23) @@ -28765,6 +30187,14 @@ There is an OS Command Injection in Nexus Repository Manager <= 2.14.14 (bypa - [lyy289065406/CVE-2019-15588](https://github.com/lyy289065406/CVE-2019-15588) +### CVE-2019-15604 (2020-02-07) + + +Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate + + +- [Live-Hack-CVE/CVE-2019-15604](https://github.com/Live-Hack-CVE/CVE-2019-15604) + ### CVE-2019-15605 (2020-02-07) @@ -28772,6 +30202,7 @@ HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delive - [jlcarruda/node-poc-http-smuggling](https://github.com/jlcarruda/node-poc-http-smuggling) +- [Live-Hack-CVE/CVE-2019-15605](https://github.com/Live-Hack-CVE/CVE-2019-15605) ### CVE-2019-15642 (2019-08-26) @@ -28781,6 +30212,14 @@ rpc.cgi in Webmin through 1.920 allows authenticated Remote Code Execution via a - [trhacknon/CVE-2019-15642](https://github.com/trhacknon/CVE-2019-15642) +### CVE-2019-15691 (2019-12-26) + + +TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. + + +- [Live-Hack-CVE/CVE-2019-15691](https://github.com/Live-Hack-CVE/CVE-2019-15691) + ### CVE-2019-15813 (2019-09-04) @@ -28797,22 +30236,6 @@ admin/includes/class.import.snippet.php in the "Woody ad snippets" plu - [orangmuda/CVE-2019-15858](https://github.com/orangmuda/CVE-2019-15858) -### CVE-2019-15972 (2019-11-25) - - -A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database. - - -- [FSecureLABS/Cisco-UCM-SQLi-Scripts](https://github.com/FSecureLABS/Cisco-UCM-SQLi-Scripts) - -### CVE-2019-16097 (2019-09-08) - - -core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP. - - -- [luckybool1020/CVE-2019-16097](https://github.com/luckybool1020/CVE-2019-16097) - ### CVE-2019-16113 (2019-09-08) @@ -28837,6 +30260,14 @@ sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_ - [Live-Hack-CVE/CVE-2019-16167](https://github.com/Live-Hack-CVE/CVE-2019-16167) +### CVE-2019-16197 (2019-09-16) + + +In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS. + + +- [Live-Hack-CVE/CVE-2019-16197](https://github.com/Live-Hack-CVE/CVE-2019-16197) + ### CVE-2019-16278 (2019-10-14) @@ -28844,8 +30275,6 @@ Directory Traversal in the function http_verify in nostromo nhttpd through 1.9.6 - [ianxtianxt/CVE-2019-16278](https://github.com/ianxtianxt/CVE-2019-16278) -- [AnubisSec/CVE-2019-16278](https://github.com/AnubisSec/CVE-2019-16278) -- [theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE](https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE) - [Kr0ff/cve-2019-16278](https://github.com/Kr0ff/cve-2019-16278) - [NHPT/CVE-2019-16278](https://github.com/NHPT/CVE-2019-16278) - [keshiba/cve-2019-16278](https://github.com/keshiba/cve-2019-16278) @@ -28892,21 +30321,37 @@ An issue was discovered in ConnectWise Control (formerly known as ScreenConnect) - [czz/ScreenConnect-UserEnum](https://github.com/czz/ScreenConnect-UserEnum) -### CVE-2019-16662 (2019-10-28) +### CVE-2019-16685 (2019-09-27) -An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution. +Dolibarr 9.0.5 has stored XSS vulnerability via a User Group Description section to card.php. A user with the "Create/modify other users, groups and permissions" privilege can inject script and can also achieve privilege escalation. -- [mhaskar/CVE-2019-16662](https://github.com/mhaskar/CVE-2019-16662) +- [Live-Hack-CVE/CVE-2019-16685](https://github.com/Live-Hack-CVE/CVE-2019-16685) -### CVE-2019-16663 (2019-10-28) +### CVE-2019-16686 (2019-09-27) -An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution. +Dolibarr 9.0.5 has stored XSS in a User Note section to note.php. A user with no privileges can inject script to attack the admin. -- [mhaskar/CVE-2019-16663](https://github.com/mhaskar/CVE-2019-16663) +- [Live-Hack-CVE/CVE-2019-16686](https://github.com/Live-Hack-CVE/CVE-2019-16686) + +### CVE-2019-16687 (2019-09-27) + + +Dolibarr 9.0.5 has stored XSS in a User Profile in a Signature section to card.php. A user with the "Create/modify other users, groups and permissions" privilege can inject script and can also achieve privilege escalation. + + +- [Live-Hack-CVE/CVE-2019-16687](https://github.com/Live-Hack-CVE/CVE-2019-16687) + +### CVE-2019-16688 (2019-09-27) + + +Dolibarr 9.0.5 has stored XSS in an Email Template section to mails_templates.php. A user with no privileges can inject script to attack the admin. (This stored XSS can affect all types of user privilege from Admin to users with no permissions.) + + +- [Live-Hack-CVE/CVE-2019-16688](https://github.com/Live-Hack-CVE/CVE-2019-16688) ### CVE-2019-16759 (2019-09-24) @@ -28973,6 +30418,7 @@ Incorrect alias information in IonMonkey JIT compiler for setting array elements - [maxpl0it/CVE-2019-17026-Exploit](https://github.com/maxpl0it/CVE-2019-17026-Exploit) - [lsw29475/CVE-2019-17026](https://github.com/lsw29475/CVE-2019-17026) +- [Live-Hack-CVE/CVE-2019-17026](https://github.com/Live-Hack-CVE/CVE-2019-17026) ### CVE-2019-17041 (2019-10-07) @@ -29069,14 +30515,6 @@ SugarCRM before 8.0.4 and 9.x before 9.0.2 allows PHP object injection in the Up - [Live-Hack-CVE/CVE-2019-17317](https://github.com/Live-Hack-CVE/CVE-2019-17317) -### CVE-2019-17424 (2019-10-22) - - -A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file. - - -- [guywhataguy/CVE-2019-17424](https://github.com/guywhataguy/CVE-2019-17424) - ### CVE-2019-17427 (2019-10-09) @@ -29161,6 +30599,14 @@ Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserializat - [HynekPetrak/log4shell-finder](https://github.com/HynekPetrak/log4shell-finder) - [Live-Hack-CVE/CVE-2019-17571](https://github.com/Live-Hack-CVE/CVE-2019-17571) +### CVE-2019-17576 (2019-10-16) + + +An issue was discovered in Dolibarr 10.0.2. It has XSS via the "outgoing email setup" feature in the /admin/mails.php?action=edit URI via the "Send all emails to (instead of real recipients, for test purposes)" field. + + +- [Live-Hack-CVE/CVE-2019-17576](https://github.com/Live-Hack-CVE/CVE-2019-17576) + ### CVE-2019-17577 (2019-10-16) @@ -29169,6 +30615,14 @@ An issue was discovered in Dolibarr 10.0.2. It has XSS via the "outgoing em - [Live-Hack-CVE/CVE-2019-17577](https://github.com/Live-Hack-CVE/CVE-2019-17577) +### CVE-2019-17578 (2019-10-16) + + +An issue was discovered in Dolibarr 10.0.2. It has XSS via the "outgoing email setup" feature in the admin/mails.php?action=edit URI via the "Sender email for automatic emails (default value in php.ini: Undefined)" field. + + +- [Live-Hack-CVE/CVE-2019-17578](https://github.com/Live-Hack-CVE/CVE-2019-17578) + ### CVE-2019-17621 (2019-12-30) @@ -29222,6 +30676,14 @@ ThinVNC 1.0b1 is vulnerable to arbitrary file read, which leads to a compromise - [Tamagaft/CVE-2019-17662](https://github.com/Tamagaft/CVE-2019-17662) - [bl4ck574r/CVE-2019-17662](https://github.com/bl4ck574r/CVE-2019-17662) +### CVE-2019-17670 (2019-10-17) + + +WordPress before 5.2.4 has a Server Side Request Forgery (SSRF) vulnerability because Windows paths are mishandled during certain validation of relative URLs. + + +- [Live-Hack-CVE/CVE-2019-17670](https://github.com/Live-Hack-CVE/CVE-2019-17670) + ### CVE-2019-17671 (2019-10-17) @@ -29230,6 +30692,14 @@ In WordPress before 5.2.4, unauthenticated viewing of certain content is possibl - [rhbb/CVE-2019-17671](https://github.com/rhbb/CVE-2019-17671) +### CVE-2019-18218 (2019-10-21) + + +cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write). + + +- [Live-Hack-CVE/CVE-2019-18218](https://github.com/Live-Hack-CVE/CVE-2019-18218) + ### CVE-2019-18265 (2022-11-30) @@ -29354,14 +30824,6 @@ The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow loca - [Exploitables/CVE-2019-18845](https://github.com/Exploitables/CVE-2019-18845) -### CVE-2019-18873 (2019-11-11) - - -FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the payload will execute. This will allow for PHP files to be written to the web root, and for code to execute on the remote server. The problem is in admsession.php and admuser.php. - - -- [fuzzlove/FUDforum-XSS-RCE](https://github.com/fuzzlove/FUDforum-XSS-RCE) - ### CVE-2019-18885 (2019-11-14) @@ -29386,6 +30848,30 @@ A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt - [Live-Hack-CVE/CVE-2019-18897](https://github.com/Live-Hack-CVE/CVE-2019-18897) +### CVE-2019-18898 (2020-01-23) + + +UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1. + + +- [Live-Hack-CVE/CVE-2019-18898](https://github.com/Live-Hack-CVE/CVE-2019-18898) + +### CVE-2019-18899 (2020-01-23) + + +The apt-cacher-ng package of openSUSE Leap 15.1 runs operations in user owned directory /run/apt-cacher-ng with root privileges. This can allow local attackers to influence the outcome of these operations. This issue affects: openSUSE Leap 15.1 apt-cacher-ng versions prior to 3.1-lp151.3.3.1. + + +- [Live-Hack-CVE/CVE-2019-18899](https://github.com/Live-Hack-CVE/CVE-2019-18899) + +### CVE-2019-18901 (2020-03-02) + + +A UNIX Symbolic Link (Symlink) Following vulnerability in the mysql-systemd-helper of the mariadb packaging of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows local attackers to change the permissions of arbitrary files to 0640. This issue affects: SUSE Linux Enterprise Server 12 mariadb versions prior to 10.2.31-3.25.1. SUSE Linux Enterprise Server 15 mariadb versions prior to 10.2.31-3.26.1. + + +- [Live-Hack-CVE/CVE-2019-18901](https://github.com/Live-Hack-CVE/CVE-2019-18901) + ### CVE-2019-18906 (2021-06-30) @@ -29428,22 +30914,77 @@ TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access cont - [reversebrain/CVE-2019-18988](https://github.com/reversebrain/CVE-2019-18988) - [mr-r3b00t/CVE-2019-18988](https://github.com/mr-r3b00t/CVE-2019-18988) -### CVE-2019-19012 (2019-11-16) +### CVE-2019-19044 (2019-11-18) -An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression. +Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762. -- [ManhNDd/CVE-2019-19012](https://github.com/ManhNDd/CVE-2019-19012) -- [tarantula-team/CVE-2019-19012](https://github.com/tarantula-team/CVE-2019-19012) +- [Live-Hack-CVE/CVE-2019-19044](https://github.com/Live-Hack-CVE/CVE-2019-19044) -### CVE-2019-19033 (2019-11-21) +### CVE-2019-19051 (2019-11-18) -Jalios JCMS 10 allows attackers to access any part of the website and the WebDAV server with administrative privileges via a backdoor account, by using any username and the hardcoded dev password. +A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7. -- [ricardojoserf/CVE-2019-19033](https://github.com/ricardojoserf/CVE-2019-19033) +- [Live-Hack-CVE/CVE-2019-19051](https://github.com/Live-Hack-CVE/CVE-2019-19051) + +### CVE-2019-19052 (2019-11-18) + + +A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486. + + +- [Live-Hack-CVE/CVE-2019-19052](https://github.com/Live-Hack-CVE/CVE-2019-19052) + +### CVE-2019-19053 (2019-11-18) + + +A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2. + + +- [Live-Hack-CVE/CVE-2019-19053](https://github.com/Live-Hack-CVE/CVE-2019-19053) + +### CVE-2019-19054 (2019-11-18) + + +A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b. + + +- [Live-Hack-CVE/CVE-2019-19054](https://github.com/Live-Hack-CVE/CVE-2019-19054) + +### CVE-2019-19057 (2019-11-18) + + +Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e. + + +- [Live-Hack-CVE/CVE-2019-19057](https://github.com/Live-Hack-CVE/CVE-2019-19057) + +### CVE-2019-19060 (2019-11-18) + + +A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41. + + +- [Live-Hack-CVE/CVE-2019-19060](https://github.com/Live-Hack-CVE/CVE-2019-19060) + +### CVE-2019-19061 (2019-11-18) + + +A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3. + + +- [Live-Hack-CVE/CVE-2019-19061](https://github.com/Live-Hack-CVE/CVE-2019-19061) + +### CVE-2019-19063 (2019-11-18) + + +Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113. + + +- [Live-Hack-CVE/CVE-2019-19063](https://github.com/Live-Hack-CVE/CVE-2019-19063) ### CVE-2019-19203 (2019-11-21) @@ -29451,7 +30992,6 @@ Jalios JCMS 10 allows attackers to access any part of the website and the WebDAV An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read. -- [ManhNDd/CVE-2019-19203](https://github.com/ManhNDd/CVE-2019-19203) - [tarantula-team/CVE-2019-19203](https://github.com/tarantula-team/CVE-2019-19203) ### CVE-2019-19204 (2019-11-21) @@ -29460,9 +31000,16 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb180 An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. -- [ManhNDd/CVE-2019-19204](https://github.com/ManhNDd/CVE-2019-19204) - [tarantula-team/CVE-2019-19204](https://github.com/tarantula-team/CVE-2019-19204) +### CVE-2019-19206 (2019-11-26) + + +Dolibarr CRM/ERP 10.0.3 allows viewimage.php?file= Stored XSS due to JavaScript execution in an SVG image for a profile picture. + + +- [Live-Hack-CVE/CVE-2019-19206](https://github.com/Live-Hack-CVE/CVE-2019-19206) + ### CVE-2019-19221 (2019-11-21) @@ -29479,9 +31026,6 @@ An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, - [hessandrew/CVE-2019-19231](https://github.com/hessandrew/CVE-2019-19231) -### CVE-2019-19268 -- [TheCyberGeek/CVE-2019-19268](https://github.com/TheCyberGeek/CVE-2019-19268) - ### CVE-2019-19300 (2020-04-14) @@ -29579,29 +31123,12 @@ The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Executi ### CVE-2019-19633 - [jra89/CVE-2019-19633](https://github.com/jra89/CVE-2019-19633) -### CVE-2019-19634 (2019-12-17) - - -class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4, as used in the K2 extension for Joomla! and other products, omits .pht from the set of dangerous file extensions, a similar issue to CVE-2019-19576. - - -- [jra89/CVE-2019-19634](https://github.com/jra89/CVE-2019-19634) - -### CVE-2019-19651 -- [jra89/CVE-2019-19651](https://github.com/jra89/CVE-2019-19651) - -### CVE-2019-19652 -- [jra89/CVE-2019-19652](https://github.com/jra89/CVE-2019-19652) - ### CVE-2019-19653 - [jra89/CVE-2019-19653](https://github.com/jra89/CVE-2019-19653) ### CVE-2019-19654 - [jra89/CVE-2019-19654](https://github.com/jra89/CVE-2019-19654) -### CVE-2019-19658 -- [jra89/CVE-2019-19658](https://github.com/jra89/CVE-2019-19658) - ### CVE-2019-19699 (2020-04-06) @@ -29618,14 +31145,6 @@ sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c. - [Live-Hack-CVE/CVE-2019-19725](https://github.com/Live-Hack-CVE/CVE-2019-19725) -### CVE-2019-19732 (2019-12-30) - - -translation_manage_text.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.3 directly insert values from the aSortDir_0 and/or sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. - - -- [jra89/CVE-2019-19732](https://github.com/jra89/CVE-2019-19732) - ### CVE-2019-19733 (2019-12-30) @@ -29634,14 +31153,6 @@ _get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in - [jra89/CVE-2019-19733](https://github.com/jra89/CVE-2019-19733) -### CVE-2019-19734 (2019-12-30) - - -_account_move_file_in_folder.ajax.php in MFScripts YetiShare 3.5.2 directly inserts values from the fileIds parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. - - -- [jra89/CVE-2019-19734](https://github.com/jra89/CVE-2019-19734) - ### CVE-2019-19735 (2019-12-30) @@ -29775,6 +31286,14 @@ uhttpd in OpenWrt through 18.06.5 and 19.x through 19.07.0-rc2 has an integer si - [delicateByte/CVE-2019-19945_Test](https://github.com/delicateByte/CVE-2019-19945_Test) +### CVE-2019-19947 (2019-12-23) + + +In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c. + + +- [Live-Hack-CVE/CVE-2019-19947](https://github.com/Live-Hack-CVE/CVE-2019-19947) + ### CVE-2019-19966 (2019-12-24) @@ -29864,6 +31383,46 @@ NGINX before 1.17.7, with certain error_page configurations, allows HTTP request - [vuongnv3389-sec/CVE-2019-20372](https://github.com/vuongnv3389-sec/CVE-2019-20372) +### CVE-2019-20434 (2020-01-27) + + +An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Datasource creation page of the Management Console. + + +- [Live-Hack-CVE/CVE-2019-20434](https://github.com/Live-Hack-CVE/CVE-2019-20434) + +### CVE-2019-20435 (2020-01-27) + + +An issue was discovered in WSO2 API Manager 2.6.0. A reflected XSS attack could be performed in the inline API documentation editor page of the API Publisher by sending an HTTP GET request with a harmful docName request parameter. + + +- [Live-Hack-CVE/CVE-2019-20435](https://github.com/Live-Hack-CVE/CVE-2019-20435) + +### CVE-2019-20436 (2020-01-27) + + +An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. If there is a claim dialect configured with an XSS payload in the dialect URI, and a user picks up this dialect's URI and adds it as the service provider claim dialect while configuring the service provider, that payload gets executed. The attacker also needs to have privileges to log in to the management console, and to add and configure claim dialects. + + +- [Live-Hack-CVE/CVE-2019-20436](https://github.com/Live-Hack-CVE/CVE-2019-20436) + +### CVE-2019-20437 (2020-01-27) + + +An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. When a custom claim dialect with an XSS payload is configured in the identity provider basic claim configuration, that payload gets executed, if a user picks up that dialect's URI as the provisioning claim in the advanced claim configuration of the same Identity Provider. The attacker also needs to have privileges to log in to the management console, and to add and update identity provider configurations. + + +- [Live-Hack-CVE/CVE-2019-20437](https://github.com/Live-Hack-CVE/CVE-2019-20437) + +### CVE-2019-20439 (2020-01-27) + + +An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in defining a scope in the "manage the API" page of the API Publisher. + + +- [Live-Hack-CVE/CVE-2019-20439](https://github.com/Live-Hack-CVE/CVE-2019-20439) + ### CVE-2019-20446 (2020-02-02) @@ -29872,6 +31431,14 @@ In xml.rs in GNOME librsvg before 2.46.2, a crafted SVG file with nested pattern - [Live-Hack-CVE/CVE-2019-20446](https://github.com/Live-Hack-CVE/CVE-2019-20446) +### CVE-2019-20790 (2020-04-27) + + +OpenDMARC through 1.3.2 and 1.4.x, when used with pypolicyd-spf 2.0.2, allows attacks that bypass SPF and DMARC authentication in situations where the HELO field is inconsistent with the MAIL FROM field. + + +- [Live-Hack-CVE/CVE-2019-20790](https://github.com/Live-Hack-CVE/CVE-2019-20790) + ### CVE-2019-20798 (2020-05-17) @@ -29936,6 +31503,14 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier - [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION) - [purple-WL/Jenkins_CVE-2019-1003000](https://github.com/purple-WL/Jenkins_CVE-2019-1003000) +### CVE-2019-1010016 (2019-07-14) + + +Dolibarr 6.0.4 is affected by: Cross Site Scripting (XSS). The impact is: Cookie stealing. The component is: htdocs/product/stats/card.php. The attack vector is: Victim must click a specially crafted link sent by the attacker. + + +- [Live-Hack-CVE/CVE-2019-1010016](https://github.com/Live-Hack-CVE/CVE-2019-1010016) + ### CVE-2019-1010054 (2019-07-18) @@ -29943,6 +31518,7 @@ Dolibarr 7.0.0 is affected by: Cross Site Request Forgery (CSRF). The impact is: - [chaizeg/CSRF-breach](https://github.com/chaizeg/CSRF-breach) +- [Live-Hack-CVE/CVE-2019-1010054](https://github.com/Live-Hack-CVE/CVE-2019-1010054) ### CVE-2019-1010065 (2019-07-18) @@ -30474,6 +32050,14 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar ### CVE-2018-3260 - [ionescu007/SpecuCheck](https://github.com/ionescu007/SpecuCheck) +### CVE-2018-3282 (2018-10-16) + + +Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). + + +- [Live-Hack-CVE/CVE-2018-3282](https://github.com/Live-Hack-CVE/CVE-2018-3282) + ### CVE-2018-3284 (2018-10-16) @@ -31310,6 +32894,14 @@ Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editin - [pradeepjairamani/WolfCMS-XSS-POC](https://github.com/pradeepjairamani/WolfCMS-XSS-POC) +### CVE-2018-6891 (2018-02-11) + + +Bookly #1 WordPress Booking Plugin Lite before 14.5 has XSS via a jQuery.ajax request to ng-payment_details_dialog.js. + + +- [Live-Hack-CVE/CVE-2018-6891](https://github.com/Live-Hack-CVE/CVE-2018-6891) + ### CVE-2018-6892 (2018-02-11) @@ -32379,6 +33971,14 @@ Buffer overflow in OPC UA applications allows remote attackers to trigger a stac - [kevinherron/stack-overflow-poc](https://github.com/kevinherron/stack-overflow-poc) +### CVE-2018-12207 (2019-11-14) + + +Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. + + +- [Live-Hack-CVE/CVE-2018-12207](https://github.com/Live-Hack-CVE/CVE-2018-12207) + ### CVE-2018-12326 (2018-06-17) @@ -32552,6 +34152,14 @@ The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 all - [shinecome/zip](https://github.com/shinecome/zip) +### CVE-2018-13447 (2018-07-08) + + +SQL injection vulnerability in product/card.php in Dolibarr ERP/CRM version 7.0.3 allows remote attackers to execute arbitrary SQL commands via the statut parameter. + + +- [Live-Hack-CVE/CVE-2018-13447](https://github.com/Live-Hack-CVE/CVE-2018-13447) + ### CVE-2018-13784 (2018-07-09) @@ -33526,6 +35134,46 @@ The Goodix GT9xx touchscreen driver for custom Linux kernels on Xiaomi daisy-o-o - [Live-Hack-CVE/CVE-2018-19939](https://github.com/Live-Hack-CVE/CVE-2018-19939) +### CVE-2018-19950 (2020-11-02) + + +If exploited, this command injection vulnerability could allow remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. + + +- [Live-Hack-CVE/CVE-2018-19950](https://github.com/Live-Hack-CVE/CVE-2018-19950) + +### CVE-2018-19951 (2020-11-02) + + +If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Music Station versions prior to 5.1.13; versions prior to 5.2.9; versions prior to 5.3.11. + + +- [Live-Hack-CVE/CVE-2018-19951](https://github.com/Live-Hack-CVE/CVE-2018-19951) + +### CVE-2018-19954 (2020-11-02) + + +The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. + + +- [Live-Hack-CVE/CVE-2018-19954](https://github.com/Live-Hack-CVE/CVE-2018-19954) + +### CVE-2018-19955 (2020-11-02) + + +The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. + + +- [Live-Hack-CVE/CVE-2018-19955](https://github.com/Live-Hack-CVE/CVE-2018-19955) + +### CVE-2018-19956 (2020-11-02) + + +The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. + + +- [Live-Hack-CVE/CVE-2018-19956](https://github.com/Live-Hack-CVE/CVE-2018-19956) + ### CVE-2018-19987 (2019-05-13) @@ -33534,6 +35182,38 @@ D-Link DIR-822 Rev.B 202KRb06, DIR-822 Rev.C 3.10B06, DIR-860L Rev.B 2.03.B03, D - [nahueldsanchez/blogpost_cve-2018-19987-analysis](https://github.com/nahueldsanchez/blogpost_cve-2018-19987-analysis) +### CVE-2018-19993 (2019-01-03) + + +A reflected cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote attackers to inject arbitrary web script or HTML via the transphrase parameter to public/notice.php. + + +- [Live-Hack-CVE/CVE-2018-19993](https://github.com/Live-Hack-CVE/CVE-2018-19993) + +### CVE-2018-19994 (2019-01-03) + + +An error-based SQL injection vulnerability in product/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the desiredstock parameter. + + +- [Live-Hack-CVE/CVE-2018-19994](https://github.com/Live-Hack-CVE/CVE-2018-19994) + +### CVE-2018-19995 (2019-01-03) + + +A stored cross-site scripting (XSS) vulnerability in Dolibarr 8.0.2 allows remote authenticated users to inject arbitrary web script or HTML via the "address" (POST) or "town" (POST) parameter to user/card.php. + + +- [Live-Hack-CVE/CVE-2018-19995](https://github.com/Live-Hack-CVE/CVE-2018-19995) + +### CVE-2018-19998 (2019-01-03) + + +SQL injection vulnerability in user/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the employee parameter. + + +- [Live-Hack-CVE/CVE-2018-19998](https://github.com/Live-Hack-CVE/CVE-2018-19998) + ### CVE-2018-20062 (2018-12-11) @@ -33600,6 +35280,14 @@ Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build - [Alexandre-Bartel/CVE-2018-20343](https://github.com/Alexandre-Bartel/CVE-2018-20343) +### CVE-2018-20432 (2020-09-14) + + +D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration. + + +- [Live-Hack-CVE/CVE-2018-20432](https://github.com/Live-Hack-CVE/CVE-2018-20432) + ### CVE-2018-20433 (2018-12-24) @@ -34212,6 +35900,14 @@ An exploitable code execution vulnerability exists in the trapper command functi - [listenquiet/cve-2017-2824-reverse-shell](https://github.com/listenquiet/cve-2017-2824-reverse-shell) +### CVE-2017-2926 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2926](https://github.com/Live-Hack-CVE/CVE-2017-2926) + ### CVE-2017-2928 (2017-01-10) @@ -34236,6 +35932,54 @@ Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory co - [Live-Hack-CVE/CVE-2017-2931](https://github.com/Live-Hack-CVE/CVE-2017-2931) +### CVE-2017-2932 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript MovieClip class. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2932](https://github.com/Live-Hack-CVE/CVE-2017-2932) + +### CVE-2017-2933 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability related to texture compression. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2933](https://github.com/Live-Hack-CVE/CVE-2017-2933) + +### CVE-2017-2934 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when parsing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2934](https://github.com/Live-Hack-CVE/CVE-2017-2934) + +### CVE-2017-2935 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing the Flash Video container file format. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2935](https://github.com/Live-Hack-CVE/CVE-2017-2935) + +### CVE-2017-2936 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2936](https://github.com/Live-Hack-CVE/CVE-2017-2936) + +### CVE-2017-2937 (2017-01-10) + + +Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-2937](https://github.com/Live-Hack-CVE/CVE-2017-2937) + ### CVE-2017-2938 (2017-01-10) @@ -34373,6 +36117,22 @@ Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory co - [homjxi0e/CVE-2017-3078](https://github.com/homjxi0e/CVE-2017-3078) +### CVE-2017-3085 (2017-08-11) + + +Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect. + + +- [Live-Hack-CVE/CVE-2017-3085](https://github.com/Live-Hack-CVE/CVE-2017-3085) + +### CVE-2017-3106 (2017-08-11) + + +Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2017-3106](https://github.com/Live-Hack-CVE/CVE-2017-3106) + ### CVE-2017-3143 (2019-01-16) @@ -35026,6 +36786,30 @@ In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read o - [snknritr/CVE-2017-7679-in-python](https://github.com/snknritr/CVE-2017-7679-in-python) +### CVE-2017-7886 (2017-05-10) + + +Dolibarr ERP/CRM 4.0.4 has SQL Injection in doli/theme/eldy/style.css.php via the lang parameter. + + +- [Live-Hack-CVE/CVE-2017-7886](https://github.com/Live-Hack-CVE/CVE-2017-7886) + +### CVE-2017-7887 (2017-05-10) + + +Dolibarr ERP/CRM 4.0.4 has XSS in doli/societe/list.php via the sall parameter. + + +- [Live-Hack-CVE/CVE-2017-7887](https://github.com/Live-Hack-CVE/CVE-2017-7887) + +### CVE-2017-7888 (2017-05-10) + + +Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which makes brute-force attacks easier. + + +- [Live-Hack-CVE/CVE-2017-7888](https://github.com/Live-Hack-CVE/CVE-2017-7888) + ### CVE-2017-7912 (2019-04-08) @@ -35722,6 +37506,14 @@ Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability ex - [faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc](https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc) +### CVE-2017-11683 (2017-07-27) + + +There is a reachable assertion in the Internal::TiffReader::visitDirectory function in tiffvisitor.cpp of Exiv2 0.26 that will lead to a remote denial of service attack via crafted input. + + +- [Live-Hack-CVE/CVE-2017-11683](https://github.com/Live-Hack-CVE/CVE-2017-11683) + ### CVE-2017-11774 (2017-10-13) @@ -36885,6 +38677,46 @@ Kentico 9.0 before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to obt - [0xSojalSec/Nuclei-TemplatesNuclei-Templates-CVE-2017-17736](https://github.com/0xSojalSec/Nuclei-TemplatesNuclei-Templates-CVE-2017-17736) +### CVE-2017-17897 (2017-12-24) + + +SQL injection vulnerability in comm/multiprix.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the id parameter. + + +- [Live-Hack-CVE/CVE-2017-17897](https://github.com/Live-Hack-CVE/CVE-2017-17897) + +### CVE-2017-17898 (2017-12-24) + + +Dolibarr ERP/CRM version 6.0.4 does not block direct requests to *.tpl.php files, which allows remote attackers to obtain sensitive information. + + +- [Live-Hack-CVE/CVE-2017-17898](https://github.com/Live-Hack-CVE/CVE-2017-17898) + +### CVE-2017-17899 (2017-12-24) + + +SQL injection vulnerability in adherents/subscription/info.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the rowid parameter. + + +- [Live-Hack-CVE/CVE-2017-17899](https://github.com/Live-Hack-CVE/CVE-2017-17899) + +### CVE-2017-17900 (2017-12-24) + + +SQL injection vulnerability in fourn/index.php in Dolibarr ERP/CRM version 6.0.4 allows remote attackers to execute arbitrary SQL commands via the socid parameter. + + +- [Live-Hack-CVE/CVE-2017-17900](https://github.com/Live-Hack-CVE/CVE-2017-17900) + +### CVE-2017-17971 (2017-12-29) + + +The test_sql_and_script_inject function in htdocs/main.inc.php in Dolibarr ERP/CRM 6.0.4 blocks some event attributes but neither onclick nor onscroll, which allows XSS. + + +- [Live-Hack-CVE/CVE-2017-17971](https://github.com/Live-Hack-CVE/CVE-2017-17971) + ### CVE-2017-18044 (2018-01-19) @@ -36925,6 +38757,22 @@ An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VN - [ShielderSec/CVE-2017-18635](https://github.com/ShielderSec/CVE-2017-18635) +### CVE-2017-18926 (2020-11-06) + + +raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml). + + +- [Live-Hack-CVE/CVE-2017-18926](https://github.com/Live-Hack-CVE/CVE-2017-18926) + +### CVE-2017-20052 (2022-06-16) + + +A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + + +- [Live-Hack-CVE/CVE-2017-20052](https://github.com/Live-Hack-CVE/CVE-2017-20052) + ### CVE-2017-98505 - [mike-williams/Struts2Vuln](https://github.com/mike-williams/Struts2Vuln) @@ -37079,6 +38927,14 @@ phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weak - [Villaquiranm/5MMISSI-CVE-2017-1000499](https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499) +### CVE-2017-1000509 (2018-02-09) + + +Dolibarr version 6.0.2 contains a Cross Site Scripting (XSS) vulnerability in Product details that can result in execution of javascript code. + + +- [Live-Hack-CVE/CVE-2017-1000509](https://github.com/Live-Hack-CVE/CVE-2017-1000509) + ### CVE-2017-1002101 (2018-03-13) @@ -37535,6 +39391,14 @@ Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x b - [Live-Hack-CVE/CVE-2016-1010](https://github.com/Live-Hack-CVE/CVE-2016-1010) +### CVE-2016-1019 (2016-04-07) + + +Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016. + + +- [Live-Hack-CVE/CVE-2016-1019](https://github.com/Live-Hack-CVE/CVE-2016-1019) + ### CVE-2016-1240 (2016-10-03) @@ -37646,6 +39510,14 @@ The client in OpenSSH before 7.2 mishandles failed cookie generation for untrust - [Live-Hack-CVE/CVE-2016-1908](https://github.com/Live-Hack-CVE/CVE-2016-1908) +### CVE-2016-2031 (2020-01-31) + + +Multiple vulnerabilities exists in Aruba Instate before 4.1.3.0 and 4.2.3.1 due to insufficient validation of user-supplied input and insufficient checking of parameters, which could allow a malicious user to bypass security restrictions, obtain sensitive information, perform unauthorized actions and execute arbitrary code. + + +- [Live-Hack-CVE/CVE-2016-2031](https://github.com/Live-Hack-CVE/CVE-2016-2031) + ### CVE-2016-2067 (2016-07-10) @@ -37975,6 +39847,14 @@ The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and - [Hood3dRob1n/CVE-2016-3714](https://github.com/Hood3dRob1n/CVE-2016-3714) - [JoshMorrison99/CVE-2016-3714](https://github.com/JoshMorrison99/CVE-2016-3714) +### CVE-2016-3735 (2022-01-28) + + +Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset. + + +- [Live-Hack-CVE/CVE-2016-3735](https://github.com/Live-Hack-CVE/CVE-2016-3735) + ### CVE-2016-3749 (2016-07-10) @@ -38105,6 +39985,14 @@ Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on - [Live-Hack-CVE/CVE-2016-4163](https://github.com/Live-Hack-CVE/CVE-2016-4163) +### CVE-2016-4271 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a "local-with-filesystem Flash sandbox bypass" issue. + + +- [Live-Hack-CVE/CVE-2016-4271](https://github.com/Live-Hack-CVE/CVE-2016-4271) + ### CVE-2016-4273 (2016-10-13) @@ -38113,6 +40001,86 @@ Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on - [Live-Hack-CVE/CVE-2016-4273](https://github.com/Live-Hack-CVE/CVE-2016-4273) +### CVE-2016-4274 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4274](https://github.com/Live-Hack-CVE/CVE-2016-4274) + +### CVE-2016-4275 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4275](https://github.com/Live-Hack-CVE/CVE-2016-4275) + +### CVE-2016-4276 