Auto Update 2023/01/04 12:13:58

This commit is contained in:
motikan2010-bot 2023-01-04 21:13:59 +09:00
parent 01a0662646
commit fc2de03720
31 changed files with 179 additions and 135 deletions

View file

@ -1827,10 +1827,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-01-01T19:56:46Z",
"updated_at": "2023-01-04T10:56:29Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1124,
"watchers_count": 1124,
"stargazers_count": 1125,
"watchers_count": 1125,
"has_discussions": false,
"forks_count": 352,
"allow_forking": true,
@ -1839,7 +1839,7 @@
"topics": [],
"visibility": "public",
"forks": 352,
"watchers": 1124,
"watchers": 1125,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2022-12-30T12:44:16Z",
"updated_at": "2023-01-04T06:29:04Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 315,
"watchers_count": 315,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 314,
"watchers": 315,
"score": 0
}
]

View file

@ -134,10 +134,10 @@
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
"fork": false,
"created_at": "2019-04-10T02:22:24Z",
"updated_at": "2022-12-14T05:30:40Z",
"updated_at": "2023-01-04T07:47:04Z",
"pushed_at": "2019-11-01T14:33:21Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -146,7 +146,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 142,
"watchers": 143,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 148,
"watchers_count": 148,
"has_discussions": false,
"forks_count": 56,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 56,
"forks": 55,
"watchers": 148,
"score": 0
},

View file

@ -74,10 +74,10 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2022-12-27T08:43:05Z",
"updated_at": "2023-01-04T08:24:16Z",
"pushed_at": "2022-07-07T20:41:01Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 62,
"watchers": 139,
"watchers": 141,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-09-11T17:17:03Z",
"updated_at": "2019-09-11T17:38:24Z",
"pushed_at": "2022-12-04T11:28:22Z",
"pushed_at": "2023-01-04T09:58:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -100,10 +100,10 @@
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
"fork": false,
"created_at": "2020-08-24T19:33:10Z",
"updated_at": "2022-10-30T10:36:06Z",
"updated_at": "2023-01-04T08:43:56Z",
"pushed_at": "2021-03-21T20:59:46Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-01-03T19:05:28Z",
"updated_at": "2023-01-04T09:43:27Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3647,
"watchers_count": 3647,
"stargazers_count": 3650,
"watchers_count": 3650,
"has_discussions": false,
"forks_count": 1049,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1049,
"watchers": 3647,
"watchers": 3650,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
"fork": false,
"created_at": "2021-06-06T06:41:36Z",
"updated_at": "2022-04-24T10:43:45Z",
"updated_at": "2023-01-04T08:09:40Z",
"pushed_at": "2021-06-06T08:41:19Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -76,13 +76,13 @@
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 49,
"score": 0
},
@ -134,7 +134,7 @@
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -144,7 +144,7 @@
"security"
],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 54,
"score": 0
},

View file

@ -397,10 +397,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2022-12-26T09:06:33Z",
"updated_at": "2023-01-04T07:13:14Z",
"pushed_at": "2022-04-14T11:51:18Z",
"stargazers_count": 432,
"watchers_count": 432,
"stargazers_count": 433,
"watchers_count": 433,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -409,7 +409,7 @@
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 432,
"watchers": 433,
"score": 0
},
{

View file

@ -76,10 +76,10 @@
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
"fork": false,
"created_at": "2021-07-22T03:07:56Z",
"updated_at": "2022-09-27T23:37:33Z",
"updated_at": "2023-01-04T08:32:31Z",
"pushed_at": "2022-09-24T20:40:17Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -216,10 +216,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-12-09T16:51:28Z",
"updated_at": "2023-01-04T06:30:51Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1451,
"watchers_count": 1451,
"stargazers_count": 1452,
"watchers_count": 1452,
"has_discussions": false,
"forks_count": 486,
"allow_forking": true,
@ -228,7 +228,7 @@
"topics": [],
"visibility": "public",
"forks": 486,
"watchers": 1451,
"watchers": 1452,
"score": 0
},
{
@ -477,10 +477,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2023-01-03T01:05:30Z",
"updated_at": "2023-01-04T09:32:00Z",
"pushed_at": "2022-06-22T20:21:42Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 723,
"watchers_count": 723,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -496,7 +496,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 722,
"watchers": 723,
"score": 0
},
{

