diff --git a/2018/CVE-2018-12386.json b/2018/CVE-2018-12386.json index 069f2c74dc..4e4c4e48c2 100644 --- a/2018/CVE-2018-12386.json +++ b/2018/CVE-2018-12386.json @@ -40,17 +40,17 @@ "description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox Contents area.", "fork": false, "created_at": "2022-04-15T22:59:03Z", - "updated_at": "2022-04-29T18:26:14Z", + "updated_at": "2022-04-30T02:14:54Z", "pushed_at": "2022-04-22T11:26:31Z", - "stargazers_count": 638, - "watchers_count": 638, - "forks_count": 103, + "stargazers_count": 639, + "watchers_count": 639, + "forks_count": 102, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", - "forks": 103, - "watchers": 638, + "forks": 102, + "watchers": 639, "score": 0 }, { diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 537ab94c66..7096a17114 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2022-04-29T17:42:58Z", + "updated_at": "2022-04-30T05:38:17Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 256, - "watchers_count": 256, + "stargazers_count": 257, + "watchers_count": 257, "forks_count": 54, "allow_forking": true, "is_template": false, @@ -25,7 +25,7 @@ ], "visibility": "public", "forks": 54, - "watchers": 256, + "watchers": 257, "score": 0 }, { @@ -309,5 +309,32 @@ "forks": 0, "watchers": 0, "score": 0 + }, + { + "id": 487181556, + "name": "CVE-2022-29464", + "full_name": "UUFR\/CVE-2022-29464", + "owner": { + "login": "UUFR", + "id": 47633517, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47633517?v=4", + "html_url": "https:\/\/github.com\/UUFR" + }, + "html_url": "https:\/\/github.com\/UUFR\/CVE-2022-29464", + "description": "CVE-2022-29464", + "fork": false, + "created_at": "2022-04-30T04:30:51Z", + "updated_at": "2022-04-30T05:38:30Z", + "pushed_at": "2022-04-30T05:10:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 70974de94c..9c3e62fac0 100644 --- a/README.md +++ b/README.md @@ -1262,6 +1262,9 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when - [erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated) +### CVE-2022-28099 +- [IbrahimEkimIsik/CVE-2022-28099](https://github.com/IbrahimEkimIsik/CVE-2022-28099) + ### CVE-2022-28113 (2022-04-15) @@ -1298,6 +1301,9 @@ Limbas 4.3.36.1319 is vulnerable to Cross Site Scripting (XSS). - [YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-](https://github.com/YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-) +### CVE-2022-28508 +- [YavuzSahbaz/CVE-2022-28508](https://github.com/YavuzSahbaz/CVE-2022-28508) + ### CVE-2022-29072 (2022-04-15) @@ -1325,6 +1331,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code - [k4u5h41/CVE-2022-29464](https://github.com/k4u5h41/CVE-2022-29464) - [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464) - [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464) +- [UUFR/CVE-2022-29464](https://github.com/UUFR/CVE-2022-29464) ### CVE-2022-29548 (2022-04-20) @@ -1683,6 +1690,14 @@ In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due - [pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510](https://github.com/pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510) +### CVE-2021-0511 (2021-06-21) + + +In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795 + + +- [Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511](https://github.com/Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511) + ### CVE-2021-0513 (2021-06-21) @@ -2900,6 +2915,14 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3 - [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911) +### CVE-2021-22924 (2021-08-05) + + +libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate. + + +- [Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924](https://github.com/Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924) + ### CVE-2021-22986 (2021-03-31) @@ -3483,7 +3506,6 @@ A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10. - [Al1ex/CVE-2021-27928](https://github.com/Al1ex/CVE-2021-27928) -- [shamo0/CVE-2021-27928-POC](https://github.com/shamo0/CVE-2021-27928-POC) - [GatoGamer1155/CVE-2021-27928](https://github.com/GatoGamer1155/CVE-2021-27928) ### CVE-2021-27963 (2021-03-04) @@ -4267,14 +4289,6 @@ Cachet is an open source status page. With Cachet prior to and including 2.3.18, - [W0rty/CVE-2021-39165](https://github.com/W0rty/CVE-2021-39165) -### CVE-2021-39316 (2021-08-31) - - -The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter. - - -- [anggoroexe/Mass_CVE-2021-39316](https://github.com/anggoroexe/Mass_CVE-2021-39316) - ### CVE-2021-39623 (2022-01-14) @@ -4829,7 +4843,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver - [JiuBanSec/Grafana-CVE-2021-43798](https://github.com/JiuBanSec/Grafana-CVE-2021-43798) - [MzzdToT/Grafana_fileread](https://github.com/MzzdToT/Grafana_fileread) - [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798) -- [julesbozouklian/CVE-2021-43798](https://github.com/julesbozouklian/CVE-2021-43798) - [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp) - [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798) - [pedrohavay/exploit-grafana-CVE-2021-43798](https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798) @@ -4949,7 +4962,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce) - [Glease/Healer](https://github.com/Glease/Healer) - [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch) -- [UltraVanilla/LogJackFix](https://github.com/UltraVanilla/LogJackFix) - [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228) - [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept) - [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2) @@ -5281,6 +5293,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [yesspider-hacker/log4j-payload-generator](https://github.com/yesspider-hacker/log4j-payload-generator) - [LinkMJB/log4shell_scanner](https://github.com/LinkMJB/log4shell_scanner) - [NS-Sp4ce/Vm4J](https://github.com/NS-Sp4ce/Vm4J) +- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix) - [a5tra/log4j-exploit-builder](https://github.com/a5tra/log4j-exploit-builder) - [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability) - [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app) @@ -5325,6 +5338,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 - [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner) - [ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j) - [digital-dev/Log4j-CVE-2021-44228-Remediation](https://github.com/digital-dev/Log4j-CVE-2021-44228-Remediation) +- [TPower2112/Writing-Sample-1](https://github.com/TPower2112/Writing-Sample-1) ### CVE-2021-44229 - [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229) @@ -6041,6 +6055,14 @@ In multiple settings screens, there are possible tapjacking attacks due to an in - [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416) +### CVE-2020-0418 (2020-11-10) + + +In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813 + + +- [Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418](https://github.com/Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418) + ### CVE-2020-0421 (2020-10-14)