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4276](https://github.com/Live-Hack-CVE/CVE-2016-4276) + +### CVE-2016-4277 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278. + + +- [Live-Hack-CVE/CVE-2016-4277](https://github.com/Live-Hack-CVE/CVE-2016-4277) + +### CVE-2016-4280 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4280](https://github.com/Live-Hack-CVE/CVE-2016-4280) + +### CVE-2016-4281 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4281](https://github.com/Live-Hack-CVE/CVE-2016-4281) + +### CVE-2016-4282 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4282](https://github.com/Live-Hack-CVE/CVE-2016-4282) + +### CVE-2016-4283 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4283](https://github.com/Live-Hack-CVE/CVE-2016-4283) + +### CVE-2016-4284 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-4284](https://github.com/Live-Hack-CVE/CVE-2016-4284) + +### CVE-2016-4287 (2016-09-14) + + +Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors. + + +- [Live-Hack-CVE/CVE-2016-4287](https://github.com/Live-Hack-CVE/CVE-2016-4287) + ### CVE-2016-4432 (2016-06-01) @@ -38567,6 +40535,22 @@ Cross-site request forgery (CSRF) vulnerability in the CSRF content-type check i - [TSNGL21/CVE-2016-6801](https://github.com/TSNGL21/CVE-2016-6801) +### CVE-2016-6922 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924. + + +- [Live-Hack-CVE/CVE-2016-6922](https://github.com/Live-Hack-CVE/CVE-2016-6922) + +### CVE-2016-6924 (2016-09-14) + + +Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922. + + +- [Live-Hack-CVE/CVE-2016-6924](https://github.com/Live-Hack-CVE/CVE-2016-6924) + ### CVE-2016-6981 (2016-10-13) @@ -38709,6 +40693,134 @@ Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows - [swagatbora90/CheckFlashPlayerVersion](https://github.com/swagatbora90/CheckFlashPlayerVersion) +### CVE-2016-7867 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7867](https://github.com/Live-Hack-CVE/CVE-2016-7867) + +### CVE-2016-7868 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to alternation functionality. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7868](https://github.com/Live-Hack-CVE/CVE-2016-7868) + +### CVE-2016-7869 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to backtrack search functionality. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7869](https://github.com/Live-Hack-CVE/CVE-2016-7869) + +### CVE-2016-7870 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7870](https://github.com/Live-Hack-CVE/CVE-2016-7870) + +### CVE-2016-7871 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7871](https://github.com/Live-Hack-CVE/CVE-2016-7871) + +### CVE-2016-7872 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class related to objects at multiple presentation levels. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7872](https://github.com/Live-Hack-CVE/CVE-2016-7872) + +### CVE-2016-7873 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7873](https://github.com/Live-Hack-CVE/CVE-2016-7873) + +### CVE-2016-7874 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7874](https://github.com/Live-Hack-CVE/CVE-2016-7874) + +### CVE-2016-7875 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable integer overflow vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7875](https://github.com/Live-Hack-CVE/CVE-2016-7875) + +### CVE-2016-7877 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the Action Message Format serialization (AFM0). Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7877](https://github.com/Live-Hack-CVE/CVE-2016-7877) + +### CVE-2016-7878 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the PSDK's MediaPlayer class. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7878](https://github.com/Live-Hack-CVE/CVE-2016-7878) + +### CVE-2016-7879 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7879](https://github.com/Live-Hack-CVE/CVE-2016-7879) + +### CVE-2016-7880 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability when setting the length property of an array object. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7880](https://github.com/Live-Hack-CVE/CVE-2016-7880) + +### CVE-2016-7881 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class when handling conversion to an object. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7881](https://github.com/Live-Hack-CVE/CVE-2016-7881) + +### CVE-2016-7890 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have security bypass vulnerability in the implementation of the same origin policy. + + +- [Live-Hack-CVE/CVE-2016-7890](https://github.com/Live-Hack-CVE/CVE-2016-7890) + +### CVE-2016-7892 (2016-12-15) + + +Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution. + + +- [Live-Hack-CVE/CVE-2016-7892](https://github.com/Live-Hack-CVE/CVE-2016-7892) + ### CVE-2016-7913 (2016-11-15) @@ -39748,6 +41860,14 @@ The overlayfs implementation in the linux (aka Linux kernel) package before 3.19 - [notlikethis/CVE-2015-1328](https://github.com/notlikethis/CVE-2015-1328) - [0x1ns4n3/CVE-2015-1328-GoldenEye](https://github.com/0x1ns4n3/CVE-2015-1328-GoldenEye) +### CVE-2015-1352 (2015-03-30) + + +The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP through 5.6.7 does not validate token extraction for table names, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. + + +- [Live-Hack-CVE/CVE-2015-1352](https://github.com/Live-Hack-CVE/CVE-2015-1352) + ### CVE-2015-1397 (2015-04-29) @@ -40675,6 +42795,14 @@ The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obt - [Karm/CVE-2015-8710](https://github.com/Karm/CVE-2015-8710) +### CVE-2015-8873 (2016-05-16) + + +Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls. + + +- [Live-Hack-CVE/CVE-2015-8873](https://github.com/Live-Hack-CVE/CVE-2015-8873) + ### CVE-2015-9235 (2018-05-29) @@ -40815,6 +42943,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p - [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart) - [k4u5h41/CVE-2014-0160_Heartbleed](https://github.com/k4u5h41/CVE-2014-0160_Heartbleed) - [GardeniaWhite/fuzzing](https://github.com/GardeniaWhite/fuzzing) +- [Live-Hack-CVE/CVE-2014-0160](https://github.com/Live-Hack-CVE/CVE-2014-0160) ### CVE-2014-0166 (2014-04-09) @@ -40951,6 +43080,94 @@ Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obta - [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit) +### CVE-2014-1705 (2014-03-16) + + +Google V8, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. + + +- [Live-Hack-CVE/CVE-2014-1705](https://github.com/Live-Hack-CVE/CVE-2014-1705) + +### CVE-2014-1713 (2014-03-16) + + +Use-after-free vulnerability in the AttributeSetter function in bindings/templates/attributes.cpp in the bindings in Blink, as used in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving the document.location value. + + +- [Live-Hack-CVE/CVE-2014-1713](https://github.com/Live-Hack-CVE/CVE-2014-1713) + +### CVE-2014-1714 (2014-03-16) + + +The ScopedClipboardWriter::WritePickledData function in ui/base/clipboard/scoped_clipboard_writer.cc in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows does not verify a certain format value, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the clipboard. + + +- [Live-Hack-CVE/CVE-2014-1714](https://github.com/Live-Hack-CVE/CVE-2014-1714) + +### CVE-2014-1715 (2014-03-16) + + +Directory traversal vulnerability in Google Chrome before 33.0.1750.152 on OS X and Linux and before 33.0.1750.154 on Windows has unspecified impact and attack vectors. + + +- [Live-Hack-CVE/CVE-2014-1715](https://github.com/Live-Hack-CVE/CVE-2014-1715) + +### CVE-2014-1730 (2014-04-26) + + +Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly store internationalization metadata, which allows remote attackers to bypass intended access restrictions by leveraging "type confusion" and reading property values, related to i18n.js and runtime.cc. + + +- [Live-Hack-CVE/CVE-2014-1730](https://github.com/Live-Hack-CVE/CVE-2014-1730) + +### CVE-2014-1731 (2014-04-26) + + +core/html/HTMLSelectElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly check renderer state upon a focus event, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion" for SELECT elements. + + +- [Live-Hack-CVE/CVE-2014-1731](https://github.com/Live-Hack-CVE/CVE-2014-1731) + +### CVE-2014-1732 (2014-04-26) + + +Use-after-free vulnerability in browser/ui/views/speech_recognition_bubble_views.cc in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via an INPUT element that triggers the presence of a Speech Recognition Bubble window for an incorrect duration. + + +- [Live-Hack-CVE/CVE-2014-1732](https://github.com/Live-Hack-CVE/CVE-2014-1732) + +### CVE-2014-1733 (2014-04-26) + + +The PointerCompare function in codegen.cc in Seccomp-BPF, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, does not properly merge blocks, which might allow remote attackers to bypass intended sandbox restrictions by leveraging renderer access. + + +- [Live-Hack-CVE/CVE-2014-1733](https://github.com/Live-Hack-CVE/CVE-2014-1733) + +### CVE-2014-1734 (2014-04-26) + + +Multiple unspecified vulnerabilities in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors. + + +- [Live-Hack-CVE/CVE-2014-1734](https://github.com/Live-Hack-CVE/CVE-2014-1734) + +### CVE-2014-1735 (2014-04-26) + + +Multiple unspecified vulnerabilities in Google V8 before 3.24.35.33, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. + + +- [Live-Hack-CVE/CVE-2014-1735](https://github.com/Live-Hack-CVE/CVE-2014-1735) + +### CVE-2014-1736 (2014-05-06) + + +Integer overflow in api.cc in Google V8, as used in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value. + + +- [Live-Hack-CVE/CVE-2014-1736](https://github.com/Live-Hack-CVE/CVE-2014-1736) + ### CVE-2014-1767 (2014-07-08) @@ -41058,6 +43275,14 @@ The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 - [elongl/CVE-2014-3153](https://github.com/elongl/CVE-2014-3153) - [c4mx/Linux-kernel-code-injection_CVE-2014-3153](https://github.com/c4mx/Linux-kernel-code-injection_CVE-2014-3153) +### CVE-2014-3166 (2014-08-12) + + +The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names. + + +- [Live-Hack-CVE/CVE-2014-3166](https://github.com/Live-Hack-CVE/CVE-2014-3166) + ### CVE-2014-3341 (2014-08-19) @@ -41074,6 +43299,14 @@ Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in G - [azet/CVE-2014-3466_PoC](https://github.com/azet/CVE-2014-3466_PoC) +### CVE-2014-3515 (2014-07-09) + + +The SPL component in PHP before 5.4.30 and 5.5.x before 5.5.14 incorrectly anticipates that certain data structures will have the array data type after unserialization, which allows remote attackers to execute arbitrary code via a crafted string that triggers use of a Hashtable destructor, related to "type confusion" issues in (1) ArrayObject and (2) SPLObjectStorage. + + +- [Live-Hack-CVE/CVE-2014-3515](https://github.com/Live-Hack-CVE/CVE-2014-3515) + ### CVE-2014-3551 (2014-07-29) @@ -41111,6 +43344,30 @@ The expandArguments function in the database abstraction API in Drupal core 7.x - [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704) - [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon) +### CVE-2014-3710 (2014-11-05) + + +The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file. + + +- [Live-Hack-CVE/CVE-2014-3710](https://github.com/Live-Hack-CVE/CVE-2014-3710) + +### CVE-2014-3991 (2014-07-11) + + +Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) dol_use_jmobile, (2) dol_optimize_smallscreen, (3) dol_no_mouse_hover, (4) dol_hide_topmenu, (5) dol_hide_leftmenu, (6) mainmenu, or (7) leftmenu parameter to index.php; the (8) dol_use_jmobile, (9) dol_optimize_smallscreen, (10) dol_no_mouse_hover, (11) dol_hide_topmenu, or (12) dol_hide_leftmenu parameter to user/index.php; the (13) dol_use_jmobile, (14) dol_optimize_smallscreen, (15) dol_no_mouse_hover, (16) dol_hide_topmenu, or (17) dol_hide_leftmenu parameter to user/logout.php; the (18) email, (19) firstname, (20) job, (21) lastname, or (22) login parameter in an update action in a "User Card" to user/fiche.php; or the (23) modulepart or (24) file parameter to viewimage.php. + + +- [Live-Hack-CVE/CVE-2014-3991](https://github.com/Live-Hack-CVE/CVE-2014-3991) + +### CVE-2014-3992 (2014-07-11) + + +Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM 3.5.3 allow remote authenticated users to execute arbitrary SQL commands via the (1) entity parameter in an update action to user/fiche.php or (2) sortorder parameter to user/group/index.php. + + +- [Live-Hack-CVE/CVE-2014-3992](https://github.com/Live-Hack-CVE/CVE-2014-3992) + ### CVE-2014-4014 (2014-06-23) @@ -41244,6 +43501,14 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us - [vnik5287/cve-2014-4699-ptrace](https://github.com/vnik5287/cve-2014-4699-ptrace) +### CVE-2014-4717 (2014-07-03) + + +Multiple cross-site request forgery (CSRF) vulnerabilities in the Simple Share Buttons Adder plugin before 4.