Auto Update 2023/08/20 06:27:10

This commit is contained in:
motikan2010-bot 2023-08-20 15:27:10 +09:00
parent a92f38b747
commit e2c1b08801
43 changed files with 191 additions and 228 deletions

View file

@ -43,10 +43,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2023-08-18T13:43:50Z",
"updated_at": "2023-08-20T02:37:40Z",
"pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "Windows tool that analyzes your computer for Infineon TPM weak RSA keys (CVE-2017-15361) ",
"fork": false,
"created_at": "2017-10-19T13:42:52Z",
"updated_at": "2017-10-19T17:24:19Z",
"updated_at": "2023-08-20T02:50:28Z",
"pushed_at": "2017-10-20T12:09:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
"fork": false,
"created_at": "2021-01-15T17:32:24Z",
"updated_at": "2023-07-31T13:04:15Z",
"updated_at": "2023-08-20T01:31:07Z",
"pushed_at": "2021-01-23T01:25:22Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 10
},

View file

@ -140,10 +140,10 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2023-08-04T05:22:06Z",
"updated_at": "2023-08-20T01:28:03Z",
"pushed_at": "2022-01-10T07:01:58Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -152,7 +152,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 110,
"watchers": 111,
"score": 0,
"subscribers_count": 4
},

View file

@ -1953,13 +1953,13 @@
"stargazers_count": 93,
"watchers_count": 93,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 93,
"score": 0,
"subscribers_count": 2

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2021-11-01T17:13:50Z",
"updated_at": "2023-03-08T00:58:02Z",
"updated_at": "2023-08-20T01:44:35Z",
"pushed_at": "2021-11-01T17:13:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -1268,10 +1268,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2023-08-18T11:34:28Z",
"updated_at": "2023-08-20T03:09:01Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 718,
"watchers_count": 718,
"stargazers_count": 719,
"watchers_count": 719,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -1285,7 +1285,7 @@
],
"visibility": "public",
"forks": 115,
"watchers": 718,
"watchers": 719,
"score": 0,
"subscribers_count": 11
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2022-0185 POC and Docker and Analysis write up",
"fork": false,
"created_at": "2022-02-18T09:27:34Z",
"updated_at": "2023-08-13T06:34:31Z",
"updated_at": "2023-08-20T01:56:29Z",
"pushed_at": "2022-05-24T11:18:03Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 3
},

View file

@ -1,64 +0,0 @@
[
{
"id": 448514056,
"name": "CVE-2022-0236",
"full_name": "qurbat\/CVE-2022-0236",
"owner": {
"login": "qurbat",
"id": 37518297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37518297?v=4",
"html_url": "https:\/\/github.com\/qurbat"
},
"html_url": "https:\/\/github.com\/qurbat\/CVE-2022-0236",
"description": "Proof of concept for unauthenticated sensitive data disclosure affecting the wp-import-export WordPress plugin (CVE-2022-0236)",
"fork": false,
"created_at": "2022-01-16T09:52:28Z",
"updated_at": "2023-01-28T03:56:57Z",
"pushed_at": "2022-01-18T17:14:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"wordpress-security"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 448893968,
"name": "CVE-2022-0236",
"full_name": "xiska62314\/CVE-2022-0236",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-0236",
"description": "CVE-2022-0236",
"fork": false,
"created_at": "2022-01-17T12:56:19Z",
"updated_at": "2022-01-17T12:56:19Z",
"pushed_at": "2022-01-17T12:56:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -2242,10 +2242,10 @@
"description": "修改版CVE-2022-0847",
"fork": false,
"created_at": "2022-11-21T01:21:35Z",
"updated_at": "2023-01-20T18:20:13Z",
"updated_at": "2023-08-20T02:41:07Z",
"pushed_at": "2022-11-21T01:24:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -2254,7 +2254,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -30,6 +30,6 @@
"forks": 13,
"watchers": 101,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -79,66 +79,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 448729790,
"name": "CVE-2022-21907",
"full_name": "ZZ-SOCMAP\/CVE-2022-21907",
"owner": {
"login": "ZZ-SOCMAP",
"id": 98105412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
"html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
"html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-21907",
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2023-07-28T09:02:24Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 366,
"watchers_count": 366,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 366,
"score": 0,
"subscribers_count": 10
},
{
"id": 448909871,
"name": "CVE-2022-21907",
"full_name": "xiska62314\/CVE-2022-21907",
"owner": {
"login": "xiska62314",
"id": 97891523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97891523?v=4",
"html_url": "https:\/\/github.com\/xiska62314"
},
"html_url": "https:\/\/github.com\/xiska62314\/CVE-2022-21907",
"description": "CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T13:42:44Z",
"updated_at": "2022-01-17T13:42:44Z",
"pushed_at": "2022-01-17T13:42:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448952968,
"name": "CVE-2022-21907-http.sys",

