Auto Update 2023/11/18 12:25:32

This commit is contained in:
motikan2010-bot 2023-11-18 21:25:32 +09:00
parent 19ed3d1380
commit d074a15ba5
51 changed files with 412 additions and 218 deletions

View file

@ -13,10 +13,10 @@
"description": "Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303",
"fork": false,
"created_at": "2018-02-22T05:31:13Z",
"updated_at": "2023-11-07T11:52:36Z",
"updated_at": "2023-11-18T07:38:56Z",
"pushed_at": "2018-02-25T08:49:07Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 59,
"watchers": 107,
"watchers": 106,
"score": 0,
"subscribers_count": 11
}

View file

@ -73,10 +73,10 @@
"description": "Laravel-PHP-Unit-RCE (CVE-2018-15133) Auto Exploiter and Shell Uploader",
"fork": false,
"created_at": "2020-04-05T04:54:40Z",
"updated_at": "2023-09-28T11:13:34Z",
"updated_at": "2023-11-18T06:47:20Z",
"pushed_at": "2020-10-09T15:30:16Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2023-11-03T10:38:27Z",
"updated_at": "2023-11-18T07:39:14Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 180,
"watchers": 178,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,12 +43,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-17T09:33:02Z",
"updated_at": "2023-11-18T12:09:04Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3927,
"watchers_count": 3927,
"stargazers_count": 3928,
"watchers_count": 3928,
"has_discussions": false,
"forks_count": 1094,
"forks_count": 1095,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,8 +74,8 @@
"webshell"
],
"visibility": "public",
"forks": 1094,
"watchers": 3927,
"forks": 1095,
"watchers": 3928,
"score": 0,
"subscribers_count": 155
},

View file

@ -13,12 +13,12 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
"updated_at": "2023-09-28T21:09:37Z",
"updated_at": "2023-11-18T09:59:33Z",
"pushed_at": "2020-05-10T15:32:54Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 34,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"whatsapp"
],
"visibility": "public",
"forks": 34,
"watchers": 88,
"forks": 36,
"watchers": 89,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
"fork": false,
"created_at": "2020-11-10T13:08:21Z",
"updated_at": "2023-10-12T08:02:48Z",
"updated_at": "2023-11-18T07:39:30Z",
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 43,
"watchers": 42,
"score": 0,
"subscribers_count": 5
}

View file

@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2023-11-17T06:39:09Z",
"updated_at": "2023-11-18T07:39:27Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1096,
"watchers_count": 1096,
"stargazers_count": 1095,
"watchers_count": 1095,
"has_discussions": false,
"forks_count": 285,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 285,
"watchers": 1096,
"watchers": 1095,
"score": 0,
"subscribers_count": 35
},
@ -133,10 +133,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2023-11-17T21:31:48Z",
"updated_at": "2023-11-18T07:39:27Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 355,
"watchers_count": 355,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 356,
"watchers": 355,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,12 +13,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-17T09:33:02Z",
"updated_at": "2023-11-18T12:09:04Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3927,
"watchers_count": 3927,
"stargazers_count": 3928,
"watchers_count": 3928,
"has_discussions": false,
"forks_count": 1094,
"forks_count": 1095,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,8 +44,8 @@
"webshell"
],
"visibility": "public",
"forks": 1094,
"watchers": 3927,
"forks": 1095,
"watchers": 3928,
"score": 0,
"subscribers_count": 155
},

View file

@ -103,10 +103,10 @@
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-05-30T10:15:10Z",
"updated_at": "2023-09-21T15:14:06Z",
"updated_at": "2023-11-18T07:39:38Z",
"pushed_at": "2021-11-16T17:34:11Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -130,7 +130,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 44,
"watchers": 43,
"score": 0,
"subscribers_count": 3
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-11-17T09:35:34Z",
"updated_at": "2023-11-18T08:33:53Z",
"pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1157,
"watchers_count": 1157,
"stargazers_count": 1156,
"watchers_count": 1156,
"has_discussions": false,
"forks_count": 149,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 149,
"watchers": 1157,
"watchers": 1156,
"score": 0,
"subscribers_count": 11
}

View file

@ -107,10 +107,10 @@
"description": "漏洞复现与poc收集CVE-2021-21975cve-2021-22005CVE-2021-26295VMware vCenter任意文件读取",
"fork": false,
"created_at": "2021-04-01T01:14:20Z",
"updated_at": "2023-10-23T17:25:14Z",
"updated_at": "2023-11-18T08:31:30Z",
"pushed_at": "2021-09-30T11:14:58Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2023-11-17T06:25:59Z",
"updated_at": "2023-11-18T07:39:31Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 117,
"watchers": 116,
"score": 0,
"subscribers_count": 11
}

