mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
17216 lines
1.4 MiB
Plaintext
17216 lines
1.4 MiB
Plaintext
![]() |
CVE-2022-0001 - https://www.kb.cert.org/vuls/id/155143
|
||
|
CVE-2022-0070 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities
|
||
|
CVE-2022-0071 - https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities
|
||
|
CVE-2022-0090 - https://gitlab.com/gitlab-org/gitaly/-/issues/3948
|
||
|
CVE-2022-0134 - https://wpscan.com/vulnerability/fa09ea9b-d5a0-4773-a692-9ff0200bcd85
|
||
|
CVE-2022-0140 - https://wpscan.com/vulnerability/9fa2b3b6-2fe3-40f0-8f71-371dd58fe336
|
||
|
CVE-2022-0141 - https://wpscan.com/vulnerability/2adc8390-bb19-4adf-9805-e9c462d14d22
|
||
|
CVE-2022-0142 - https://wpscan.com/vulnerability/03210390-2054-40c0-9508-39d168087878
|
||
|
CVE-2022-0147 - https://wpscan.com/vulnerability/2c735365-69c0-4652-b48e-c4a192dfe0d1
|
||
|
CVE-2022-0148 - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd
|
||
|
CVE-2022-0149 - https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c
|
||
|
CVE-2022-0150 - https://wpscan.com/vulnerability/7142a538-7c3d-4dd0-bd2c-cbd2efaf53c5
|
||
|
CVE-2022-0161 - https://wpscan.com/vulnerability/6b37fa17-0dcb-47a7-b1eb-f9f6abb458c0
|
||
|
CVE-2022-0163 - https://wpscan.com/vulnerability/2b6b0731-4515-498a-82bd-d416f5885268
|
||
|
CVE-2022-0164 - https://wpscan.com/vulnerability/942535f9-73bf-4467-872a-20075f03bc51
|
||
|
CVE-2022-0165 - https://wpscan.com/vulnerability/906d0c31-370e-46b4-af1f-e52fbddd00cb
|
||
|
CVE-2022-0169 - https://wpscan.com/vulnerability/0b4d870f-eab8-4544-91f8-9c5f0538709c
|
||
|
CVE-2022-0176 - https://wpscan.com/vulnerability/564a66d5-7fab-4de0-868a-e19466a507af
|
||
|
CVE-2022-0185 - https://www.willsroot.io/2022/01/cve-2022-0185.html
|
||
|
CVE-2022-0186 - https://wpscan.com/vulnerability/3a9c44c0-866e-4fdf-b53d-666db2e11720
|
||
|
CVE-2022-0188 - https://wpscan.com/vulnerability/50b6f770-6f53-41ef-b2f3-2a58e9afd332
|
||
|
CVE-2022-0189 - https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014
|
||
|
CVE-2022-0190 - https://wpscan.com/vulnerability/ae322f11-d8b4-4b69-9efa-0fb87475fa44
|
||
|
CVE-2022-0191 - https://wpscan.com/vulnerability/d4c32a02-810f-43d8-946a-b7e18ac54f55
|
||
|
CVE-2022-0193 - https://wpscan.com/vulnerability/30d1d328-9f19-4c4c-b90a-04937d617864
|
||
|
CVE-2022-0199 - https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714
|
||
|
CVE-2022-0200 - https://wpscan.com/vulnerability/bbc0b812-7b30-4ab4-bac8-27c706b3f146
|
||
|
CVE-2022-0201 - https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4
|
||
|
CVE-2022-0205 - https://wpscan.com/vulnerability/446de364-720e-41ec-b80e-7678c8f4ad80
|
||
|
CVE-2022-0206 - https://wpscan.com/vulnerability/ce12437a-d440-4c4a-9247-95a8f39d00b9
|
||
|
CVE-2022-0208 - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc
|
||
|
CVE-2022-0209 - https://wpscan.com/vulnerability/1e4af9be-5c88-4a3e-89ff-dd2b1bc131fe
|
||
|
CVE-2022-0211 - https://wpscan.com/vulnerability/0d276cca-d6eb-4f4c-83dd-fbc03254c679
|
||
|
CVE-2022-0212 - https://wpscan.com/vulnerability/15be2d2b-baa3-4845-82cf-3c351c695b47
|
||
|
CVE-2022-0214 - https://wpscan.com/vulnerability/ca2e8feb-15d6-4965-ad9c-8da1bc01e0f4
|
||
|
CVE-2022-0216 - https://starlabs.sg/advisories/22/22-0216/
|
||
|
CVE-2022-0217 - https://prosody.im/security/advisory_20220113/
|
||
|
CVE-2022-0217 - https://prosody.im/security/advisory_20220113/1.patch
|
||
|
CVE-2022-0220 - https://wpscan.com/vulnerability/a91a01b9-7e36-4280-bc50-f6cff3e66059
|
||
|
CVE-2022-0228 - https://wpscan.com/vulnerability/22facac2-52f4-4e5f-be59-1d2934b260d9
|
||
|
CVE-2022-0229 - https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351
|
||
|
CVE-2022-0230 - https://wpscan.com/vulnerability/c73316d2-ae6a-42db-935b-b8b03a7e4363
|
||
|
CVE-2022-0234 - https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b
|
||
|
CVE-2022-0246 - https://wpscan.com/vulnerability/892802b1-26e2-4ce1-be6f-71ce29687776
|
||
|
CVE-2022-0248 - https://wpscan.com/vulnerability/d02cf542-2d75-46bc-a0df-67bbe501cc89
|
||
|
CVE-2022-0250 - https://wpscan.com/vulnerability/05700942-3143-4978-89eb-814ceff74867
|
||
|
CVE-2022-0252 - https://wpscan.com/vulnerability/b0e551af-087b-43e7-bdb7-11d7f639028a
|
||
|
CVE-2022-0254 - https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997
|
||
|
CVE-2022-0255 - https://wpscan.com/vulnerability/684bb06d-864f-4cba-ab0d-f83974d026fa
|
||
|
CVE-2022-0267 - https://wpscan.com/vulnerability/7df70f49-547f-4bdb-bf9b-2e06f93488c6
|
||
|
CVE-2022-0271 - https://wpscan.com/vulnerability/ad07d9cd-8a75-4f7c-bbbe-3b6b89b699f2
|
||
|
CVE-2022-0279 - https://wpscan.com/vulnerability/43a4b2d3-1bd5-490c-982c-bb7120595865
|
||
|
CVE-2022-0287 - https://wpscan.com/vulnerability/6cd7cd6d-1cc1-472c-809b-b66389f149b0
|
||
|
CVE-2022-0288 - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42
|
||
|
CVE-2022-0313 - https://wpscan.com/vulnerability/1ce6c8f4-6f4b-4d56-8d11-43355ef32e8c
|
||
|
CVE-2022-0314 - https://wpscan.com/vulnerability/17585f16-c62c-422d-ad9c-9138b6da97b7
|
||
|
CVE-2022-0316 - https://wpscan.com/vulnerability/9ab3d6cf-aad7-41bc-9aae-dc5313f12f7c
|
||
|
CVE-2022-0320 - https://wpscan.com/vulnerability/0d02b222-e672-4ac0-a1d4-d34e1ecf4a95
|
||
|
CVE-2022-0321 - https://wpscan.com/vulnerability/286b81a0-6f6d-4024-9bbc-6cb373990a7a
|
||
|
CVE-2022-0327 - https://wpscan.com/vulnerability/df38cc99-da3c-4cc0-b179-1e52e841b883
|
||
|
CVE-2022-0328 - https://wpscan.com/vulnerability/44532b7c-4d0d-4959-ada4-733f377d6ec9
|
||
|
CVE-2022-0345 - https://wpscan.com/vulnerability/b3b523b9-6c92-4091-837a-d34e3174eb19
|
||
|
CVE-2022-0346 - https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6
|
||
|
CVE-2022-0347 - https://wpscan.com/vulnerability/a5084367-842b-496a-a23c-24dbebac1e8b
|
||
|
CVE-2022-0349 - https://wpscan.com/vulnerability/1d0dd7be-29f3-4043-a9c6-67d02746463a
|
||
|
CVE-2022-0360 - https://wpscan.com/vulnerability/d718b993-4de5-499c-84c9-69801396f51f
|
||
|
CVE-2022-0363 - https://wpscan.com/vulnerability/a438a951-497c-43cd-822f-1a48d4315191
|
||
|
CVE-2022-0364 - https://wpscan.com/vulnerability/0eb40cd5-838e-4b53-994d-22cf7c8a6c50
|
||
|
CVE-2022-0376 - https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932
|
||
|
CVE-2022-0377 - https://wpscan.com/vulnerability/0d95ada6-53e3-4a80-a395-eacd7b090f26
|
||
|
CVE-2022-0383 - https://wpscan.com/vulnerability/e0402753-3a80-455b-9fab-a7d2a7687193
|
||
|
CVE-2022-0384 - https://wpscan.com/vulnerability/91c44c45-994b-4aed-b9f9-7db45924eeb4
|
||
|
CVE-2022-0385 - https://wpscan.com/vulnerability/60067b8b-9fa5-40d1-817a-929779947891
|
||
|
CVE-2022-0388 - https://wpscan.com/vulnerability/7d4ad1f3-6d27-4655-9796-ce370ef5fced
|
||
|
CVE-2022-0389 - https://wpscan.com/vulnerability/788ead78-9aa2-49a3-b191-12114be8270b
|
||
|
CVE-2022-0397 - https://wpscan.com/vulnerability/c8091254-1ced-4363-ab7f-5b880447713d
