Auto Update 2022/04/30 06:19:35

This commit is contained in:
motikan2010-bot 2022-04-30 15:19:35 +09:00
parent 7a04c0daac
commit f57eed988f
23 changed files with 331 additions and 206 deletions

View file

@ -40,17 +40,17 @@
"description": "CVE-2018-12386 - Firefox Sandboxed RCE Exploit for Linux (Firefox <v62.0.3)",
"fork": false,
"created_at": "2020-04-10T11:59:15Z",
"updated_at": "2020-04-13T16:37:36Z",
"updated_at": "2022-04-30T02:11:11Z",
"pushed_at": "2020-04-10T12:15:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

29
2020/CVE-2020-0418.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 487198514,
"name": "packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418",
"full_name": "Trinadh465\/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418",
"description": null,
"fork": false,
"created_at": "2022-04-30T06:16:17Z",
"updated_at": "2022-04-30T06:16:17Z",
"pushed_at": "2022-04-30T06:16:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2020-02-21T09:56:19Z",
"updated_at": "2022-04-22T05:41:25Z",
"updated_at": "2022-04-30T04:10:26Z",
"pushed_at": "2020-02-28T07:08:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -283,17 +283,17 @@
"description": null,
"fork": false,
"created_at": "2020-02-21T17:24:45Z",
"updated_at": "2021-12-05T20:48:05Z",
"updated_at": "2022-04-30T04:24:30Z",
"pushed_at": "2020-02-25T08:55:09Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

29
2021/CVE-2021-0511.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 487194778,
"name": "platform_art_AOSP10_r33_CVE-2021-0511",
"full_name": "Trinadh465\/platform_art_AOSP10_r33_CVE-2021-0511",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/platform_art_AOSP10_r33_CVE-2021-0511",
"description": null,
"fork": false,
"created_at": "2022-04-30T05:54:11Z",
"updated_at": "2022-04-30T05:57:05Z",
"pushed_at": "2022-04-30T05:58:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -98,7 +98,7 @@
"pushed_at": "2021-11-16T17:34:11Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -118,7 +118,7 @@
"windows"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 19,
"score": 0
},

29
2021/CVE-2021-22924.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 487173629,
"name": "external_curl_AOSP10_r33_CVE-2021-22924",
"full_name": "Trinadh465\/external_curl_AOSP10_r33_CVE-2021-22924",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465"
},
"html_url": "https:\/\/github.com\/Trinadh465\/external_curl_AOSP10_r33_CVE-2021-22924",
"description": null,
"fork": false,
"created_at": "2022-04-30T03:40:15Z",
"updated_at": "2022-04-30T03:42:14Z",
"pushed_at": "2022-04-30T03:42:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -272,17 +272,17 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
"updated_at": "2022-04-20T05:49:56Z",
"updated_at": "2022-04-30T02:12:41Z",
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 108,
"watchers": 109,
"score": 0
},
{
@ -503,17 +503,17 @@
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
"fork": false,
"created_at": "2021-03-11T20:51:48Z",
"updated_at": "2022-04-11T08:30:39Z",
"updated_at": "2022-04-30T02:05:47Z",
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 33,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 55,
"forks": 34,
"watchers": 56,
"score": 0
},
{

View file

@ -30,46 +30,6 @@
"watchers": 50,
"score": 0
},
{
"id": 436588547,
"name": "CVE-2021-27928-POC",
"full_name": "shamo0\/CVE-2021-27928-POC",
"owner": {
"login": "shamo0",
"id": 48299520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
"html_url": "https:\/\/github.com\/shamo0"
},
"html_url": "https:\/\/github.com\/shamo0\/CVE-2021-27928-POC",
"description": "CVE-2021-27928-POC",
"fork": false,
"created_at": "2021-12-09T11:18:26Z",
"updated_at": "2021-12-11T07:44:46Z",
"pushed_at": "2021-12-09T12:05:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"2021",
"27928",
"cve",
"escalation",
"mariadb",
"mysql",
"privilege",
"provider",
"root",
"shell",
"sql",
"wsrep"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 475258147,
"name": "CVE-2021-27928",

View file

@ -94,17 +94,17 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2022-04-22T17:44:52Z",
"updated_at": "2022-04-30T03:12:47Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 41,
"stargazers_count": 239,
"watchers_count": 239,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 238,
"forks": 42,
"watchers": 239,
"score": 0
},
{