View file

@ -13,8 +13,8 @@
"description": "Working in Progress POC for CVE2021-38297",
"fork": false,
"created_at": "2023-11-15T20:52:36Z",
"updated_at": "2023-11-17T04:28:20Z",
"pushed_at": "2023-11-17T04:28:17Z",
"updated_at": "2023-11-18T07:46:50Z",
"pushed_at": "2023-11-18T07:46:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -197,10 +197,10 @@
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
"fork": false,
"created_at": "2022-03-04T17:55:52Z",
"updated_at": "2023-11-15T22:28:52Z",
"updated_at": "2023-11-18T07:39:57Z",
"pushed_at": "2022-03-05T18:34:25Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 90,
"watchers": 89,
"score": 0,
"subscribers_count": 4
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-11-17T22:59:51Z",
"updated_at": "2023-11-18T07:39:50Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 658,
"watchers_count": 658,
"stargazers_count": 657,
"watchers_count": 657,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 658,
"watchers": 657,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2023-11-05T06:50:18Z",
"updated_at": "2023-11-18T07:40:11Z",
"pushed_at": "2023-02-20T23:29:21Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 147,
"watchers": 145,
"score": 0,
"subscribers_count": 11
}

View file

@ -28,5 +28,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 720348499,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20338",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20338",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2022-20338",
"description": null,
"fork": false,
"created_at": "2023-11-18T07:44:41Z",
"updated_at": "2023-11-18T07:44:41Z",
"pushed_at": "2023-11-18T07:44:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 720410510,
"name": "frameworks_base_AOSP_10_r33_CVE-2022-20338",
"full_name": "Trinadh465\/frameworks_base_AOSP_10_r33_CVE-2022-20338",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP_10_r33_CVE-2022-20338",
"description": null,
"fork": false,
"created_at": "2023-11-18T12:02:22Z",
"updated_at": "2023-11-18T12:18:18Z",
"pushed_at": "2023-11-18T12:17:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -796,10 +796,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2023-11-17T09:35:34Z",
"updated_at": "2023-11-18T08:33:53Z",
"pushed_at": "2023-10-10T05:38:02Z",
"stargazers_count": 1157,
"watchers_count": 1157,
"stargazers_count": 1156,
"watchers_count": 1156,
"has_discussions": false,
"forks_count": 149,
"allow_forking": true,
@ -815,7 +815,7 @@
],
"visibility": "public",
"forks": 149,
"watchers": 1157,
"watchers": 1156,
"score": 0,
"subscribers_count": 11
},
@ -833,10 +833,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-20T08:08:09Z",
"updated_at": "2023-09-12T21:36:24Z",
"updated_at": "2023-11-18T07:40:20Z",
"pushed_at": "2022-10-20T01:31:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -845,7 +845,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -193,10 +193,10 @@
"description": "Apache APISIX < 2.12.1 Remote Code Execution and Docker Lab",
"fork": false,
"created_at": "2022-03-20T16:35:55Z",
"updated_at": "2023-09-19T03:52:05Z",
"updated_at": "2023-11-18T07:54:06Z",
"pushed_at": "2022-03-20T18:09:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -210,7 +210,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},

View file

@ -257,10 +257,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2023-10-28T15:07:59Z",
"updated_at": "2023-11-18T07:40:08Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 373,
"watchers_count": 373,
"stargazers_count": 372,
"watchers_count": 372,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@ -269,7 +269,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 373,
"watchers": 372,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2023-11-07T08:46:00Z",
"updated_at": "2023-11-18T07:40:23Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 386,
"watchers_count": 386,
"stargazers_count": 385,
"watchers_count": 385,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 386,
"watchers": 385,
"score": 0,
"subscribers_count": 8
},

View file

@ -133,10 +133,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2023-10-25T17:29:55Z",
"updated_at": "2023-11-18T07:40:08Z",
"pushed_at": "2022-09-15T03:19:28Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 214,
"watchers": 213,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
"updated_at": "2023-11-17T11:57:39Z",
"updated_at": "2023-11-18T07:40:23Z",
"pushed_at": "2022-12-05T23:36:42Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 163,
"watchers": 162,
"score": 0,
"subscribers_count": 4
},
@ -43,10 +43,10 @@
"description": "CVE-2022-3699 with arbitrary kernel code execution capability",
"fork": false,
"created_at": "2022-12-25T04:34:26Z",
"updated_at": "2023-10-25T02:58:25Z",
"updated_at": "2023-11-18T07:40:27Z",
"pushed_at": "2022-12-27T21:30:08Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 71,
"watchers": 70,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Windows LPE exploit for CVE-2022-37969",
"fork": false,
"created_at": "2023-03-09T21:17:44Z",
"updated_at": "2023-11-09T09:58:33Z",
"updated_at": "2023-11-18T07:40:33Z",
"pushed_at": "2023-07-11T16:50:28Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 121,
"watchers": 120,
"score": 0,
"subscribers_count": 4
}