View file

@ -1913,10 +1913,10 @@
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan支持检测路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
"fork": false,
"created_at": "2022-06-19T13:16:55Z",
"updated_at": "2023-08-18T13:43:50Z",
"updated_at": "2023-08-20T02:37:40Z",
"pushed_at": "2023-01-23T13:00:34Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -1925,7 +1925,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 2
},

View file

@ -1876,6 +1876,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2023-08-13T15:28:23Z",
"updated_at": "2023-08-20T02:53:20Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 278,
"watchers_count": 278,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 48,
"watchers": 277,
"watchers": 278,
"score": 0,
"subscribers_count": 4
},

View file

@ -407,7 +407,7 @@
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 661387078,

View file

@ -57,7 +57,7 @@
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 665275498,

View file

@ -28,5 +28,50 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 680672954,
"name": "CVE-2023-20073-",
"full_name": "codeb0ss\/CVE-2023-20073-",
"owner": {
"login": "codeb0ss",
"id": 135759201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
"html_url": "https:\/\/github.com\/codeb0ss"
},
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-20073-",
"description": "Mass Exploit - CVE-2023-20073 - Cisco VPN Routers - [Unauthenticated Arbitrary File Upload and Stored XSS]",
"fork": false,
"created_at": "2023-08-20T02:45:50Z",
"updated_at": "2023-08-20T02:50:23Z",
"pushed_at": "2023-08-20T02:53:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"bug",
"bugbounty",
"cisco",
"codeb0ss",
"codeboss",
"cve",
"cve-2023-20073",
"exploit",
"hackerone",
"mass",
"mass-exploit",
"uncodeboss",
"vpn-router"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -180,7 +180,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 605405382,
@ -589,7 +589,7 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 624413538,

View file

@ -27,7 +27,7 @@
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 670873412,

View file

@ -117,7 +117,7 @@
"forks": 9,
"watchers": 46,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 634006271,

View file

@ -36,6 +36,6 @@
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 4,
"watchers": 14,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -117,7 +117,7 @@
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 646129279,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-03-03T01:57:28Z",
"updated_at": "2023-06-07T10:55:21Z",
"pushed_at": "2023-08-19T06:22:32Z",
"pushed_at": "2023-08-20T02:30:10Z",
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": true,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-15T04:16:46Z",
"updated_at": "2023-08-19T14:46:56Z",
"updated_at": "2023-08-20T06:26:31Z",
"pushed_at": "2023-08-17T11:43:26Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 54,
"watchers": 56,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).",
"fork": false,
"created_at": "2023-04-09T05:26:40Z",
"updated_at": "2023-05-23T23:38:14Z",
"updated_at": "2023-08-20T05:27:08Z",
"pushed_at": "2023-05-13T05:09:37Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Check for CVE-2023-32629 \"GameOver(lay)\" vulnerability ",
"fork": false,
"created_at": "2023-08-11T21:08:38Z",
"updated_at": "2023-08-19T09:01:27Z",
"updated_at": "2023-08-20T01:52:01Z",
"pushed_at": "2023-08-11T21:19:13Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 40,
"watchers": 397,
"score": 0,
"subscribers_count": 17
"subscribers_count": 18
}
]

View file

@ -27,7 +27,7 @@
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 651666895,

View file

@ -31,7 +31,7 @@
"forks": 9,
"watchers": 41,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 668799999,
@ -96,7 +96,7 @@
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 669106772,
@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2023-08-18T07:40:08Z",
"updated_at": "2023-08-20T04:48:00Z",
"pushed_at": "2023-08-04T22:36:02Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -184,9 +184,9 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 160,
"watchers": 161,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 669309594,
@ -336,6 +336,6 @@
"forks": 3,
"watchers": 35,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -57,7 +57,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 666813276,

