Auto Update 2023/05/12 00:31:33

This commit is contained in:
motikan2010-bot 2023-05-12 09:31:33 +09:00
parent 8a86a0674d
commit d6168ef260
24 changed files with 521 additions and 28 deletions

View file

@ -143,5 +143,34 @@
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 340543198,
"name": "CVE-2018-0802",
"full_name": "roninAPT\/CVE-2018-0802",
"owner": {
"login": "roninAPT",
"id": 77648833,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77648833?v=4",
"html_url": "https:\/\/github.com\/roninAPT"
},
"html_url": "https:\/\/github.com\/roninAPT\/CVE-2018-0802",
"description": null,
"fork": false,
"created_at": "2021-02-20T02:34:16Z",
"updated_at": "2021-02-20T02:34:27Z",
"pushed_at": "2021-02-20T02:34:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2018/CVE-2018-13797.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 327091489,
"name": "CVE-2018-13797",
"full_name": "dsp-testing\/CVE-2018-13797",
"owner": {
"login": "dsp-testing",
"id": 30846345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30846345?v=4",
"html_url": "https:\/\/github.com\/dsp-testing"
},
"html_url": "https:\/\/github.com\/dsp-testing\/CVE-2018-13797",
"description": null,
"fork": false,
"created_at": "2021-01-05T18:56:56Z",
"updated_at": "2021-01-05T19:33:04Z",
"pushed_at": "2021-01-05T19:33:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1420,6 +1420,35 @@
"watchers": 0,
"score": 0
},
{
"id": 358086744,
"name": "test-CVE-2018-6574-",
"full_name": "MohamedTarekq\/test-CVE-2018-6574-",
"owner": {
"login": "MohamedTarekq",
"id": 54548283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54548283?v=4",
"html_url": "https:\/\/github.com\/MohamedTarekq"
},
"html_url": "https:\/\/github.com\/MohamedTarekq\/test-CVE-2018-6574-",
"description": null,
"fork": false,
"created_at": "2021-04-15T01:10:43Z",
"updated_at": "2021-04-15T01:15:13Z",
"pushed_at": "2021-04-15T01:15:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 377097654,
"name": "CVE-2018-6574",

View file

@ -318,6 +318,35 @@
"watchers": 0,
"score": 0
},
{
"id": 354695794,
"name": "CVE-2018-8174_EXP",
"full_name": "delina1\/CVE-2018-8174_EXP",
"owner": {
"login": "delina1",
"id": 81941054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81941054?v=4",
"html_url": "https:\/\/github.com\/delina1"
},
"html_url": "https:\/\/github.com\/delina1\/CVE-2018-8174_EXP",
"description": null,
"fork": false,
"created_at": "2021-04-05T02:31:54Z",
"updated_at": "2021-04-05T02:31:54Z",
"pushed_at": "2021-04-05T02:31:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 370609005,
"name": "CVE-2018-8174_EXP",

File diff suppressed because one or more lines are too long

View file

@ -434,6 +434,35 @@
"watchers": 1,
"score": 0
},
{
"id": 391941607,
"name": "CVE-2020-27955-LFS-main",
"full_name": "whitetea2424\/CVE-2020-27955-LFS-main",
"owner": {
"login": "whitetea2424",
"id": 80032455,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80032455?v=4",
"html_url": "https:\/\/github.com\/whitetea2424"
},
"html_url": "https:\/\/github.com\/whitetea2424\/CVE-2020-27955-LFS-main",
"description": null,
"fork": false,
"created_at": "2021-08-02T12:32:08Z",
"updated_at": "2021-08-02T13:13:28Z",
"pushed_at": "2021-08-02T13:13:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 481308105,
"name": "cve-2020-27955",