View file

@ -1264,7 +1264,7 @@
"stargazers_count": 589,
"watchers_count": 589,
"has_discussions": false,
"forks_count": 106,
"forks_count": 107,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1275,7 +1275,7 @@
"log4jshell"
],
"visibility": "public",
"forks": 106,
"forks": 107,
"watchers": 589,
"score": 0
},
@ -8895,10 +8895,10 @@
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
"updated_at": "2023-01-03T16:29:45Z",
"updated_at": "2023-01-04T07:54:00Z",
"pushed_at": "2022-12-30T12:32:05Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -8907,7 +8907,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -129,7 +129,7 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-12-30T15:18:15Z",
"updated_at": "2023-01-04T09:55:52Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1003,
"watchers_count": 1003,
@ -419,10 +419,10 @@
"description": "The Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2022-03-08T13:48:55Z",
"updated_at": "2022-11-28T13:05:10Z",
"updated_at": "2023-01-04T09:57:45Z",
"pushed_at": "2022-03-08T13:54:08Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -431,7 +431,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 44,
"watchers": 45,
"score": 0
},
{
@ -1088,10 +1088,10 @@
"description": "A Python-based DirtyPipe (CVE-2022-0847) POC to pop a root shell",
"fork": false,
"created_at": "2022-03-11T08:22:56Z",
"updated_at": "2022-10-09T08:13:43Z",
"updated_at": "2023-01-04T09:54:14Z",
"pushed_at": "2022-03-23T22:46:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -1100,7 +1100,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -214,10 +214,10 @@
"description": "A REAL DoS exploit for CVE-2022-21907",
"fork": false,
"created_at": "2022-04-04T10:53:28Z",
"updated_at": "2022-11-12T14:40:33Z",
"updated_at": "2023-01-04T10:34:23Z",
"pushed_at": "2022-04-13T05:48:04Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -226,7 +226,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 125,
"watchers": 127,
"score": 0
},
{

View file

@ -361,10 +361,10 @@
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
"fork": false,
"created_at": "2022-04-13T16:18:56Z",
"updated_at": "2023-01-02T11:12:09Z",
"updated_at": "2023-01-04T11:15:34Z",
"pushed_at": "2022-04-26T04:26:00Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -373,7 +373,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 58,
"watchers": 60,
"score": 0
},
{

View file

@ -76,13 +76,13 @@
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 48,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"forks": 49,
"watchers": 135,
"score": 0
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -100,10 +100,10 @@
"description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-03-08T17:08:52Z",
"updated_at": "2022-11-30T20:18:32Z",
"updated_at": "2023-01-04T07:31:50Z",
"pushed_at": "2022-03-08T17:12:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -742,10 +742,10 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
"updated_at": "2022-12-30T03:21:38Z",
"updated_at": "2023-01-04T07:22:24Z",
"pushed_at": "2022-06-07T10:35:18Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -754,7 +754,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 243,
"watchers": 244,
"score": 0
},
{

36
2022/CVE-2022-27502.json Normal file
View file

@ -0,0 +1,36 @@
[
{
"id": 553393223,
"name": "CVE-2022-27502",
"full_name": "alirezac0\/CVE-2022-27502",
"owner": {
"login": "alirezac0",
"id": 32331449,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32331449?v=4",
"html_url": "https:\/\/github.com\/alirezac0"
},
"html_url": "https:\/\/github.com\/alirezac0\/CVE-2022-27502",
"description": "Exploit of RealVNC VNC Server",
"fork": false,
"created_at": "2022-10-18T06:31:21Z",
"updated_at": "2023-01-04T10:18:26Z",
"pushed_at": "2022-10-18T07:05:36Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-27502",
"dll-hijacking",
"privilege-escalation",
"windows"
],
"visibility": "public",
"forks": 9,
"watchers": 24,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Foxit PDF Reader Remote Code Execution Exploit",
"fork": false,
"created_at": "2022-12-02T18:52:20Z",
"updated_at": "2022-12-29T23:41:24Z",
"updated_at": "2023-01-04T08:14:37Z",
"pushed_at": "2022-12-16T05:29:11Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 99,
"watchers": 100,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-12-26T02:41:28Z",
"updated_at": "2023-01-04T06:35:15Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 83,
"watchers": 335,
"watchers": 336,
"score": 0
},
{