|
||
|
CVE-2022-0398 - https://wpscan.com/vulnerability/21aec131-91ff-4300-ac7a-0bf31d6b2b24
|
||
|
CVE-2022-0399 - https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164
|
||
|
CVE-2022-0402 - https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/
|
||
|
CVE-2022-0403 - https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e
|
||
|
CVE-2022-0404 - https://wpscan.com/vulnerability/6d0932bb-d515-4432-b67b-16aba34bd285
|
||
|
CVE-2022-0410 - https://wpscan.com/vulnerability/0d6b89f5-cf12-4ad4-831b-fed26763ba20
|
||
|
CVE-2022-0411 - https://wpscan.com/vulnerability/35272197-c973-48ad-8405-538bfbafa172
|
||
|
CVE-2022-0412 - https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682
|
||
|
CVE-2022-0418 - https://wpscan.com/vulnerability/74888a9f-fb75-443d-bb85-0120cbb764a0
|
||
|
CVE-2022-0420 - https://wpscan.com/vulnerability/056b5167-3cbc-47d1-9917-52a434796151
|
||
|
CVE-2022-0421 - https://wpscan.com/vulnerability/145e8d3c-cd6f-4827-86e5-ea2d395a80b9
|
||
|
CVE-2022-0422 - https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc
|
||
|
CVE-2022-0423 - https://wpscan.com/vulnerability/7dde0b9d-9b86-4961-b005-a11b6ffba952
|
||
|
CVE-2022-0424 - https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f
|
||
|
CVE-2022-0426 - https://wpscan.com/vulnerability/de69bcd1-b0b1-4b16-9655-776ee57ad90a
|
||
|
CVE-2022-0427 - https://gitlab.com/gitlab-org/gitlab/-/issues/347284
|
||
|
CVE-2022-0428 - https://wpscan.com/vulnerability/071a2f69-9cd6-42a8-a56c-264a589784ab
|
||
|
CVE-2022-0429 - https://wpscan.com/vulnerability/d1b6f438-f737-4b18-89cf-161238a7421b
|
||
|
CVE-2022-0431 - https://wpscan.com/vulnerability/52bd94df-8816-48fd-8788-38d045eb57ca
|
||
|
CVE-2022-0434 - https://wpscan.com/vulnerability/be895016-7365-4ce4-a54f-f36d0ef2d6f1
|
||
|
CVE-2022-0439 - https://wpscan.com/vulnerability/729d3e67-d081-4a4e-ac1e-f6b0a184f095
|
||
|
CVE-2022-0440 - https://wpscan.com/vulnerability/2239095f-8a66-4a5d-ab49-1662a40fddf1
|
||
|
CVE-2022-0441 - https://wpscan.com/vulnerability/173c2efe-ee9c-4539-852f-c242b4f728ed
|
||
|
CVE-2022-0442 - https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692
|
||
|
CVE-2022-0444 - https://wpscan.com/vulnerability/9567d295-43c7-4e59-9283-c7726f16d40b
|
||
|
CVE-2022-0445 - https://wpscan.com/vulnerability/d9f28255-0026-4c42-9e67-d17b618c2285
|
||
|
CVE-2022-0446 - https://wpscan.com/vulnerability/3fc7986e-3b38-4e16-9516-2ae00bc7a581
|
||
|
CVE-2022-0447 - https://wpscan.com/vulnerability/91ca2cc9-951e-4e96-96ff-3bf131209dbe
|
||
|
CVE-2022-0448 - https://wpscan.com/vulnerability/d4ff63ee-28e6-486e-9aa7-c878b97f707c
|
||
|
CVE-2022-0449 - https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387
|
||
|
CVE-2022-0450 - https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a
|
||
|
CVE-2022-0471 - https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66
|
||
|
CVE-2022-0478 - https://wpscan.com/vulnerability/d881d725-d06b-464f-a25e-88f41b1f431f
|
||
|
CVE-2022-0479 - https://wpscan.com/vulnerability/0d2bbbaf-fbfd-4921-ba4e-684e2e77e816
|
||
|
CVE-2022-0489 - https://gitlab.com/gitlab-org/gitlab/-/issues/341832
|
||
|
CVE-2022-0493 - https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed
|
||
|
CVE-2022-0499 - https://wpscan.com/vulnerability/e9ccf1fc-1dbf-4a41-bf4a-90af20b286d6
|
||
|
CVE-2022-0503 - https://wpscan.com/vulnerability/b6d38e23-3761-4447-a794-1e5077fd953a
|
||
|
CVE-2022-0507 - https://khoori.org/posts/cve-2022-0507/
|
||
|
CVE-2022-0531 - https://wpscan.com/vulnerability/ac5c2a5d-09b6-470b-a598-2972183413ca
|
||
|
CVE-2022-0533 - https://wpscan.com/vulnerability/40f36692-c898-4441-ad24-2dc17856bd74
|
||
|
CVE-2022-0535 - https://wpscan.com/vulnerability/a4162e96-a3c5-4f38-a60b-aa3ed9508985
|
||
|
CVE-2022-0537 - https://wpscan.com/vulnerability/abfbba70-5158-4990-98e5-f302361db367
|
||
|
CVE-2022-0541 - https://wpscan.com/vulnerability/822cac2c-decd-4aa4-9e8e-1ba2d0c080ce
|
||
|
CVE-2022-0543 - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
|
||
|
CVE-2022-0561 - https://gitlab.com/libtiff/libtiff/-/issues/362
|
||
|
CVE-2022-0562 - https://gitlab.com/libtiff/libtiff/-/issues/362
|
||
|
CVE-2022-0583 - https://gitlab.com/wireshark/wireshark/-/issues/17840
|
||
|
CVE-2022-0586 - https://gitlab.com/wireshark/wireshark/-/issues/17813
|
||
|
CVE-2022-0590 - https://wpscan.com/vulnerability/08b66b69-3c69-4a1e-9c0a-5697e31bc04e
|
||
|
CVE-2022-0591 - https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47
|
||
|
CVE-2022-0592 - https://wpscan.com/vulnerability/5d8d53ad-dc88-4b50-a292-fc447484c27b
|
||
|
CVE-2022-0593 - https://wpscan.com/vulnerability/76a50157-04b5-43e8-afbc-a6ddf6d1cba3
|
||
|
CVE-2022-0594 - https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1
|
||
|
CVE-2022-0595 - https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de
|
||
|
CVE-2022-0598 - https://wpscan.com/vulnerability/4688d39e-ac9b-47f5-a4c1-f9548b63c68c
|
||
|
CVE-2022-0599 - https://wpscan.com/vulnerability/4f1d45bc-d3bd-472c-959d-05abeff32765
|
||
|
CVE-2022-0600 - https://wpscan.com/vulnerability/5dd6f625-6738-4e6a-81dc-21c0add4368d
|
||
|
CVE-2022-0601 - https://wpscan.com/vulnerability/6ec62eae-2072-4098-8f77-b22d61a89cbf
|
||
|
CVE-2022-0616 - https://wpscan.com/vulnerability/7c63d76e-34ca-4778-8784-437d446c16e0
|
||
|
CVE-2022-0619 - https://wpscan.com/vulnerability/d18892c6-2b19-4037-bc39-5d170adaf3d9
|
||
|
CVE-2022-0620 - https://wpscan.com/vulnerability/77b92130-167c-4e8a-bde5-3fd1bd6982c6
|
||
|
CVE-2022-0621 - https://wpscan.com/vulnerability/b5578747-298d-4f4b-867e-46b767485a98
|
||
|
CVE-2022-0625 - https://wpscan.com/vulnerability/ec5c331c-fb74-4ccc-a4d4-446c2b4e703a
|
||
|
CVE-2022-0626 - https://wpscan.com/vulnerability/d72164e2-8449-4fb1-aad3-bfa86d645e47
|
||
|
CVE-2022-0627 - https://wpscan.com/vulnerability/fd8c720a-a94a-438f-b686-3a734e3c24e4
|
||
|
CVE-2022-0628 - https://wpscan.com/vulnerability/af9787ee-c496-4f02-a22c-c8f8a97ad902
|
||
|
CVE-2022-0633 - https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3
|
||
|
CVE-2022-0634 - https://wpscan.com/vulnerability/7e11aeb0-b231-407d-86ec-9018c2c7eee3
|
||
|
CVE-2022-0637 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753838
|
||
|
CVE-2022-0640 - https://wpscan.com/vulnerability/f8405e06-9cf3-4acb-aebb-e80fb402daa9
|
||
|
CVE-2022-0641 - https://wpscan.com/vulnerability/0a9830df-5f5d-40a3-9841-40994275136f
|
||
|
CVE-2022-0642 - https://wpscan.com/vulnerability/099cf9b4-0b3a-43c6-8ca9-7c2d50f86425
|
||
|
CVE-2022-0643 - https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24c
|
||
|
CVE-2022-0647 - https://wpscan.com/vulnerability/4a585d5f-72ba-43e3-b04f-8b3e1b84444a
|
||
|
CVE-2022-0648 - https://wpscan.com/vulnerability/90f9ad6a-4855-4a8e-97f6-5f403eb6455d
|
||
|
CVE-2022-0649 - https://wpscan.com/vulnerability/284fbc98-803d-4da5-8920-411eeae4bac8
|
||