View file

@ -32,5 +32,34 @@
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 390319299,
"name": "CVE-2020-28502",
"full_name": "dpredrag\/CVE-2020-28502",
"owner": {
"login": "dpredrag",
"id": 3372646,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3372646?v=4",
"html_url": "https:\/\/github.com\/dpredrag"
},
"html_url": "https:\/\/github.com\/dpredrag\/CVE-2020-28502",
"description": null,
"fork": false,
"created_at": "2021-07-28T11:01:56Z",
"updated_at": "2021-07-28T11:03:19Z",
"pushed_at": "2021-07-28T11:03:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

31
2020/CVE-2020-35545.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 389169410,
"name": "CVE-2020-35545",
"full_name": "bousalman\/CVE-2020-35545",
"owner": {
"login": "bousalman",
"id": 16021440,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16021440?v=4",
"html_url": "https:\/\/github.com\/bousalman"
},
"html_url": "https:\/\/github.com\/bousalman\/CVE-2020-35545",
"description": "Spotweb 1.4.9 - 'search' SQL Injection",
"fork": false,
"created_at": "2021-07-24T18:12:35Z",
"updated_at": "2021-07-24T18:13:12Z",
"pushed_at": "2021-07-24T18:13:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

60
2020/CVE-2020-35846.json Normal file
View file

@ -0,0 +1,60 @@
[
{
"id": 389266363,
"name": "CVE-2020-35846",
"full_name": "JohnHammond\/CVE-2020-35846",
"owner": {
"login": "JohnHammond",
"id": 6288722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
"html_url": "https:\/\/github.com\/JohnHammond"
},
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2020-35846",
"description": "Python PoC for CVE-2020-35846 targeting Cockpit 0.11.1",
"fork": false,
"created_at": "2021-07-25T05:05:14Z",
"updated_at": "2023-03-23T22:42:57Z",
"pushed_at": "2021-07-25T05:28:51Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 16,
"score": 0
},
{
"id": 393142417,
"name": "CVE-2020-35846",
"full_name": "0z09e\/CVE-2020-35846",
"owner": {
"login": "0z09e",
"id": 62566206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62566206?v=4",
"html_url": "https:\/\/github.com\/0z09e"
},
"html_url": "https:\/\/github.com\/0z09e\/CVE-2020-35846",
"description": "Cockpit CMS 0.11.1 NoSQL Injection to Remote Code Execution",
"fork": false,
"created_at": "2021-08-05T18:48:52Z",
"updated_at": "2023-05-04T13:41:46Z",
"pushed_at": "2021-08-06T14:00:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

38
2020/CVE-2020-36287.json Normal file
View file

@ -0,0 +1,38 @@
[
{
"id": 391787530,
"name": "CVE-2020-36287",
"full_name": "f4rber\/CVE-2020-36287",
"owner": {
"login": "f4rber",
"id": 53954664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53954664?v=4",
"html_url": "https:\/\/github.com\/f4rber"
},
"html_url": "https:\/\/github.com\/f4rber\/CVE-2020-36287",
"description": "The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check.",
"fork": false,
"created_at": "2021-08-02T01:52:39Z",
"updated_at": "2023-03-30T02:40:48Z",
"pushed_at": "2021-08-08T16:26:11Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"atlassian",
"bruteforce",
"cve-2020-36287",
"enumeration",
"jira",
"python3"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 390551926,
"name": "CVE-2020-5248",
"full_name": "Mkway\/CVE-2020-5248",
"owner": {
"login": "Mkway",
"id": 34364080,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34364080?v=4",
"html_url": "https:\/\/github.com\/Mkway"
},
"html_url": "https:\/\/github.com\/Mkway\/CVE-2020-5248",
"description": "CVE-2020-5248",
"fork": false,
"created_at": "2021-07-29T00:46:26Z",
"updated_at": "2021-07-29T04:13:11Z",
"pushed_at": "2021-07-29T04:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -27,5 +27,34 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 387366849,
"name": "CVE-2020-9483",
"full_name": "Neko-chanQwQ\/CVE-2020-9483",
"owner": {
"login": "Neko-chanQwQ",
"id": 83222283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
"html_url": "https:\/\/github.com\/Neko-chanQwQ"
},
"html_url": "https:\/\/github.com\/Neko-chanQwQ\/CVE-2020-9483",
"description": "PoC of SQL Injection vul(CVE-2020-9483,Apache SkyWalking)",
"fork": false,
"created_at": "2021-07-19T06:50:17Z",
"updated_at": "2022-11-09T18:13:00Z",
"pushed_at": "2021-07-19T07:01:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0
}
]