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) ssba_share_text parameter in a save action to wp-admin/options-general.php, which is not properly handled in the homepage, and unspecified vectors related to (2) Pages, (3) Posts, (4) Category/Archive pages or (5) post Excerpts. + + +- [Live-Hack-CVE/CVE-2014-4717](https://github.com/Live-Hack-CVE/CVE-2014-4717) + ### CVE-2014-4936 (2014-12-16) @@ -41549,6 +43814,14 @@ Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, - [mdisec/CVE-2014-9390](https://github.com/mdisec/CVE-2014-9390) - [hakatashi/CVE-2014-9390](https://github.com/hakatashi/CVE-2014-9390) +### CVE-2014-9709 (2015-03-30) + + +The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function. + + +- [Live-Hack-CVE/CVE-2014-9709](https://github.com/Live-Hack-CVE/CVE-2014-9709) + ### CVE-2014-9905 (2017-02-17) @@ -41876,6 +44149,30 @@ Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4 - [bl4ck5un/cve-2013-2072](https://github.com/bl4ck5un/cve-2013-2072) +### CVE-2013-2091 (2019-11-20) + + +SQL injection vulnerability in Dolibarr ERP/CRM 3.3.1 allows remote attackers to execute arbitrary SQL commands via the 'pays' parameter in fiche.php. + + +- [Live-Hack-CVE/CVE-2013-2091](https://github.com/Live-Hack-CVE/CVE-2013-2091) + +### CVE-2013-2092 (2019-11-20) + + +Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php. + + +- [Live-Hack-CVE/CVE-2013-2092](https://github.com/Live-Hack-CVE/CVE-2013-2092) + +### CVE-2013-2093 (2019-11-20) + + +Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands. + + +- [Live-Hack-CVE/CVE-2013-2093](https://github.com/Live-Hack-CVE/CVE-2013-2093) + ### CVE-2013-2094 (2013-05-14) @@ -42210,6 +44507,38 @@ The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attacker - [Everdoh/CVE-2013-6490](https://github.com/Everdoh/CVE-2013-6490) +### CVE-2013-6641 (2014-01-16) + + +Use-after-free vulnerability in the FormAssociatedElement::formRemovedFromTree function in core/html/FormAssociatedElement.cpp in Blink, as used in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper handling of the past names map of a FORM element. + + +- [Live-Hack-CVE/CVE-2013-6641](https://github.com/Live-Hack-CVE/CVE-2013-6641) + +### CVE-2013-6644 (2014-01-16) + + +Multiple unspecified vulnerabilities in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allow attackers to cause a denial of service or possibly have other impact via unknown vectors. + + +- [Live-Hack-CVE/CVE-2013-6644](https://github.com/Live-Hack-CVE/CVE-2013-6644) + +### CVE-2013-6645 (2014-01-16) + + +Use-after-free vulnerability in the OnWindowRemovingFromRootWindow function in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving certain print-preview and tab-switch actions that interact with a speech input element. + + +- [Live-Hack-CVE/CVE-2013-6645](https://github.com/Live-Hack-CVE/CVE-2013-6645) + +### CVE-2013-6646 (2014-01-16) + + +Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 32.0.1700.76 on Windows and before 32.0.1700.77 on Mac OS X and Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the shutting down of a worker process. + + +- [Live-Hack-CVE/CVE-2013-6646](https://github.com/Live-Hack-CVE/CVE-2013-6646) + ### CVE-2013-6668 (2014-03-04) @@ -42270,6 +44599,22 @@ The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before - [Live-Hack-CVE/CVE-2012-0777](https://github.com/Live-Hack-CVE/CVE-2012-0777) +### CVE-2012-1225 (2012-02-20) + + +Multiple SQL injection vulnerabilities in Dolibarr CMS 3.2.0 Alpha and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) memberslist parameter (aka Member List) in list.php or (2) rowid parameter to adherents/fiche.php. + + +- [Live-Hack-CVE/CVE-2012-1225](https://github.com/Live-Hack-CVE/CVE-2012-1225) + +### CVE-2012-1226 (2012-02-20) + + +Multiple directory traversal vulnerabilities in Dolibarr CMS 3.2.0 Alpha allow remote attackers to read arbitrary files and possibly execute arbitrary code via a .. (dot dot) in the (1) file parameter to document.php or (2) backtopage parameter in a create action to comm/action/fiche.php. + + +- [Live-Hack-CVE/CVE-2012-1226](https://github.com/Live-Hack-CVE/CVE-2012-1226) + ### CVE-2012-1675 (2012-05-08) @@ -42730,6 +45075,30 @@ The simplexml_load_string function in the XML import plug-in (libraries/import/x - [SECFORCE/CVE-2011-4107](https://github.com/SECFORCE/CVE-2011-4107) +### CVE-2011-4329 (2011-11-28) + + +Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter in a setup action to admin/company.php, or the PATH_INFO to (2) admin/security_other.php, (3) admin/events.php, or (4) admin/user.php. + + +- [Live-Hack-CVE/CVE-2011-4329](https://github.com/Live-Hack-CVE/CVE-2011-4329) + +### CVE-2011-4802 (2011-12-13) + + +Multiple SQL injection vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) sortfield, (2) sortorder, and (3) sall parameters to user/index.php and (b) user/group/index.php; the id parameter to (4) info.php, (5) perms.php, (6) param_ihm.php, (7) note.php, and (8) fiche.php in user/; and (9) rowid parameter to admin/boxes.php. + + +- [Live-Hack-CVE/CVE-2011-4802](https://github.com/Live-Hack-CVE/CVE-2011-4802) + +### CVE-2011-4814 (2011-12-13) + + +Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 RC and probably earlier allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) index.php, (2) admin/boxes.php, (3) comm/clients.php, (4) commande/index.php; and the optioncss parameter to (5) admin/ihm.php and (6) user/home.php. + + +- [Live-Hack-CVE/CVE-2011-4814](https://github.com/Live-Hack-CVE/CVE-2011-4814) + ### CVE-2011-4862 (2011-12-24) @@ -43408,6 +45777,14 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote - [Aviksaikat/CVE-2007-2447](https://github.com/Aviksaikat/CVE-2007-2447) - [k4u5h41/CVE-2007-2447](https://github.com/k4u5h41/CVE-2007-2447) +### CVE-2007-2727 (2007-05-16) + + +The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys. + + +- [Live-Hack-CVE/CVE-2007-2727](https://github.com/Live-Hack-CVE/CVE-2007-2727) + ### CVE-2007-3830 (2007-07-17) @@ -43820,6 +46197,7 @@ The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the clie - [Balasys/dheater](https://github.com/Balasys/dheater) +- [Live-Hack-CVE/CVE-2002-20001](https://github.com/Live-Hack-CVE/CVE-2002-20001) ## 2001 @@ -43928,6 +46306,14 @@ Land IP denial of service. - [pexmee/CVE-1999-0016-Land-DOS-tool](https://github.com/pexmee/CVE-1999-0016-Land-DOS-tool) - [Pommaq/CVE-1999-0016-POC](https://github.com/Pommaq/CVE-1999-0016-POC) +### CVE-1999-0524 (2000-02-04) + + +ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. + + +- [Live-Hack-CVE/CVE-1999-0524](https://github.com/Live-Hack-CVE/CVE-1999-0524) + ### CVE-1999-0532 (2000-02-04)