View file

@ -321,10 +321,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2023-10-24T14:30:14Z",
"updated_at": "2023-11-18T07:40:20Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 353,
"watchers_count": 353,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -333,7 +333,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 355,
"watchers": 353,
"score": 0,
"subscribers_count": 7
},

View file

@ -133,10 +133,10 @@
"description": "CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server",
"fork": false,
"created_at": "2022-10-09T15:27:40Z",
"updated_at": "2023-11-16T06:13:32Z",
"updated_at": "2023-11-18T07:40:19Z",
"pushed_at": "2023-01-21T01:57:59Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 89,
"watchers_count": 89,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -157,7 +157,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 90,
"watchers": 89,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM",
"fork": false,
"created_at": "2022-08-17T16:45:13Z",
"updated_at": "2023-10-04T16:44:10Z",
"updated_at": "2023-11-18T07:40:10Z",
"pushed_at": "2022-12-24T10:29:08Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": true,
"forks_count": 26,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 157,
"watchers": 156,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "PoC for Acronis Arbitrary File Read - CVE-2022-45451",
"fork": false,
"created_at": "2022-12-15T19:16:20Z",
"updated_at": "2023-09-12T21:36:31Z",
"updated_at": "2023-11-18T07:40:27Z",
"pushed_at": "2022-12-20T17:04:34Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-11-14T11:13:49Z",
"updated_at": "2023-11-18T10:10:48Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 851,
"watchers_count": 851,
"stargazers_count": 852,
"watchers_count": 852,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 851,
"watchers": 852,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T00:31:50Z",
"updated_at": "2023-11-17T09:32:25Z",
"updated_at": "2023-11-18T07:40:46Z",
"pushed_at": "2023-08-21T00:33:08Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 53,
"watchers": 52,
"score": 0,
"subscribers_count": 1
},

62
2023/CVE-2023-21109.json Normal file
View file

@ -0,0 +1,62 @@
[
{
"id": 720349935,
"name": "frameworks_base_AOSP10_CVE-2023-21109r33_",
"full_name": "Trinadh465\/frameworks_base_AOSP10_CVE-2023-21109r33_",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_CVE-2023-21109r33_",
"description": null,
"fork": false,
"created_at": "2023-11-18T07:50:57Z",
"updated_at": "2023-11-18T07:50:57Z",
"pushed_at": "2023-11-18T07:50:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 720351156,
"name": "frameworks_base_AOSP10_r33_CVE-2023-21109",
"full_name": "Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21109",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/frameworks_base_AOSP10_r33_CVE-2023-21109",
"description": null,
"fork": false,
"created_at": "2023-11-18T07:56:12Z",
"updated_at": "2023-11-18T08:39:11Z",
"pushed_at": "2023-11-18T11:41:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-21554 Windows MessageQueuing PoC分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
"fork": false,
"created_at": "2023-05-18T10:30:49Z",
"updated_at": "2023-11-17T10:08:52Z",
"updated_at": "2023-11-18T07:40:39Z",
"pushed_at": "2023-05-18T10:38:57Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 50,
"watchers": 49,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2023-11-10T06:53:35Z",
"updated_at": "2023-11-18T07:40:28Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 291,
"watchers_count": 291,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 293,
"watchers": 291,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2023-11-07T04:34:44Z",
"updated_at": "2023-11-18T07:40:32Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 458,
"watchers_count": 458,
"stargazers_count": 457,
"watchers_count": 457,
"has_discussions": false,
"forks_count": 161,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 161,
"watchers": 458,
"watchers": 457,
"score": 0,
"subscribers_count": 10
},
@ -73,10 +73,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2023-11-18T00:45:00Z",
"updated_at": "2023-11-18T07:40:33Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 143,
"watchers": 142,
"score": 0,
"subscribers_count": 3
},
@ -231,10 +231,10 @@
"description": null,
"fork": false,
"created_at": "2023-04-20T08:26:42Z",
"updated_at": "2023-09-12T21:36:40Z",
"updated_at": "2023-11-18T07:40:37Z",
"pushed_at": "2023-04-21T02:17:17Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 10,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2023-11-17T15:13:01Z",
"updated_at": "2023-11-18T12:17:52Z",
"pushed_at": "2023-11-17T16:25:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2023-11-16T13:12:35Z",
"updated_at": "2023-11-18T07:43:44Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-04T07:48:13Z",
"updated_at": "2023-11-17T07:59:46Z",
"updated_at": "2023-11-18T07:40:46Z",
"pushed_at": "2023-09-04T07:51:58Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 112,
"watchers": 111,
"score": 0,
"subscribers_count": 2
}