|
CVE-2022-0656 - https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151
|
||
|
CVE-2022-0657 - https://wpscan.com/vulnerability/e7fe8218-4ef5-4ef9-9850-8567c207e8e6
|
||
|
CVE-2022-0658 - https://wpscan.com/vulnerability/d7f0805a-61ce-454a-96fb-5ecacd767578
|
||
|
CVE-2022-0659 - https://wpscan.com/vulnerability/22dc2661-ba64-49e7-af65-892a617ab02c
|
||
|
CVE-2022-0661 - https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd
|
||
|
CVE-2022-0662 - https://wpscan.com/vulnerability/27ad58ba-b648-41d9-8074-16e4feeaee69
|
||
|
CVE-2022-0663 - https://wpscan.com/vulnerability/b586b217-f91e-42d3-81f1-cc3ee3a4b01e
|
||
|
CVE-2022-0674 - https://wpscan.com/vulnerability/332e1e1e-7420-4605-99bc-4074e212ff9b
|
||
|
CVE-2022-0679 - https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8
|
||
|
CVE-2022-0680 - https://wpscan.com/vulnerability/7cede02e-9af7-4f50-95a8-84ef4c7f7ded
|
||
|
CVE-2022-0681 - https://wpscan.com/vulnerability/c5765816-4439-4c14-a847-044248ada0ef
|
||
|
CVE-2022-0684 - https://wpscan.com/vulnerability/69b178f3-5951-4879-9bbe-183951d002ec
|
||
|
CVE-2022-0687 - https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c
|
||
|
CVE-2022-0693 - https://wpscan.com/vulnerability/a72bf075-fd4b-4aa5-b4a4-5f62a0620643
|
||
|
CVE-2022-0694 - https://wpscan.com/vulnerability/990d1b0a-dbd1-42d0-9a40-c345407c6fe0
|
||
|
CVE-2022-0700 - https://wpscan.com/vulnerability/1bf1f255-1571-425c-92b1-02833f6a44a7
|
||
|
CVE-2022-0701 - https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1
|
||
|
CVE-2022-0702 - https://wpscan.com/vulnerability/bf6f897b-af65-4122-802c-ae6d4f2346f9
|
||
|
CVE-2022-0703 - https://wpscan.com/vulnerability/fa34beff-c8ab-4297-9c59-b3b0c52f0536
|
||
|
CVE-2022-0706 - https://wpscan.com/vulnerability/598d5c1b-7930-46a6-9a31-5e08a5f14907
|
||
|
CVE-2022-0707 - https://wpscan.com/vulnerability/50680797-61e4-4737-898f-e5b394d89117
|
||
|
CVE-2022-0709 - https://wpscan.com/vulnerability/3cd1d8d2-d2a4-45a9-9b5f-c2a56f08be85
|
||
|
CVE-2022-0720 - https://wpscan.com/vulnerability/435ef99c-9210-46c7-80a4-09cd4d3d00cf
|
||
|
CVE-2022-0725 - https://bugzilla.redhat.com/show_bug.cgi?id=2052696
|
||
|
CVE-2022-0728 - https://wpscan.com/vulnerability/c6d3d308-4bf1-493f-86e9-dd623526e3c6
|
||
|
CVE-2022-0737 - https://wpscan.com/vulnerability/a5c9fa61-e6f1-4460-84fe-977a203bd4bc
|
||
|
CVE-2022-0739 - https://wpscan.com/vulnerability/388cd42d-b61a-42a4-8604-99b812db2357
|
||
|
CVE-2022-0745 - https://wpscan.com/vulnerability/180f8e87-1463-43bb-a901-80031127723a
|
||
|
CVE-2022-0747 - https://wpscan.com/vulnerability/a8575322-c2cf-486a-9c37-71a22167aac3
|
||
|
CVE-2022-0748 - https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737
|
||
|
CVE-2022-0749 - https://snyk.io/vuln/SNYK-DOTNET-SINGOOCMSUTILITY-2312979
|
||
|
CVE-2022-0751 - https://gitlab.com/gitlab-org/gitlab/-/issues/349382
|
||
|
CVE-2022-0760 - https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210
|
||
|
CVE-2022-0765 - https://wpscan.com/vulnerability/58838f51-323d-41e0-8c85-8e113dc2c587
|
||
|
CVE-2022-0769 - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141
|
||
|
CVE-2022-0770 - https://wpscan.com/vulnerability/49abe79c-ab1c-4dbf-824c-8daaac7e079d
|
||
|
CVE-2022-0771 - https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75
|
||
|
CVE-2022-0773 - https://wpscan.com/vulnerability/55b89de0-30ed-4f98-935e-51f069faf6fc
|
||
|
CVE-2022-0775 - https://wpscan.com/vulnerability/b76dbf37-a0a2-48cf-bd85-3ebbc2f394dd/
|
||
|
CVE-2022-0779 - https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd
|
||
|
CVE-2022-0780 - https://wpscan.com/vulnerability/0ee7d1a8-9782-4db5-b055-e732f2763825
|
||
|
CVE-2022-0781 - https://wpscan.com/vulnerability/1a8f9c7b-a422-4f45-a516-c3c14eb05161
|
||
|
CVE-2022-0782 - https://wpscan.com/vulnerability/b81e824c-d2b1-4381-abee-18c42bb5c2f5
|
||
|
CVE-2022-0783 - https://wpscan.com/vulnerability/4d594424-8048-482d-b61c-45be1e97a8ba
|
||
|
CVE-2022-0784 - https://wpscan.com/vulnerability/6672b59f-14bc-4a22-9e0b-fcab4e01d97f
|
||
|
CVE-2022-0785 - https://wpscan.com/vulnerability/e1e09f56-89a4-4d6f-907b-3fb2cb825255
|
||
|
CVE-2022-0786 - https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30
|
||
|
CVE-2022-0787 - https://wpscan.com/vulnerability/69329a8a-2cbe-4f99-a367-b152bd85b3dd
|
||
|
CVE-2022-0788 - https://wpscan.com/vulnerability/fbc71710-123f-4c61-9796-a6a4fd354828
|
||
|
CVE-2022-0814 - https://wpscan.com/vulnerability/fd84dc08-0079-4fcf-81c3-a61d652e3269
|
||
|
CVE-2022-0817 - https://wpscan.com/vulnerability/69263610-f454-4f27-80af-be523d25659e
|
||
|
CVE-2022-0818 - https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b
|
||
|
CVE-2022-0824 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html
|
||
|
CVE-2022-0825 - https://wpscan.com/vulnerability/1a92a65f-e9df-41b5-9a1c-8e24ee9bf50e
|
||
|
CVE-2022-0826 - https://wpscan.com/vulnerability/7a3eed3b-c643-4e24-b833-eba60ab631c5
|
||
|
CVE-2022-0827 - https://wpscan.com/vulnerability/0d208ebc-7805-457b-aa5f-ffd5adb2f3be
|
||
|
CVE-2022-0828 - https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb
|
||
|
CVE-2022-0829 - https://huntr.dev/bounties/f2d0389f-d7d1-4f34-9f9d-268b0a0da05e
|
||
|
CVE-2022-0829 - https://notes.netbytesec.com/2022/03/webmin-broken-access-control-to-post-auth-rce.html
|
||
|
CVE-2022-0830 - https://wpscan.com/vulnerability/114c0202-39f8-4748-ac0d-013d2d6f02f7
|
||
|
CVE-2022-0833 - https://wpscan.com/vulnerability/b2c7c1e8-d72c-4b1e-b5cb-dc2a6538965d
|
||
|
CVE-2022-0836 - https://wpscan.com/vulnerability/2a226ae8-7d9c-4f47-90af-8a399a08f03f
|
||
|
CVE-2022-0837 - https://wpscan.com/vulnerability/0882e5c0-f319-4994-9346-aa18438fda6a
|
||
|
CVE-2022-0838 - https://huntr.dev/bounties/bd2fb1f1-cc8b-4ef7-8e2b-4ca686d8d614
|
||
|
CVE-2022-0839 - https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70
|
||
|
CVE-2022-0839 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-0840 - https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df
|
||
|
CVE-2022-0841 - https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1
|
||
|
CVE-2022-0845 - https://huntr.dev/bounties/a795bf93-c91e-4c79-aae8-f7d8bda92e2a
|
||
|
CVE-2022-0846 - https://wpscan.com/vulnerability/b030296d-688e-44a4-a48a-140375f2c5f4
|
||
|
CVE-2022-0847 - http://packetstormsecurity.com/files/166229/Dirty-Pipe-Linux-Privilege-Escalation.html
|
||
|
CVE-2022-0847 - http://packetstormsecurity.com/files/166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html
|
||
|
CVE-2022-0847 - http://packetstormsecurity.com/files/166258/Dirty-Pipe-Local-Privilege-Escalation.html
|
||
|
CVE-2022-0847 - http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html
|
||
|
CVE-2022-0847 - https://dirtypipe.cm4all.com/
|
||
|
CVE-2022-0848 - http://packetstormsecurity.com/files/166217/part-db-0.5.11-Remote-Code-Execution.html
|
||
|