View file

@ -18,7 +18,7 @@
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,7 +26,7 @@
"cve-2022-33891"
],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 48,
"score": 0
},

View file

@ -13,12 +13,12 @@
"description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3",
"fork": false,
"created_at": "2022-10-28T09:51:41Z",
"updated_at": "2022-12-06T21:48:41Z",
"updated_at": "2023-01-04T11:06:29Z",
"pushed_at": "2022-11-18T15:47:17Z",
"stargazers_count": 536,
"watchers_count": 536,
"stargazers_count": 535,
"watchers_count": 535,
"has_discussions": false,
"forks_count": 111,
"forks_count": 110,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"spookyssl"
],
"visibility": "public",
"forks": 111,
"watchers": 536,
"forks": 110,
"watchers": 535,
"score": 0
},
{

View file

@ -47,13 +47,13 @@
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 29,
"score": 0
}

View file

@ -49,12 +49,12 @@
"description": "Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.",
"fork": false,
"created_at": "2022-10-17T18:50:36Z",
"updated_at": "2022-10-25T07:41:53Z",
"updated_at": "2023-01-04T06:49:49Z",
"pushed_at": "2022-10-20T11:56:13Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": true,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -65,8 +65,8 @@
"poc"
],
"visibility": "public",
"forks": 15,
"watchers": 28,
"forks": 16,
"watchers": 29,
"score": 0
},
{
@ -965,12 +965,12 @@
"description": "CVE-2022-42889 - Text4Shell exploit",
"fork": false,
"created_at": "2022-12-07T17:58:59Z",
"updated_at": "2022-12-12T05:03:09Z",
"updated_at": "2023-01-04T07:12:34Z",
"pushed_at": "2022-12-10T19:59:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -981,8 +981,8 @@
"text4shell-poc-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 35,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source.",
"fork": false,
"created_at": "2022-12-17T16:45:24Z",
"updated_at": "2023-01-04T02:48:03Z",
"updated_at": "2023-01-04T10:31:32Z",
"pushed_at": "2022-12-21T17:53:19Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 204,
"watchers": 205,
"score": 0
},
{
@ -42,10 +42,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
"updated_at": "2023-01-04T03:52:05Z",
"updated_at": "2023-01-04T08:28:56Z",
"pushed_at": "2023-01-04T02:01:53Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 57,
"watchers": 58,
"score": 0
},
{
@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-01-04T06:03:07Z",
"pushed_at": "2023-01-04T02:28:50Z",
"stargazers_count": 522,
"watchers_count": 522,
"updated_at": "2023-01-04T10:07:38Z",
"pushed_at": "2023-01-04T11:42:20Z",
"stargazers_count": 527,
"watchers_count": 527,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 522,
"watchers": 527,
"score": 0
},
{
@ -100,10 +100,10 @@
"description": "File Manager for CVE-2022-46689",
"fork": false,
"created_at": "2022-12-28T22:13:35Z",
"updated_at": "2023-01-04T01:23:35Z",
"updated_at": "2023-01-04T10:20:52Z",
"pushed_at": "2023-01-02T00:36:39Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 59,
"watchers": 63,
"score": 0
}
]

View file

@ -2554,6 +2554,14 @@ Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the u
- [gerr-re/cve-2022-27438](https://github.com/gerr-re/cve-2022-27438)
### CVE-2022-27502 (2022-06-10)
<code>
RealVNC VNC Server 6.9.0 through 5.1.0 for Windows allows local privilege escalation because an installer repair operation executes %TEMP% files as SYSTEM.
</code>
- [alirezac0/CVE-2022-27502](https://github.com/alirezac0/CVE-2022-27502)
### CVE-2022-27666 (2022-03-23)
<code>