View file

@ -173,6 +173,35 @@
"watchers": 0,
"score": 0
},
{
"id": 392581141,
"name": "CVE-2020-9496",
"full_name": "s4dbrd\/CVE-2020-9496",
"owner": {
"login": "s4dbrd",
"id": 79448708,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79448708?v=4",
"html_url": "https:\/\/github.com\/s4dbrd"
},
"html_url": "https:\/\/github.com\/s4dbrd\/CVE-2020-9496",
"description": null,
"fork": false,
"created_at": "2021-08-04T06:48:31Z",
"updated_at": "2022-06-18T16:23:06Z",
"pushed_at": "2021-08-04T06:49:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 525091869,
"name": "CVE-2020-9496",

View file

@ -13,10 +13,10 @@
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
"fork": false,
"created_at": "2021-05-11T18:45:07Z",
"updated_at": "2023-04-21T00:11:38Z",
"updated_at": "2023-05-11T19:04:12Z",
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 79,
"watchers": 80,
"score": 0
},
{

View file

@ -1898,5 +1898,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 639593327,
"name": "CVE-2021-3156",
"full_name": "mutur4\/CVE-2021-3156",
"owner": {
"login": "mutur4",
"id": 68686790,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68686790?v=4",
"html_url": "https:\/\/github.com\/mutur4"
},
"html_url": "https:\/\/github.com\/mutur4\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2023-05-11T19:38:16Z",
"updated_at": "2023-05-11T19:41:47Z",
"pushed_at": "2023-05-11T19:45:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -143,13 +143,13 @@
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 54,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"forks": 53,
"watchers": 91,
"score": 0
},

View file

@ -913,7 +913,7 @@
"stargazers_count": 778,
"watchers_count": 778,
"has_discussions": false,
"forks_count": 167,
"forks_count": 166,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -921,7 +921,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 167,
"forks": 166,
"watchers": 778,
"score": 0
},

View file

@ -3613,10 +3613,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2023-05-11T14:24:54Z",
"updated_at": "2023-05-11T23:40:46Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3243,
"watchers_count": 3243,
"stargazers_count": 3242,
"watchers_count": 3242,
"has_discussions": true,
"forks_count": 744,
"allow_forking": true,
@ -3625,7 +3625,7 @@
"topics": [],
"visibility": "public",
"forks": 744,
"watchers": 3243,
"watchers": 3242,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2023-05-08T16:37:44Z",
"updated_at": "2023-05-11T19:01:49Z",
"pushed_at": "2022-12-13T15:26:57Z",
"stargazers_count": 375,
"watchers_count": 375,
"stargazers_count": 376,
"watchers_count": 376,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 375,
"watchers": 376,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-12-20T08:17:05Z",
"updated_at": "2023-03-24T15:19:25Z",
"updated_at": "2023-05-11T20:43:33Z",
"pushed_at": "2023-02-02T06:08:05Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -557,13 +557,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 9,
"score": 0
},

View file

@ -28,6 +28,35 @@
"watchers": 2,
"score": 0
},
{
"id": 636517717,
"name": "CVE-2023-0386",
"full_name": "xkaneiki\/CVE-2023-0386",
"owner": {
"login": "xkaneiki",
"id": 26479696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26479696?v=4",
"html_url": "https:\/\/github.com\/xkaneiki"
},
"html_url": "https:\/\/github.com\/xkaneiki\/CVE-2023-0386",
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
"updated_at": "2023-05-11T20:49:01Z",
"pushed_at": "2023-05-08T07:19:34Z",
"stargazers_count": 270,
"watchers_count": 270,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 270,
"score": 0
},
{
"id": 636975790,
"name": "CVE-2023-0386",