CVE-2022-0848 - https://huntr.dev/bounties/3e91685f-cfb9-4ee4-abaf-9b712a8fd5a6
|
||
|
CVE-2022-0849 - https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24
|
||
|
CVE-2022-0849 - https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6
|
||
|
CVE-2022-0850 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
|
||
|
CVE-2022-0854 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
|
||
|
CVE-2022-0856 - https://github.com/cacalabs/libcaca/issues/65
|
||
|
CVE-2022-0860 - https://huntr.dev/bounties/c458b868-63df-414e-af10-47e3745caa1d
|
||
|
CVE-2022-0863 - https://wpscan.com/vulnerability/a30212a0-c910-4657-aee1-4a2d72c77983
|
||
|
CVE-2022-0864 - http://packetstormsecurity.com/files/166631/WordPress-UpdraftPlus-Cross-Site-Scripting.html
|
||
|
CVE-2022-0864 - https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872
|
||
|
CVE-2022-0865 - https://gitlab.com/libtiff/libtiff/-/issues/385
|
||
|
CVE-2022-0867 - https://wpscan.com/vulnerability/62803aae-9896-410b-9398-3497a838e494
|
||
|
CVE-2022-0868 - https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02
|
||
|
CVE-2022-0869 - https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342
|
||
|
CVE-2022-0870 - https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531
|
||
|
CVE-2022-0871 - https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62
|
||
|
CVE-2022-0873 - https://wpscan.com/vulnerability/d5ce4b8a-9aa5-4df8-b521-c2105990a87e
|
||
|
CVE-2022-0874 - https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810
|
||
|
CVE-2022-0875 - https://wpscan.com/vulnerability/fefc1411-594d-465b-aeb9-78c141b23762
|
||
|
CVE-2022-0876 - https://wpscan.com/vulnerability/73be6e92-ea37-4416-977d-52ee2afa022a
|
||
|
CVE-2022-0877 - https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c
|
||
|
CVE-2022-0879 - https://wpscan.com/vulnerability/c12f6087-1875-4edf-ac32-bec6f712968d
|
||
|
CVE-2022-0881 - https://huntr.dev/bounties/2628431e-6a98-4063-a0e3-a8b1d9ebaa9c
|
||
|
CVE-2022-0884 - https://wpscan.com/vulnerability/af06b96c-105f-429c-b2ad-c8c823897dba
|
||
|
CVE-2022-0885 - https://wpscan.com/vulnerability/8b08b72e-5584-4f25-ab73-5ab0f47412df
|
||
|
CVE-2022-0887 - https://wpscan.com/vulnerability/a6c1676d-9dcb-45f6-833a-9545bccd0ad6
|
||
|
CVE-2022-0888 - https://gist.github.com/Xib3rR4dAr/5f0accbbfdee279c68ed144da9cd8607
|
||
|
CVE-2022-0890 - https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276
|
||
|
CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/380
|
||
|
CVE-2022-0891 - https://gitlab.com/libtiff/libtiff/-/issues/382
|
||
|
CVE-2022-0892 - https://wpscan.com/vulnerability/e5d95261-a243-493f-be6a-3c15ccb65435
|
||
|
CVE-2022-0893 - https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9
|
||
|
CVE-2022-0894 - https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95
|
||
|
CVE-2022-0895 - https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d
|
||
|
CVE-2022-0896 - https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0
|
||
|
CVE-2022-0898 - https://wpscan.com/vulnerability/f51d8345-3927-4be2-8145-e201371c8c43
|
||
|
CVE-2022-0899 - https://wpscan.com/vulnerability/1772417a-1abb-4d97-9694-1254840defd1
|
||
|
CVE-2022-0901 - http://packetstormsecurity.com/files/166626/WordPress-Ad-Inserter-Cross-Site-Scripting.html
|
||
|
CVE-2022-0901 - https://wpscan.com/vulnerability/85582b4f-a40a-4394-9834-0c88c5dc57ba
|
||
|
CVE-2022-0903 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-0904 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-0905 - https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb
|
||
|
CVE-2022-0906 - https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8
|
||
|
CVE-2022-0907 - https://gitlab.com/libtiff/libtiff/-/issues/392
|
||
|
CVE-2022-0908 - https://gitlab.com/libtiff/libtiff/-/issues/383
|
||
|
CVE-2022-0909 - https://gitlab.com/libtiff/libtiff/-/issues/393
|
||
|
CVE-2022-0911 - https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77
|
||
|
CVE-2022-0912 - https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54
|
||
|
CVE-2022-0913 - https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f
|
||
|
CVE-2022-0914 - https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930
|
||
|
CVE-2022-0919 - https://wpscan.com/vulnerability/e8f32e0b-4a89-460b-bb78-7c83ef5e16b4
|
||
|
CVE-2022-0920 - https://wpscan.com/vulnerability/5a5ab7a8-be67-4f70-925c-9cb1eff2fbe0
|
||
|
CVE-2022-0921 - https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622
|
||
|
CVE-2022-0924 - https://gitlab.com/libtiff/libtiff/-/issues/278
|
||
|
CVE-2022-0926 - https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17
|
||
|
CVE-2022-0928 - https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd
|
||
|
CVE-2022-0929 - https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03
|
||
|
CVE-2022-0930 - https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993
|
||
|
CVE-2022-0935 - https://huntr.dev/bounties/a7e40fdf-a333-4a50-8a53-d11b16ce3ec2
|
||
|
CVE-2022-0936 - https://huntr.dev/bounties/90701766-bfed-409e-b3dd-6ff884373968
|
||
|
CVE-2022-0937 - https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5
|
||
|
CVE-2022-0938 - https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e
|
||
|
CVE-2022-0939 - https://huntr.dev/bounties/768fd7e2-a767-4d8d-a517-e9dda849c6e4
|
||
|
CVE-2022-0940 - https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782
|
||
|
CVE-2022-0941 - https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc
|
||
|
CVE-2022-0942 - https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9
|
||
|
CVE-2022-0943 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-0943 - https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
|
||
|
CVE-2022-0944 - https://huntr.dev/bounties/46630727-d923-4444-a421-537ecd63e7fb
|
||
|
CVE-2022-0945 - https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e
|
||
|
CVE-2022-0946 - https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1
|
||
|
CVE-2022-0948 - https://wpscan.com/vulnerability/daad48df-6a25-493f-9d1d-17b897462576
|
||
|
CVE-2022-0949 - https://wpscan.com/vulnerability/a0fbb79a-e160-49df-9cf2-18ab64ea66cb
|
||
|
CVE-2022-0950 - https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc
|
||
|
CVE-2022-0951 - https://huntr.dev/bounties/b3a983a3-17f9-4aa8-92d7-8a0c92a93932
|
||
|
CVE-2022-0952 - https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b
|
||
|
CVE-2022-0953 - https://wpscan.com/vulnerability/29ab3c7b-58e0-4a72-b7b4-ab12a6d54f5a
|
||
|
CVE-2022-0954 - https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26
|
||
|
CVE-2022-0955 - https://huntr.dev/bounties/708971a6-1e6c-4c51-a411-255caeba51df
|
||
|
CVE-2022-0956 - https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2
|
||
|
CVE-2022-0957 - https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21
|
||
|
CVE-2022-0958 - https://wpscan.com/vulnerability/05034521-6eb9-43b9-8f03-7e0de60e3022