View file

@ -1,29 +0,0 @@
[
{
"id": 436831581,
"name": "Mass_CVE-2021-39316",
"full_name": "anggoroexe\/Mass_CVE-2021-39316",
"owner": {
"login": "anggoroexe",
"id": 75475767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75475767?v=4",
"html_url": "https:\/\/github.com\/anggoroexe"
},
"html_url": "https:\/\/github.com\/anggoroexe\/Mass_CVE-2021-39316",
"description": "i made this with love .",
"fork": false,
"created_at": "2021-12-10T02:56:46Z",
"updated_at": "2021-12-23T02:16:37Z",
"pushed_at": "2021-12-10T03:09:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -73,17 +73,17 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-04-29T18:23:27Z",
"updated_at": "2022-04-30T03:30:28Z",
"pushed_at": "2022-01-30T14:22:23Z",
"stargazers_count": 1500,
"watchers_count": 1500,
"stargazers_count": 1499,
"watchers_count": 1499,
"forks_count": 440,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 440,
"watchers": 1500,
"watchers": 1499,
"score": 0
},
{

View file

@ -192,33 +192,6 @@
"watchers": 3,
"score": 0
},
{
"id": 436571000,
"name": "CVE-2021-43798",
"full_name": "julesbozouklian\/CVE-2021-43798",
"owner": {
"login": "julesbozouklian",
"id": 26013529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26013529?v=4",
"html_url": "https:\/\/github.com\/julesbozouklian"
},
"html_url": "https:\/\/github.com\/julesbozouklian\/CVE-2021-43798",
"description": null,
"fork": false,
"created_at": "2021-12-09T10:17:57Z",
"updated_at": "2021-12-09T12:34:45Z",
"pushed_at": "2021-12-09T12:34:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436590562,
"name": "Grafana-CVE-2021-43798Exp",

View file

@ -80,33 +80,6 @@
"watchers": 5,
"score": 0
},
{
"id": 436848055,
"name": "LogJackFix",
"full_name": "UltraVanilla\/LogJackFix",
"owner": {
"login": "UltraVanilla",
"id": 73727575,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73727575?v=4",
"html_url": "https:\/\/github.com\/UltraVanilla"
},
"html_url": "https:\/\/github.com\/UltraVanilla\/LogJackFix",
"description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
"fork": false,
"created_at": "2021-12-10T04:20:03Z",
"updated_at": "2021-12-10T05:11:17Z",
"pushed_at": "2021-12-10T04:20:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 436860437,
"name": "Log4j2-CVE-2021-44228",
@ -3154,17 +3127,17 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T22:52:02Z",
"updated_at": "2022-04-27T13:34:53Z",
"updated_at": "2022-04-30T05:16:05Z",
"pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 328,
"watchers_count": 328,
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 328,
"watchers": 330,
"score": 0
},
{
@ -3469,12 +3442,12 @@
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2842,
"watchers_count": 2842,
"forks_count": 693,
"forks_count": 694,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 693,
"forks": 694,
"watchers": 2842,
"score": 0
},
@ -9581,6 +9554,33 @@
"watchers": 93,
"score": 0
},
{
"id": 442533490,
"name": "LogJackFix",
"full_name": "PoneyClairDeLune\/LogJackFix",
"owner": {
"login": "PoneyClairDeLune",
"id": 88174309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88174309?v=4",
"html_url": "https:\/\/github.com\/PoneyClairDeLune"
},
"html_url": "https:\/\/github.com\/PoneyClairDeLune\/LogJackFix",
"description": "A spigot plugin to fix CVE-2021-44228 Log4j remote code execution vulnerability, to protect Minecraft clients.",
"fork": false,
"created_at": "2021-12-28T17:18:13Z",
"updated_at": "2021-12-28T17:26:16Z",
"pushed_at": "2021-12-28T17:26:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 442846791,
"name": "log4j-exploit-builder",
@ -10806,5 +10806,32 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 487163916,
"name": "Writing-Sample-1",
"full_name": "TPower2112\/Writing-Sample-1",
"owner": {
"login": "TPower2112",
"id": 20917633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20917633?v=4",
"html_url": "https:\/\/github.com\/TPower2112"
},
"html_url": "https:\/\/github.com\/TPower2112\/Writing-Sample-1",
"description": "CVE-2021-44228 Log4j Summary",
"fork": false,
"created_at": "2022-04-30T02:35:38Z",
"updated_at": "2022-04-30T04:58:58Z",
"pushed_at": "2022-04-30T04:58:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1101,17 +1101,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-04-29T11:15:45Z",
"updated_at": "2022-04-30T01:04:05Z",
"pushed_at": "2022-03-15T00:26:45Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 248,
"watchers": 249,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-04-24T07:07:52Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 33,
"score": 0
},