View file

@ -72,6 +72,7 @@ A flaw was found in the Linux kernel, where unauthorized access to the execution
</code>
- [Satheesh575555/linux-4.19.72_CVE-2023-0386](https://github.com/Satheesh575555/linux-4.19.72_CVE-2023-0386)
- [xkaneiki/CVE-2023-0386](https://github.com/xkaneiki/CVE-2023-0386)
- [chenaotian/CVE-2023-0386](https://github.com/chenaotian/CVE-2023-0386)
- [CKevens/CVE-2023-0386](https://github.com/CKevens/CVE-2023-0386)
- [hshivhare67/kernel_v4.19.72_CVE-2023-0386](https://github.com/hshivhare67/kernel_v4.19.72_CVE-2023-0386)
@ -8450,6 +8451,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [PhuketIsland/CVE-2021-3156-centos7](https://github.com/PhuketIsland/CVE-2021-3156-centos7)
- [0x4ndy/clif](https://github.com/0x4ndy/clif)
- [meowhua15/CVE-2021-3156](https://github.com/meowhua15/CVE-2021-3156)
- [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156)
### CVE-2021-3157
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
@ -15714,6 +15716,7 @@ GLPI before before version 9.4.6 has a vulnerability involving a default encrypt
</code>
- [indevi0us/CVE-2020-5248](https://github.com/indevi0us/CVE-2020-5248)
- [Mkway/CVE-2020-5248](https://github.com/Mkway/CVE-2020-5248)
### CVE-2020-5250 (2020-03-05)
@ -16676,6 +16679,7 @@ Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote C
</code>
- [shanika04/apache_skywalking](https://github.com/shanika04/apache_skywalking)
- [Neko-chanQwQ/CVE-2020-9483](https://github.com/Neko-chanQwQ/CVE-2020-9483)
### CVE-2020-9484 (2020-05-20)
@ -16719,6 +16723,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
- [ambalabanov/CVE-2020-9496](https://github.com/ambalabanov/CVE-2020-9496)
- [s4dbrd/CVE-2020-9496](https://github.com/s4dbrd/CVE-2020-9496)
- [Ly0nt4r/CVE-2020-9496](https://github.com/Ly0nt4r/CVE-2020-9496)
### CVE-2020-9547 (2020-03-01)
@ -19260,6 +19265,7 @@ Git LFS 2.12.0 allows Remote Code Execution.
- [nob0dy-3389/CVE-2020-27955](https://github.com/nob0dy-3389/CVE-2020-27955)
- [Marsable/CVE-2020-27955-LFS](https://github.com/Marsable/CVE-2020-27955-LFS)
- [FrostsaberX/CVE-2020-27955](https://github.com/FrostsaberX/CVE-2020-27955)
- [whitetea2424/CVE-2020-27955-LFS-main](https://github.com/whitetea2424/CVE-2020-27955-LFS-main)
- [userxfan/cve-2020-27955](https://github.com/userxfan/cve-2020-27955)
- [z50913/CVE-2020-27955](https://github.com/z50913/CVE-2020-27955)
- [Kimorea/CVE-2020-27955-LFS](https://github.com/Kimorea/CVE-2020-27955-LFS)
@ -19383,6 +19389,7 @@ This affects the package xmlhttprequest before 1.7.0; all versions of package xm
</code>
- [s-index/CVE-2020-28502](https://github.com/s-index/CVE-2020-28502)
- [dpredrag/CVE-2020-28502](https://github.com/dpredrag/CVE-2020-28502)
### CVE-2020-28647 (2020-11-17)
@ -19600,6 +19607,14 @@ A vulnerability was found in openvswitch. A limitation in the implementation of
- [freddierice/cve-2020-35498-flag](https://github.com/freddierice/cve-2020-35498-flag)
### CVE-2020-35545 (2020-12-17)
<code>
Time-based SQL injection exists in Spotweb 1.4.9 via the query string.
</code>