|
||
|
CVE-2022-0960 - https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e
|
||
|
CVE-2022-0961 - https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436
|
||
|
CVE-2022-0962 - https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908
|
||
|
CVE-2022-0963 - https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c
|
||
|
CVE-2022-0964 - https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0
|
||
|
CVE-2022-0965 - https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347
|
||
|
CVE-2022-0966 - https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe
|
||
|
CVE-2022-0967 - http://packetstormsecurity.com/files/167198/Showdoc-2.10.3-Cross-Site-Scripting.html
|
||
|
CVE-2022-0967 - https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a
|
||
|
CVE-2022-0968 - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e
|
||
|
CVE-2022-0969 - https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf
|
||
|
CVE-2022-0970 - https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec
|
||
|
CVE-2022-0986 - https://huntr.dev/bounties/57635c78-303f-412f-b75a-623df9fa9edd
|
||
|
CVE-2022-0989 - https://wpscan.com/vulnerability/a6bfc150-8e3f-4b2d-a6e1-09406af41dd4
|
||
|
CVE-2022-0990 - https://huntr.dev/bounties/31649903-c19c-4dae-aee0-a04b095855c5
|
||
|
CVE-2022-0991 - https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4
|
||
|
CVE-2022-0994 - https://wpscan.com/vulnerability/e9dd62fc-bb79-4a6b-b99c-60e40f010d7a
|
||
|
CVE-2022-0995 - http://packetstormsecurity.com/files/166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html
|
||
|
CVE-2022-0995 - http://packetstormsecurity.com/files/166815/Watch-Queue-Out-Of-Bounds-Write.html
|
||
|
CVE-2022-0995 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93ce93587d36493f2f86921fa79921b3cba63fbb
|
||
|
CVE-2022-0996 - https://github.com/ByteHackr/389-ds-base
|
||
|
CVE-2022-1000 - https://huntr.dev/bounties/5995a93f-0c4b-4f7d-aa59-a64424219424
|
||
|
CVE-2022-1001 - https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb
|
||
|
CVE-2022-1002 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1003 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1005 - https://wpscan.com/vulnerability/f37d1d55-10cc-4202-8d16-9ec2128f54f9
|
||
|
CVE-2022-1006 - https://wpscan.com/vulnerability/c5569317-b8c8-4524-8375-3e2369bdcc68
|
||
|
CVE-2022-1007 - https://wpscan.com/vulnerability/6f5b764b-d13b-4371-9cc5-91204d9d6358
|
||
|
CVE-2022-1008 - https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082
|
||
|
CVE-2022-1009 - https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e
|
||
|
CVE-2022-1010 - https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b
|
||
|
CVE-2022-1011 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-1013 - https://wpscan.com/vulnerability/eed70659-9e3e-42a2-b427-56c52e0fbc0d
|
||
|
CVE-2022-1014 - https://wpscan.com/vulnerability/eb9e202d-04aa-4343-86a2-4aa2edaa7f6b
|
||
|
CVE-2022-1015 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
|
||
|
CVE-2022-1015 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
||
|
CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/01/13/2
|
||
|
CVE-2022-1015 - http://www.openwall.com/lists/oss-security/2023/02/23/1
|
||
|
CVE-2022-1016 - http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
|
||
|
CVE-2022-1020 - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5
|
||
|
CVE-2022-1021 - https://huntr.dev/bounties/a8187478-75e1-4d62-b894-651269401ca3
|
||
|
CVE-2022-1022 - https://huntr.dev/bounties/2e4ac6b5-7357-415d-9633-65c636b20e94
|
||
|
CVE-2022-1023 - https://wpscan.com/vulnerability/163069cd-98a8-4cfb-8b58-a6727a7d5c48
|
||
|
CVE-2022-1026 - https://www.rapid7.com/blog/post/2022/03/29/cve-2022-1026-kyocera-net-view-address-book-exposure/
|
||
|
CVE-2022-1027 - https://wpscan.com/vulnerability/9dbb0d6d-bc84-4b85-8aa5-fa2a8e6fa5e3
|
||
|
CVE-2022-1028 - https://wpscan.com/vulnerability/16fc08ec-8476-4f3c-93ea-6a51ed880dd5
|
||
|
CVE-2022-1029 - https://wpscan.com/vulnerability/0e74eeb4-89e2-4873-904f-ad4f25c4a8ba
|
||
|
CVE-2022-1031 - https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457
|
||
|
CVE-2022-1032 - https://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622
|
||
|
CVE-2022-1033 - https://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045
|
||
|
CVE-2022-1034 - https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7
|
||
|
CVE-2022-1037 - https://wpscan.com/vulnerability/bd8555bd-8086-41d0-a1f7-3557bc3af957
|
||
|
CVE-2022-1040 - http://packetstormsecurity.com/files/168046/Sophos-XG115w-Firewall-17.0.10-MR-10-Authentication-Bypass.html
|
||
|
CVE-2022-1040 - https://www.exploit-db.com/exploits/51006
|
||
|
CVE-2022-1043 - http://packetstormsecurity.com/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html
|
||
|
CVE-2022-1044 - https://huntr.dev/bounties/ff878be9-563a-4d0e-99c1-fc3c767f6d3e
|
||
|
CVE-2022-1045 - https://huntr.dev/bounties/b0c4f992-4ac8-4479-82f4-367ed1a2a826
|
||
|
CVE-2022-1046 - https://wpscan.com/vulnerability/a1ae4512-0b5b-4f36-8334-14633bf24758
|
||
|
CVE-2022-1047 - https://wpscan.com/vulnerability/078bd5f6-64f7-4665-825b-9fd0c2b7b91b
|
||
|
CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5
|
||
|
CVE-2022-1049 - https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5/
|
||
|
CVE-2022-1051 - https://wpscan.com/vulnerability/cb2fa587-da2f-460e-a402-225df7744765
|
||
|
CVE-2022-1052 - https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7
|
||
|
CVE-2022-1054 - https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d
|
||
|
CVE-2022-1055 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
||
|
CVE-2022-1055 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
|
||
|
CVE-2022-1056 - https://gitlab.com/libtiff/libtiff/-/issues/391
|
||
|
CVE-2022-1057 - https://wpscan.com/vulnerability/7c33ffc3-84d1-4a0f-a837-794cdc3ad243
|
||
|
CVE-2022-1058 - https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d
|
||
|
CVE-2022-1061 - https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522
|
||
|
CVE-2022-1061 - https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7
|
||
|
CVE-2022-1062 - https://wpscan.com/vulnerability/e770ba87-95d2-40c9-89cc-5d7390e9cbb0
|
||
|
CVE-2022-1063 - https://wpscan.com/vulnerability/f90c528b-8c3a-4f9a-aa36-099c24abe082
|
||
|
CVE-2022-1064 - https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40
|
||
|
CVE-2022-1065 - https://www.redguard.ch/advisories/abacus_mfa_bypass.txt
|
||
|
CVE-2022-1071 - https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3
|
||
|
CVE-2022-1073 - https://vuldb.com/?id.194839
|
||
|
CVE-2022-1074 - https://vuldb.com/?id.194845
|
||
|
CVE-2022-1075 - https://vuldb.com/?id.194846
|
||
|
CVE-2022-1077 - https://vuldb.com/?id.194848
|
||
|
CVE-2022-1078 - https://vuldb.com/?id.194856
|
||
|