View file

@ -88,5 +88,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 720332712,
"name": "CVE-2023-2982",
"full_name": "wshinkle\/CVE-2023-2982",
"owner": {
"login": "wshinkle",
"id": 91923278,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91923278?v=4",
"html_url": "https:\/\/github.com\/wshinkle"
},
"html_url": "https:\/\/github.com\/wshinkle\/CVE-2023-2982",
"description": null,
"fork": false,
"created_at": "2023-11-18T06:34:15Z",
"updated_at": "2023-11-18T06:44:45Z",
"pushed_at": "2023-11-18T06:44:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Report and exploit of CVE-2023-36427",
"fork": false,
"created_at": "2023-10-09T16:55:18Z",
"updated_at": "2023-11-18T03:38:42Z",
"updated_at": "2023-11-18T12:17:06Z",
"pushed_at": "2023-11-16T04:24:37Z",
"stargazers_count": 50,
"watchers_count": 50,

View file

@ -13,10 +13,10 @@
"description": "LPE exploit for CVE-2023-36802",
"fork": false,
"created_at": "2023-10-09T17:32:15Z",
"updated_at": "2023-11-16T15:30:29Z",
"updated_at": "2023-11-18T07:40:48Z",
"pushed_at": "2023-10-10T17:44:17Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 131,
"watchers": 130,
"score": 0,
"subscribers_count": 4
},
@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
"updated_at": "2023-11-17T00:57:57Z",
"updated_at": "2023-11-18T07:40:49Z",
"pushed_at": "2023-10-26T11:44:46Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 77,
"watchers": 76,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "Juniper Firewalls CVE-2023-36845 - RCE",
"fork": false,
"created_at": "2023-09-26T17:56:55Z",
"updated_at": "2023-11-15T23:55:24Z",
"updated_at": "2023-11-18T11:49:09Z",
"pushed_at": "2023-09-26T19:02:07Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-36874 PoC",
"fork": false,
"created_at": "2023-08-20T13:50:42Z",
"updated_at": "2023-11-15T22:29:03Z",
"updated_at": "2023-11-18T07:40:46Z",
"pushed_at": "2023-08-20T13:54:15Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 78,
"watchers": 77,
"score": 0,
"subscribers_count": 1
},
@ -73,19 +73,19 @@
"description": null,
"fork": false,
"created_at": "2023-08-23T12:07:40Z",
"updated_at": "2023-11-16T05:25:26Z",
"updated_at": "2023-11-18T07:40:46Z",
"pushed_at": "2023-08-23T16:46:53Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 209,
"forks": 44,
"watchers": 208,
"score": 0,
"subscribers_count": 4
},

View file

@ -261,10 +261,10 @@
"description": "MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit",
"fork": false,
"created_at": "2023-09-28T11:53:44Z",
"updated_at": "2023-11-16T14:35:49Z",
"updated_at": "2023-11-18T07:40:48Z",
"pushed_at": "2023-11-02T09:08:31Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -273,7 +273,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 23,
"watchers": 22,
"score": 0,
"subscribers_count": 2
}