44
2023/CVE-2023-3836.json Normal file
View file

@ -0,0 +1,44 @@
[
{
"id": 680677641,
"name": "CVE-2023-3836",
"full_name": "codeb0ss\/CVE-2023-3836",
"owner": {
"login": "codeb0ss",
"id": 135759201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/135759201?v=4",
"html_url": "https:\/\/github.com\/codeb0ss"
},
"html_url": "https:\/\/github.com\/codeb0ss\/CVE-2023-3836",
"description": null,
"fork": false,
"created_at": "2023-08-20T03:16:31Z",
"updated_at": "2023-08-20T03:21:04Z",
"pushed_at": "2023-08-20T03:20:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"bugbounty",
"codeb0ss",
"codeboss",
"cve",
"cve-2023-3836",
"exploit",
"exploiter",
"hackerone",
"uncodeboss",
"webshell"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -30,7 +30,7 @@
"forks": 20,
"watchers": 56,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 676698139,
@ -46,10 +46,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
"updated_at": "2023-08-19T14:21:49Z",
"updated_at": "2023-08-20T03:42:37Z",
"pushed_at": "2023-08-10T05:12:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -360,10 +360,10 @@
"description": "Metabase Pre-auth RCE (CVE-2023-38646)",
"fork": false,
"created_at": "2023-08-19T11:47:08Z",
"updated_at": "2023-08-19T12:21:40Z",
"updated_at": "2023-08-20T00:58:08Z",
"pushed_at": "2023-08-19T12:18:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -387,8 +387,8 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -473,6 +473,13 @@
- [pray77/CVE-2023-3640](https://github.com/pray77/CVE-2023-3640)
### CVE-2023-3836 (2023-07-22)
<code>In Dahua Smart Park Management bis 20230713 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /emap/devicePoint_addImgIco?hasSubsystem=true. Durch Manipulation des Arguments upload mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [codeb0ss/CVE-2023-3836](https://github.com/codeb0ss/CVE-2023-3836)
### CVE-2023-4174 (2023-08-05)
<code>In mooSocial mooStore 3.1.6 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode. Mittels Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk.
@ -494,6 +501,7 @@
</code>
- [RegularITCat/CVE-2023-20073](https://github.com/RegularITCat/CVE-2023-20073)
- [codeb0ss/CVE-2023-20073-](https://github.com/codeb0ss/CVE-2023-20073-)
### CVE-2023-20110 (2023-05-17)
@ -2816,14 +2824,6 @@
- [Haxatron/CVE-2022-0219](https://github.com/Haxatron/CVE-2022-0219)
### CVE-2022-0236 (2022-01-18)
<code>The WP Import Export WordPress plugin (both free and premium versions) is vulnerable to unauthenticated sensitive data disclosure due to a missing capability check on the download function wpie_process_file_download found in the ~/includes/classes/class-wpie-general.php file. This made it possible for unauthenticated attackers to download any imported or exported information from a vulnerable site which can contain sensitive information like user data. This affects versions up to, and including, 3.9.15.
</code>
- [qurbat/CVE-2022-0236](https://github.com/qurbat/CVE-2022-0236)
- [xiska62314/CVE-2022-0236](https://github.com/xiska62314/CVE-2022-0236)
### CVE-2022-0265 (2022-03-03)
<code>Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.
@ -4133,8 +4133,6 @@
- [corelight/cve-2022-21907](https://github.com/corelight/cve-2022-21907)
- [mauricelambert/CVE-2022-21907](https://github.com/mauricelambert/CVE-2022-21907)
- [ZZ-SOCMAP/CVE-2022-21907](https://github.com/ZZ-SOCMAP/CVE-2022-21907)
- [xiska62314/CVE-2022-21907](https://github.com/xiska62314/CVE-2022-21907)
- [p0dalirius/CVE-2022-21907-http.sys](https://github.com/p0dalirius/CVE-2022-21907-http.sys)
- [michelep/CVE-2022-21907-Vulnerability-PoC](https://github.com/michelep/CVE-2022-21907-Vulnerability-PoC)
- [polakow/CVE-2022-21907](https://github.com/polakow/CVE-2022-21907)