CVE-2022-1079 - https://vuldb.com/?id.195426
|
||
|
CVE-2022-1081 - https://vuldb.com/?id.195640
|
||
|
CVE-2022-1082 - https://vuldb.com/?id.195641
|
||
|
CVE-2022-1083 - https://vuldb.com/?id.195642
|
||
|
CVE-2022-1084 - https://vuldb.com/?id.195643
|
||
|
CVE-2022-1085 - https://vuldb.com/?id.194857
|
||
|
CVE-2022-1086 - https://github.com/xiahao90/CVEproject/blob/main/DolphinPHPV1.5.0_xss.md
|
||
|
CVE-2022-1086 - https://vuldb.com/?id.195368
|
||
|
CVE-2022-1087 - https://github.com/liaojia-99/project/blob/main/htmly/1.md
|
||
|
CVE-2022-1087 - https://vuldb.com/?id.195203
|
||
|
CVE-2022-1088 - https://wpscan.com/vulnerability/e86d456d-7a54-43e8-acf1-0b6a0a8bb41b
|
||
|
CVE-2022-1089 - https://wpscan.com/vulnerability/75a9fd23-7fa9-4cb1-a55b-ec5deae5d6fa
|
||
|
CVE-2022-1090 - https://wpscan.com/vulnerability/3993fa42-b4c3-462b-b568-0a08fe112c19
|
||
|
CVE-2022-1091 - https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3
|
||
|
CVE-2022-1092 - https://wpscan.com/vulnerability/95759d5c-8802-4493-b7e5-7f2bc546af61
|
||
|
CVE-2022-1093 - https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553
|
||
|
CVE-2022-1094 - https://wpscan.com/vulnerability/3c03816b-e381-481c-b9f5-63d0c24ff329
|
||
|
CVE-2022-1095 - https://wpscan.com/vulnerability/bf476a3e-05ba-4b54-8a65-3d261ad5337b
|
||
|
CVE-2022-1103 - https://wpscan.com/vulnerability/9ddeef95-7c7f-4296-a55b-fd3304c91c18
|
||
|
CVE-2022-1104 - https://wpscan.com/vulnerability/4d4709f3-ad38-4519-a24a-73bc04b20e52
|
||
|
CVE-2022-1106 - https://huntr.dev/bounties/16b9d0ea-71ed-41bc-8a88-2deb4c20be8f
|
||
|
CVE-2022-1112 - https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505
|
||
|
CVE-2022-1113 - https://wpscan.com/vulnerability/ea438e84-f842-4cb9-b6c0-550cd8187701
|
||
|
CVE-2022-1115 - https://github.com/ImageMagick/ImageMagick/issues/4974
|
||
|
CVE-2022-1116 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
||
|
CVE-2022-1119 - https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit
|
||
|
CVE-2022-1119 - https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606
|
||
|
CVE-2022-1122 - https://github.com/uclouvain/openjpeg/issues/1368
|
||
|
CVE-2022-1123 - https://wpscan.com/vulnerability/03e0d4d5-0184-4a15-b8ac-fdc2010e4812
|
||
|
CVE-2022-1134 - http://packetstormsecurity.com/files/172851/Chrome-Renderer-Type-Confusion-Remote-Code-Execution.html
|
||
|
CVE-2022-1148 - https://gitlab.com/gitlab-org/gitlab/-/issues/350687
|
||
|
CVE-2022-1152 - https://wpscan.com/vulnerability/1c55fda9-e938-4267-be77-a6d73ee46af3
|
||
|
CVE-2022-1153 - https://wpscan.com/vulnerability/1d9d5516-f1c3-4134-b6bf-7f2f890533c4
|
||
|
CVE-2022-1154 - https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
|
||
|
CVE-2022-1154 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-1155 - https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1
|
||
|
CVE-2022-1156 - https://wpscan.com/vulnerability/76ad4273-6bf4-41e9-99a8-bf6d634608ac
|
||
|
CVE-2022-1160 - https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c
|
||
|
CVE-2022-1162 - http://packetstormsecurity.com/files/166828/Gitlab-14.9-Authentication-Bypass.html
|
||
|
CVE-2022-1163 - http://packetstormsecurity.com/files/166629/minewebcms-1.15.2-Cross-Site-Scripting.html
|
||
|
CVE-2022-1163 - https://huntr.dev/bounties/44d40f34-c391-40c0-a517-12a2c0258149
|
||
|
CVE-2022-1163 - https://www.exploit-db.com/exploits/50853
|
||
|
CVE-2022-1164 - https://wpscan.com/vulnerability/157a9a76-3e5f-4d27-aefc-cb9cb88b3286
|
||
|
CVE-2022-1165 - https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710
|
||
|
CVE-2022-1166 - https://wpscan.com/vulnerability/ea6646ac-f71f-4340-965d-fab272da5189
|
||
|
CVE-2022-1167 - https://wpscan.com/vulnerability/a30a1430-c474-4cd1-877c-35c4ab624170
|
||
|
CVE-2022-1168 - https://wpscan.com/vulnerability/bcf38e87-011e-4540-8bfb-c93443a4a490
|
||
|
CVE-2022-1169 - https://wpscan.com/vulnerability/f3a1dcad-528a-4ecc-ac8e-728caa7c9878
|
||
|
CVE-2022-1170 - https://wpscan.com/vulnerability/2ecb18e6-b575-4a20-bd31-94d24f1d1efc
|
||
|
CVE-2022-1171 - https://wpscan.com/vulnerability/dc5eace4-542f-47e9-b870-a6aae6a38b0f
|
||
|
CVE-2022-1172 - https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264
|
||
|
CVE-2022-1173 - https://huntr.dev/bounties/b6016e95-9f48-4945-89cb-199b6e072218
|
||
|
CVE-2022-1174 - https://gitlab.com/gitlab-org/gitlab/-/issues/338721
|
||
|
CVE-2022-1175 - http://packetstormsecurity.com/files/166829/Gitlab-14.9-Cross-Site-Scripting.html
|
||
|
CVE-2022-1176 - https://huntr.dev/bounties/3e30171b-c9bf-415c-82f1-6f55a44d09d3
|
||
|
CVE-2022-1182 - https://wpscan.com/vulnerability/01d108bb-d134-4651-9c74-babcc88da177
|
||
|
CVE-2022-1185 - https://gitlab.com/gitlab-org/gitlab/-/issues/349148
|
||
|
CVE-2022-1191 - https://huntr.dev/bounties/7264a2e1-17e7-4244-93e4-49ec14f282b3
|
||
|
CVE-2022-1192 - https://wpscan.com/vulnerability/18660c71-5a89-4ef6-b0dd-7a166e3449d6
|
||
|
CVE-2022-1193 - https://gitlab.com/gitlab-org/gitlab/-/issues/351823
|
||
|
CVE-2022-1194 - https://wpscan.com/vulnerability/62be0991-f095-43cf-a167-3daaed254594
|
||
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0b9111922b1f399aba6ed1e1b8f2079c3da1aed8
|
||
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e0588c291d6ce225f2b891753ca41d45ba42469
|
||
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
|
||
|
CVE-2022-1195 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b2f37aead1b82a770c48b5d583f35ec22aabb61e
|
||
|
CVE-2022-1196 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750679
|
||
|
CVE-2022-1201 - https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b
|
||
|
CVE-2022-1202 - https://wpscan.com/vulnerability/53c8190c-baef-4807-970b-f01ab440576a
|
||
|
CVE-2022-1203 - https://wpscan.com/vulnerability/3c9969e5-ca8e-4e5d-a482-c6b5c4257820
|
||
|
CVE-2022-1207 - https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb
|
||
|
CVE-2022-1210 - https://gitlab.com/libtiff/libtiff/-/issues/402
|
||
|
CVE-2022-1210 - https://vuldb.com/?id.196363
|
||
|
CVE-2022-1211 - https://github.com/tildearrow/furnace/issues/325
|
||
|
CVE-2022-1211 - https://vuldb.com/?id.196371
|
||
|
CVE-2022-1212 - https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe
|
||
|
CVE-2022-1213 - https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1
|
||
|
CVE-2022-1216 - https://wpscan.com/vulnerability/31a5b138-3d9e-4cd6-b85c-d20406ab51bd
|
||
|
CVE-2022-1217 - https://wpscan.com/vulnerability/15875f52-7a49-44c7-8a36-b49ddf37c20c
|
||
|
CVE-2022-1218 - https://wpscan.com/vulnerability/fc1e8681-9229-4645-bc22-4897522d0c65
|
||
|
CVE-2022-1219 - https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6
|
||
|
CVE-2022-1220 - https://wpscan.com/vulnerability/eb58f43e-4304-40e7-9e0f-d0d6fe049724
|
||
|
CVE-2022-1221 - https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9
|
||
|