View file

@ -148,17 +148,17 @@
"description": "SpringCloudGatewayRCE - CVE-2022-22947 \/ Code By:Tas9er",
"fork": false,
"created_at": "2022-03-03T19:45:18Z",
"updated_at": "2022-04-27T08:51:22Z",
"updated_at": "2022-04-30T02:01:48Z",
"pushed_at": "2022-03-03T20:44:25Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"forks": 3,
"watchers": 12,
"score": 0
},
{
@ -424,12 +424,12 @@
"pushed_at": "2022-03-08T09:43:50Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 25,
"score": 0
},

View file

@ -43,17 +43,17 @@
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2022-04-28T22:17:32Z",
"updated_at": "2022-04-30T06:08:31Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 246,
"watchers": 247,
"score": 0
},
{

29
2022/CVE-2022-28099.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 487158568,
"name": "CVE-2022-28099",
"full_name": "IbrahimEkimIsik\/CVE-2022-28099",
"owner": {
"login": "IbrahimEkimIsik",
"id": 53093499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53093499?v=4",
"html_url": "https:\/\/github.com\/IbrahimEkimIsik"
},
"html_url": "https:\/\/github.com\/IbrahimEkimIsik\/CVE-2022-28099",
"description": "SQL injection for Poultry Farm Management System 1.0",
"fork": false,
"created_at": "2022-04-30T02:01:09Z",
"updated_at": "2022-04-30T02:01:09Z",
"pushed_at": "2022-04-30T02:02:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-28452",
"fork": false,
"created_at": "2022-04-29T03:03:25Z",
"updated_at": "2022-04-29T03:12:09Z",
"updated_at": "2022-04-30T02:14:11Z",
"pushed_at": "2022-04-29T03:11:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