View file

@ -736,10 +736,10 @@
"description": "CVE-2023-38831 WinRaR Exploit Generator",
"fork": false,
"created_at": "2023-09-12T14:07:00Z",
"updated_at": "2023-10-24T17:46:47Z",
"updated_at": "2023-11-18T07:40:47Z",
"pushed_at": "2023-09-12T16:39:44Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -754,7 +754,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,7 +13,7 @@
"description": "Wordpress Plugin Masterstudy LMS <= 3.0.17 - Unauthenticated Instructor Account Creation",
"fork": false,
"created_at": "2023-09-04T14:16:32Z",
"updated_at": "2023-09-04T23:27:26Z",
"updated_at": "2023-11-18T08:56:16Z",
"pushed_at": "2023-09-04T17:01:51Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -1,22 +1,22 @@
[
{
"id": 719987092,
"name": "CVE-2023-4357-Chrome-LFI",
"full_name": "xcanwin\/CVE-2023-4357-Chrome-LFI",
"name": "CVE-2023-4357-Chrome-XXE",
"full_name": "xcanwin\/CVE-2023-4357-Chrome-XXE",
"owner": {
"login": "xcanwin",
"id": 14187349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14187349?v=4",
"html_url": "https:\/\/github.com\/xcanwin"
},
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2023-4357-Chrome-LFI",
"description": "Chrome任意文件读取漏洞POC",
"html_url": "https:\/\/github.com\/xcanwin\/CVE-2023-4357-Chrome-XXE",
"description": "Chrome XXE 漏洞 POC实现对访客者本地文件读取",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2023-11-17T11:10:23Z",
"pushed_at": "2023-11-17T11:16:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2023-11-18T12:26:02Z",
"pushed_at": "2023-11-18T09:42:47Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "CVE-2023-46604",
"fork": false,
"created_at": "2023-10-27T12:22:43Z",
"updated_at": "2023-11-18T01:52:30Z",
"updated_at": "2023-11-18T11:20:26Z",
"pushed_at": "2023-11-03T14:14:31Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 19,
"watchers": 21,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 720393369,
"name": "CVE-2023-47102",
"full_name": "nitipoom-jar\/CVE-2023-47102",
"owner": {
"login": "nitipoom-jar",
"id": 149907798,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149907798?v=4",
"html_url": "https:\/\/github.com\/nitipoom-jar"
},
"html_url": "https:\/\/github.com\/nitipoom-jar\/CVE-2023-47102",
"description": null,
"fork": false,
"created_at": "2023-11-18T10:52:40Z",
"updated_at": "2023-11-18T10:52:40Z",
"pushed_at": "2023-11-18T10:52:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false,
"created_at": "2023-11-17T07:03:06Z",
"updated_at": "2023-11-18T06:11:16Z",
"updated_at": "2023-11-18T12:20:04Z",
"pushed_at": "2023-11-17T07:19:11Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)",
"fork": false,
"created_at": "2023-11-15T14:53:03Z",
"updated_at": "2023-11-17T13:22:39Z",
"updated_at": "2023-11-18T09:28:37Z",
"pushed_at": "2023-11-15T14:53:48Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -482,6 +482,7 @@
- [RandomRobbieBF/CVE-2023-2982](https://github.com/RandomRobbieBF/CVE-2023-2982)
- [H4K6/CVE-2023-2982-POC](https://github.com/H4K6/CVE-2023-2982-POC)
- [LoaiEsam37/CVE-2023-2982](https://github.com/LoaiEsam37/CVE-2023-2982)
- [wshinkle/CVE-2023-2982](https://github.com/wshinkle/CVE-2023-2982)
### CVE-2023-2986 (2023-06-07)
@ -695,7 +696,7 @@
<code>Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
</code>
- [xcanwin/CVE-2023-4357-Chrome-LFI](https://github.com/xcanwin/CVE-2023-4357-Chrome-LFI)
- [xcanwin/CVE-2023-4357-Chrome-XXE](https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE)
### CVE-2023-4460
- [0xn4d/poc-cve-xss-uploading-svg](https://github.com/0xn4d/poc-cve-xss-uploading-svg)
@ -1122,6 +1123,14 @@
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21097)
- [uthrasri/frameworks_base_AOSP10_r33_CVE-2023-21097](https://github.com/uthrasri/frameworks_base_AOSP10_r33_CVE-2023-21097)
### CVE-2023-21109 (2023-05-15)
<code>In multiple places of AccessibilityService, there is a possible way to hide the app from the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261589597
</code>
- [Trinadh465/frameworks_base_AOSP10_CVE-2023-21109r33_](https://github.com/Trinadh465/frameworks_base_AOSP10_CVE-2023-21109r33_)
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21109](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2023-21109)
### CVE-2023-21238 (2023-07-12)
<code>In visitUris of RemoteViews.java, there is a possible leak of images between users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n
@ -5236,6 +5245,7 @@
</code>
- [quantiano/cve-2023-47102](https://github.com/quantiano/cve-2023-47102)
- [nitipoom-jar/CVE-2023-47102](https://github.com/nitipoom-jar/CVE-2023-47102)
### CVE-2023-47119 (2023-11-10)
@ -6443,6 +6453,8 @@
</code>
- [Satheesh575555/frameworks_base_AOSP_06_r22_CVE-2022-20338](https://github.com/Satheesh575555/frameworks_base_AOSP_06_r22_CVE-2022-20338)
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20338](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20338)
- [Trinadh465/frameworks_base_AOSP_10_r33_CVE-2022-20338](https://github.com/Trinadh465/frameworks_base_AOSP_10_r33_CVE-2022-20338)
### CVE-2022-20347 (2022-08-09)