CVE-2022-1222 - https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d
|
||
|
CVE-2022-1223 - https://huntr.dev/bounties/baec4c23-2466-4b13-b3c0-eaf1d000d4ab
|
||
|
CVE-2022-1224 - https://huntr.dev/bounties/cd9e1508-5682-427e-a921-14b4f520b85a
|
||
|
CVE-2022-1225 - https://huntr.dev/bounties/49b44cfa-d142-4d79-b529-7805507169d2
|
||
|
CVE-2022-1231 - https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604
|
||
|
CVE-2022-1233 - https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c
|
||
|
CVE-2022-1235 - https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705
|
||
|
CVE-2022-1237 - https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40
|
||
|
CVE-2022-1238 - https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200
|
||
|
CVE-2022-1239 - https://wpscan.com/vulnerability/4ad2bb96-87a4-4590-a058-b03b33d2fcee
|
||
|
CVE-2022-1240 - https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc
|
||
|
CVE-2022-1241 - https://wpscan.com/vulnerability/3258393a-eafb-4356-994e-2ff8ce223c9b
|
||
|
CVE-2022-1243 - https://huntr.dev/bounties/8c5afc47-1553-4eba-a98e-024e4cc3dfb7
|
||
|
CVE-2022-1244 - https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82
|
||
|
CVE-2022-1247 - https://bugzilla.redhat.com/show_bug.cgi?id=2066799
|
||
|
CVE-2022-1248 - http://packetstormsecurity.com/files/166609/SAP-Information-System-1.0.0-Missing-Authorization.html
|
||
|
CVE-2022-1248 - https://vuldb.com/?id.196550
|
||
|
CVE-2022-1250 - https://wpscan.com/vulnerability/1f8cb0b9-7447-44db-8d13-292db5b17718
|
||
|
CVE-2022-1251 - https://wpscan.com/vulnerability/34b3fc35-381a-4bd7-87e3-f1ef0a15a349
|
||
|
CVE-2022-1252 - https://0g.vc/posts/insecure-cipher-gnuboard5/
|
||
|
CVE-2022-1252 - https://huntr.dev/bounties/c8c2c3e1-67d0-4a11-a4d4-11af567a9ebb
|
||
|
CVE-2022-1253 - https://huntr.dev/bounties/1-other-strukturag/libde265
|
||
|
CVE-2022-1255 - https://wpscan.com/vulnerability/22fe68c4-8f47-491e-be87-5e8e40535a82
|
||
|
CVE-2022-1256 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
||
|
CVE-2022-1257 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
||
|
CVE-2022-1258 - https://kc.mcafee.com/corporate/index?page=content&id=SB10382
|
||
|
CVE-2022-1263 - https://www.openwall.com/lists/oss-security/2022/04/07/1
|
||
|
CVE-2022-1265 - https://wpscan.com/vulnerability/9b66819d-8479-4c0b-b206-7f7ff769f758
|
||
|
CVE-2022-1266 - https://wpscan.com/vulnerability/7800d583-fcfc-4360-9dc3-af3f73e12ab4
|
||
|
CVE-2022-1267 - https://wpscan.com/vulnerability/ed2971c2-b99c-4320-ac46-bea5a0a493ed
|
||
|
CVE-2022-1268 - https://wpscan.com/vulnerability/6d596afb-cac3-4ef2-9742-235c068d1006
|
||
|
CVE-2022-1269 - https://wpscan.com/vulnerability/65ff0e71-0fcd-4357-9b00-143cb18901bf
|
||
|
CVE-2022-1273 - https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603
|
||
|
CVE-2022-1274 - https://herolab.usd.de/security-advisories/usd-2021-0033/
|
||
|
CVE-2022-1275 - https://wpscan.com/vulnerability/bc2e5be3-cd2b-4ee9-8d7a-cabce46b7092
|
||
|
CVE-2022-1276 - https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25
|
||
|
CVE-2022-1280 - https://www.openwall.com/lists/oss-security/2022/04/12/3
|
||
|
CVE-2022-1281 - https://wpscan.com/vulnerability/2b4866f2-f511-41c6-8135-cf1e0263d8de
|
||
|
CVE-2022-1282 - https://wpscan.com/vulnerability/37a58f4e-d2bc-4825-8e1b-4aaf0a1cf1b6
|
||
|
CVE-2022-1283 - https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013
|
||
|
CVE-2022-1284 - https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7
|
||
|
CVE-2022-1285 - https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d
|
||
|
CVE-2022-1286 - https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189
|
||
|
CVE-2022-1287 - https://vuldb.com/?id.196750
|
||
|
CVE-2022-1288 - https://vuldb.com/?id.196751
|
||
|
CVE-2022-1289 - https://github.com/tildearrow/furnace/issues/325#issuecomment-1094139655
|
||
|
CVE-2022-1290 - https://huntr.dev/bounties/da6d03e6-053f-43b6-99a7-78c2e386e3ed
|
||
|
CVE-2022-1291 - https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5
|
||
|
CVE-2022-1292 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-1294 - https://wpscan.com/vulnerability/205a24b8-6d14-4458-aecd-79748e1324c7
|
||
|
CVE-2022-1295 - https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a
|
||
|
CVE-2022-1296 - https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0
|
||
|
CVE-2022-1297 - https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac
|
||
|
CVE-2022-1298 - https://wpscan.com/vulnerability/e124d1ab-3e02-4ca5-8218-ce635e8bf074
|
||
|
CVE-2022-1299 - https://wpscan.com/vulnerability/8c46adb1-82d7-4621-a8c3-15cd90e98b96
|
||
|
CVE-2022-1301 - https://wpscan.com/vulnerability/69b75983-1010-453e-bf67-27b4a2a327a8
|
||
|
CVE-2022-1303 - https://wpscan.com/vulnerability/590b446d-f8bc-49b0-93e7-2a6f2e6f62f1
|
||
|
CVE-2022-1316 - https://huntr.dev/bounties/e7835226-1b20-4546-b256-3f625badb022
|
||
|
CVE-2022-1320 - https://wpscan.com/vulnerability/43581d6b-333a-48d9-a1ae-b9479da8ff87
|
||
|
CVE-2022-1321 - https://wpscan.com/vulnerability/b8784995-0deb-4c83-959f-52b37881e05c
|
||
|
CVE-2022-1322 - https://wpscan.com/vulnerability/e1724471-26bd-4cb3-a279-51783102ed0c
|
||
|
CVE-2022-1323 - https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b
|
||
|
CVE-2022-1324 - https://wpscan.com/vulnerability/2ce2a387-acc8-482a-9452-a4d9acb187fd
|
||
|
CVE-2022-1325 - https://github.com/GreycLab/CImg/issues/343
|
||
|
CVE-2022-1325 - https://huntr.dev/bounties/a5e4fc45-8f14-4dd1-811b-740fc50c95d2/
|
||
|
CVE-2022-1326 - https://wpscan.com/vulnerability/f57615d9-a567-4c2a-9f06-2c6b61f56074
|
||
|
CVE-2022-1327 - https://wpscan.com/vulnerability/6b71eb38-0a4a-49d1-96bc-84bbe675be1e
|
||
|
CVE-2022-1328 - http://packetstormsecurity.com/files/167717/Mutt-mutt_decode_uuencoded-Memory-Disclosure.html
|
||
|
CVE-2022-1329 - http://packetstormsecurity.com/files/168615/WordPress-Elementor-3.6.2-Shell-Upload.html
|
||
|
CVE-2022-1332 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1333 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1334 - https://wpscan.com/vulnerability/af3b32c9-f386-4bb6-a362-86a27f49a739
|
||
|
CVE-2022-1335 - https://wpscan.com/vulnerability/cfc80857-8674-478f-9604-7a8849e5b85e
|
||
|
CVE-2022-1336 - https://wpscan.com/vulnerability/39e127f1-c36e-4699-892f-3755ee17bab6
|
||
|
CVE-2022-1337 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1338 - https://wpscan.com/vulnerability/51b91d0e-33af-41ce-b95f-d422586f1d5f
|
||
|
CVE-2022-1339 - https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9
|
||
|
CVE-2022-1340 - https://huntr.dev/bounties/4746f149-fc55-48a1-a7ab-fd7c7412c05a
|
||
|
CVE-2022-1344 - https://huntr.dev/bounties/35f66966-af13-4f07-9734-0c50fdfc3a8c
|
||
|
CVE-2022-1345 - https://huntr.dev/bounties/781b5c2a-bc98-41a0-a276-ea12399e5a25
|
||
|
CVE-2022-1346 - https://huntr.dev/bounties/8fe435b0-192f-41ca-b41e-580fcd34892f