29
2022/CVE-2022-28508.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 486401731,
"name": "CVE-2022-28508",
"full_name": "YavuzSahbaz\/CVE-2022-28508",
"owner": {
"login": "YavuzSahbaz",
"id": 101733340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101733340?v=4",
"html_url": "https:\/\/github.com\/YavuzSahbaz"
},
"html_url": "https:\/\/github.com\/YavuzSahbaz\/CVE-2022-28508",
"description": "CVE-2022-28508",
"fork": false,
"created_at": "2022-04-28T01:10:17Z",
"updated_at": "2022-04-30T04:10:28Z",
"pushed_at": "2022-04-30T03:15:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-04-29T18:26:14Z",
"updated_at": "2022-04-30T02:14:54Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 638,
"watchers_count": 638,
"forks_count": 103,
"stargazers_count": 639,
"watchers_count": 639,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 638,
"forks": 102,
"watchers": 639,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-04-29T17:42:58Z",
"updated_at": "2022-04-30T05:38:17Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 256,
"watchers": 257,
"score": 0
},
{
@ -309,5 +309,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 487181556,
"name": "CVE-2022-29464",
"full_name": "UUFR\/CVE-2022-29464",
"owner": {
"login": "UUFR",
"id": 47633517,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47633517?v=4",
"html_url": "https:\/\/github.com\/UUFR"
},
"html_url": "https:\/\/github.com\/UUFR\/CVE-2022-29464",
"description": "CVE-2022-29464",
"fork": false,
"created_at": "2022-04-30T04:30:51Z",
"updated_at": "2022-04-30T05:38:30Z",
"pushed_at": "2022-04-30T05:10:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1262,6 +1262,9 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when
- [erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated)
### CVE-2022-28099
- [IbrahimEkimIsik/CVE-2022-28099](https://github.com/IbrahimEkimIsik/CVE-2022-28099)
### CVE-2022-28113 (2022-04-15)
<code>
@ -1298,6 +1301,9 @@ Limbas 4.3.36.1319 is vulnerable to Cross Site Scripting (XSS).
- [YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-](https://github.com/YavuzSahbaz/Limbas-4.3.36.1319-is-vulnerable-to-Cross-Site-Scripting-XSS-)
### CVE-2022-28508
- [YavuzSahbaz/CVE-2022-28508](https://github.com/YavuzSahbaz/CVE-2022-28508)
### CVE-2022-29072 (2022-04-15)
<code>
@ -1325,6 +1331,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [k4u5h41/CVE-2022-29464](https://github.com/k4u5h41/CVE-2022-29464)
- [lowkey0808/cve-2022-29464](https://github.com/lowkey0808/cve-2022-29464)
- [superzerosec/CVE-2022-29464](https://github.com/superzerosec/CVE-2022-29464)
- [UUFR/CVE-2022-29464](https://github.com/UUFR/CVE-2022-29464)
### CVE-2022-29548 (2022-04-20)
@ -1683,6 +1690,14 @@ In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due
- [pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510](https://github.com/pazhanivel07/hardware_interfaces-A10_r33_CVE-2021-0510)
### CVE-2021-0511 (2021-06-21)
<code>
In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795
</code>
- [Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511](https://github.com/Trinadh465/platform_art_AOSP10_r33_CVE-2021-0511)
### CVE-2021-0513 (2021-06-21)
<code>
@ -2900,6 +2915,14 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
### CVE-2021-22924 (2021-08-05)
<code>
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
</code>
- [Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924](https://github.com/Trinadh465/external_curl_AOSP10_r33_CVE-2021-22924)
### CVE-2021-22986 (2021-03-31)
<code>
@ -3483,7 +3506,6 @@ A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.
</code>
- [Al1ex/CVE-2021-27928](https://github.com/Al1ex/CVE-2021-27928)
- [shamo0/CVE-2021-27928-POC](https://github.com/shamo0/CVE-2021-27928-POC)
- [GatoGamer1155/CVE-2021-27928](https://github.com/GatoGamer1155/CVE-2021-27928)
### CVE-2021-27963 (2021-03-04)
@ -4267,14 +4289,6 @@ Cachet is an open source status page. With Cachet prior to and including 2.3.18,
- [W0rty/CVE-2021-39165](https://github.com/W0rty/CVE-2021-39165)
### CVE-2021-39316 (2021-08-31)
<code>
The Zoomsounds plugin &lt;= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
</code>
- [anggoroexe/Mass_CVE-2021-39316](https://github.com/anggoroexe/Mass_CVE-2021-39316)
### CVE-2021-39623 (2022-01-14)
<code>
@ -4829,7 +4843,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [JiuBanSec/Grafana-CVE-2021-43798](https://github.com/JiuBanSec/Grafana-CVE-2021-43798)
- [MzzdToT/Grafana_fileread](https://github.com/MzzdToT/Grafana_fileread)
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
- [julesbozouklian/CVE-2021-43798](https://github.com/julesbozouklian/CVE-2021-43798)
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
- [pedrohavay/exploit-grafana-CVE-2021-43798](https://github.com/pedrohavay/exploit-grafana-CVE-2021-43798)
@ -4949,7 +4962,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce)
- [Glease/Healer](https://github.com/Glease/Healer)
- [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch)
- [UltraVanilla/LogJackFix](https://github.com/UltraVanilla/LogJackFix)
- [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228)
- [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept)
- [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2)
@ -5281,6 +5293,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [yesspider-hacker/log4j-payload-generator](https://github.com/yesspider-hacker/log4j-payload-generator)
- [LinkMJB/log4shell_scanner](https://github.com/LinkMJB/log4shell_scanner)
- [NS-Sp4ce/Vm4J](https://github.com/NS-Sp4ce/Vm4J)
- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix)
- [a5tra/log4j-exploit-builder](https://github.com/a5tra/log4j-exploit-builder)
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
@ -5325,6 +5338,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [manishkanyal/log4j-scanner](https://github.com/manishkanyal/log4j-scanner)
- [ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j](https://github.com/ExploitPwner/CVE-2021-44228-Mass-RCE-Log4j)
- [digital-dev/Log4j-CVE-2021-44228-Remediation](https://github.com/digital-dev/Log4j-CVE-2021-44228-Remediation)
- [TPower2112/Writing-Sample-1](https://github.com/TPower2112/Writing-Sample-1)
### CVE-2021-44229
- [awsassets/CVE-2021-44229](https://github.com/awsassets/CVE-2021-44229)
@ -6041,6 +6055,14 @@ In multiple settings screens, there are possible tapjacking attacks due to an in
- [ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416](https://github.com/ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2020-0416)
### CVE-2020-0418 (2020-11-10)
<code>
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813
</code>
- [Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418](https://github.com/Trinadh465/packages_apps_PackageInstaller_AOSP10_r33_CVE-2020-0418)
### CVE-2020-0421 (2020-10-14)
<code>