- [bousalman/CVE-2020-35545](https://github.com/bousalman/CVE-2020-35545)
### CVE-2020-35590 (2020-12-21)
<code>
@ -19673,6 +19688,15 @@ Directory traversal vulnerability in class-simple_job_board_resume_download_hand
- [M4xSec/Wordpress-CVE-2020-35749](https://github.com/M4xSec/Wordpress-CVE-2020-35749)
### CVE-2020-35846 (2020-12-29)
<code>
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function.
</code>
- [JohnHammond/CVE-2020-35846](https://github.com/JohnHammond/CVE-2020-35846)
- [0z09e/CVE-2020-35846](https://github.com/0z09e/CVE-2020-35846)
### CVE-2020-35847 (2020-12-29)
<code>
@ -19722,6 +19746,14 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee
- [Al1ex/CVE-2020-36188](https://github.com/Al1ex/CVE-2020-36188)
### CVE-2020-36287 (2021-04-08)
<code>
The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check.
</code>
- [f4rber/CVE-2020-36287](https://github.com/f4rber/CVE-2020-36287)
### CVE-2020-36518 (2022-03-11)
<code>
@ -24007,6 +24039,7 @@ Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic
- [Ridter/RTF_11882_0802](https://github.com/Ridter/RTF_11882_0802)
- [likescam/CVE-2018-0802_CVE-2017-11882](https://github.com/likescam/CVE-2018-0802_CVE-2017-11882)
- [5l1v3r1/rtfkit](https://github.com/5l1v3r1/rtfkit)
- [roninAPT/CVE-2018-0802](https://github.com/roninAPT/CVE-2018-0802)
### CVE-2018-0824 (2018-05-09)
@ -24939,6 +24972,7 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
- [purgedemo/CVE-2018-6574_2](https://github.com/purgedemo/CVE-2018-6574_2)
- [killtr0/POC-CVE-2018-6574](https://github.com/killtr0/POC-CVE-2018-6574)
- [theJuan1112/pentesterlab-cve-2018-6574](https://github.com/theJuan1112/pentesterlab-cve-2018-6574)
- [MohamedTarekq/test-CVE-2018-6574-](https://github.com/MohamedTarekq/test-CVE-2018-6574-)
- [OLAOLAOLA789/CVE-2018-6574](https://github.com/OLAOLAOLA789/CVE-2018-6574)
- [repos13579/labCVE-2018-6574](https://github.com/repos13579/labCVE-2018-6574)
- [yashanand/cve-2018-6574](https://github.com/yashanand/cve-2018-6574)
@ -25351,6 +25385,7 @@ A remote code execution vulnerability exists in the way that the VBScript engine
- [www201001/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP)
- [www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git-](https://github.com/www201001/https-github.com-iBearcat-CVE-2018-8174_EXP.git-)
- [delina1/CVE-2018-8174](https://github.com/delina1/CVE-2018-8174)
- [delina1/CVE-2018-8174_EXP](https://github.com/delina1/CVE-2018-8174_EXP)
- [DarkFlameMaster-bit/CVE-2018-8174_EXP](https://github.com/DarkFlameMaster-bit/CVE-2018-8174_EXP)
- [lisinan988/CVE-2018-8174-exp](https://github.com/lisinan988/CVE-2018-8174-exp)
- [sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP](https://github.com/sinisterghost/https-github.com-iBearcat-CVE-2018-8174_EXP)
@ -26211,6 +26246,14 @@ PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
### CVE-2018-13797 (2018-07-10)
<code>
The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.
</code>
- [dsp-testing/CVE-2018-13797](https://github.com/dsp-testing/CVE-2018-13797)
### CVE-2018-13864 (2018-07-17)
<code>