|
||
|
CVE-2022-1347 - https://huntr.dev/bounties/6059501f-05d2-4e76-ae03-5eb64835e6bf
|
||
|
CVE-2022-1349 - https://wpscan.com/vulnerability/7ee95a53-5fe9-404c-a77a-d1218265e4aa
|
||
|
CVE-2022-1351 - https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615
|
||
|
CVE-2022-1354 - https://gitlab.com/libtiff/libtiff/-/issues/319
|
||
|
CVE-2022-1355 - https://gitlab.com/libtiff/libtiff/-/issues/400
|
||
|
CVE-2022-1379 - https://huntr.dev/bounties/0d737527-86e1-41d1-9d37-b2de36bc063a
|
||
|
CVE-2022-1380 - https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12
|
||
|
CVE-2022-1381 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1381 - https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4
|
||
|
CVE-2022-1382 - https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1
|
||
|
CVE-2022-1383 - https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9
|
||
|
CVE-2022-1384 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1385 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1386 - https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b
|
||
|
CVE-2022-1386 - https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/
|
||
|
CVE-2022-1387 - https://wpscan.com/vulnerability/48252ffb-f21c-4e2a-8f78-bdc7164e7347
|
||
|
CVE-2022-1388 - http://packetstormsecurity.com/files/167007/F5-BIG-IP-Remote-Code-Execution.html
|
||
|
CVE-2022-1388 - http://packetstormsecurity.com/files/167118/F5-BIG-IP-16.0.x-Remote-Code-Execution.html
|
||
|
CVE-2022-1388 - http://packetstormsecurity.com/files/167150/F5-BIG-IP-iControl-Remote-Code-Execution.html
|
||
|
CVE-2022-1390 - https://packetstormsecurity.com/files/166476/
|
||
|
CVE-2022-1390 - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
|
||
|
CVE-2022-1391 - https://packetstormsecurity.com/files/166533/
|
||
|
CVE-2022-1391 - https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac
|
||
|
CVE-2022-1392 - https://packetstormsecurity.com/files/166534/
|
||
|
CVE-2022-1392 - https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815
|
||
|
CVE-2022-1393 - https://wpscan.com/vulnerability/3491b889-94dd-4507-9fed-58f48d8275cf
|
||
|
CVE-2022-1394 - https://wpscan.com/vulnerability/f7a0df37-3204-4926-84ec-2204a2f22de3
|
||
|
CVE-2022-1395 - https://wpscan.com/vulnerability/e5c06b38-fab8-44af-84dc-df94eb72ce80
|
||
|
CVE-2022-1396 - https://packetstormsecurity.com/files/166531/
|
||
|
CVE-2022-1396 - https://wpscan.com/vulnerability/721ddc3e-ab24-4834-bd47-4eb6700439a9
|
||
|
CVE-2022-1397 - https://huntr.dev/bounties/5f69e094-ab8c-47a3-b01d-8c12a3b14c61
|
||
|
CVE-2022-1398 - https://wpscan.com/vulnerability/5440d177-e995-403e-b2c9-42ceda14579e
|
||
|
CVE-2022-1399 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
||
|
CVE-2022-1400 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
||
|
CVE-2022-1401 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
||
|
CVE-2022-1407 - https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d
|
||
|
CVE-2022-1408 - https://wpscan.com/vulnerability/48dccf4c-07e0-4877-867d-f8f43aeb5705
|
||
|
CVE-2022-1409 - https://wpscan.com/vulnerability/1330f8f7-4a59-4e9d-acae-21656a4101fe
|
||
|
CVE-2022-1410 - https://www.bitdefender.com/blog/labs/a-red-team-perspective-on-the-device42-asset-management-appliance/
|
||
|
CVE-2022-1411 - https://huntr.dev/bounties/75c7cf09-d118-4f91-9686-22b142772529
|
||
|
CVE-2022-1412 - https://wpscan.com/vulnerability/ee10f21f-4476-4f3d-85ed-94d438c61ec2
|
||
|
CVE-2022-1416 - https://gitlab.com/gitlab-org/gitlab/-/issues/342988
|
||
|
CVE-2022-1417 - https://hackerone.com/reports/1075586
|
||
|
CVE-2022-1418 - https://wpscan.com/vulnerability/3851e61e-f462-4259-af0a-8d832809d559
|
||
|
CVE-2022-1420 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1420 - https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
|
||
|
CVE-2022-1421 - https://wpscan.com/vulnerability/a7a24e8e-9056-4967-bcad-b96cc0c5b249
|
||
|
CVE-2022-1422 - https://wpscan.com/vulnerability/29aff4bf-1691-4dc1-a670-1f2c9a765a3b
|
||
|
CVE-2022-1424 - https://wpscan.com/vulnerability/147b4097-dec8-4542-b122-7b237db81c05
|
||
|
CVE-2022-1425 - https://wpscan.com/vulnerability/b110e2f7-4aa3-47b5-a8f2-0a7fe53cc467
|
||
|
CVE-2022-1427 - https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301
|
||
|
CVE-2022-1429 - https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e
|
||
|
CVE-2022-1430 - https://huntr.dev/bounties/0cd30d71-1e32-4a0b-b4c3-faaa1907b541
|
||
|
CVE-2022-1432 - https://huntr.dev/bounties/cb545c63-a3c1-4d57-8f06-e4593ab389bf
|
||
|
CVE-2022-1435 - https://wpscan.com/vulnerability/ef5aa8a7-23a7-4ce0-bb09-d9c986386114
|
||
|
CVE-2022-1436 - https://wpscan.com/vulnerability/d5c6f894-6ad1-46f4-bd77-17ad9234cfc3
|
||
|
CVE-2022-1437 - https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038
|
||
|
CVE-2022-1439 - https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0
|
||
|
CVE-2022-1440 - https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1
|
||
|
CVE-2022-1441 - https://github.com/gpac/gpac/issues/2175
|
||
|
CVE-2022-1442 - https://gist.github.com/Xib3rR4dAr/6e6c6e5fa1f8818058c7f03de1eda6bf
|
||
|
CVE-2022-1444 - https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa
|
||
|
CVE-2022-1445 - https://huntr.dev/bounties/f4420149-5236-4051-a458-5d4f1d5b7abd
|
||
|
CVE-2022-1451 - https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7
|
||
|
CVE-2022-1452 - https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6
|
||
|
CVE-2022-1455 - https://wpscan.com/vulnerability/8267046e-870e-4ccd-b920-340233ed3b93
|
||
|
CVE-2022-1456 - https://wpscan.com/vulnerability/1f41fc5c-18d0-493d-9a7d-8b521ab49f85
|
||
|
CVE-2022-1457 - https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046
|
||
|
CVE-2022-1458 - https://huntr.dev/bounties/78674078-0796-4102-a81e-f699cd6981b0
|
||
|
CVE-2022-1462 - https://seclists.org/oss-sec/2022/q2/155
|
||
|
CVE-2022-1464 - https://huntr.dev/bounties/34a12146-3a5d-4efc-a0f8-7a3ae04b198d
|
||
|
CVE-2022-1465 - https://wpscan.com/vulnerability/6781033a-f166-4198-874f-3e142854daf7
|
||
|
CVE-2022-1466 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-076.txt
|
||
|
CVE-2022-1466 - https://www.syss.de/pentest-blog/fehlerhafte-autorisierung-bei-red-hat-single-sign-on-750ga-syss-2021-076
|
||
|
CVE-2022-1467 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
||
|
CVE-2022-1469 - https://wpscan.com/vulnerability/88869380-173d-4d4f-81d8-3c20add5f98d
|
||
|
CVE-2022-1470 - https://wpscan.com/vulnerability/13bb796f-7a17-47c9-a46f-a1d6ca4b6b91
|
||
|
CVE-2022-1471 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
|
||
|
CVE-2022-1471 - https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2
|
||
|
CVE-2022-1472 - https://wpscan.com/vulnerability/9c608b14-dc5e-469e-b97a-84696fae804c
|
||
|
CVE-2022-1474 - https://wpscan.com/vulnerability/2d821464-c502-4f71-afee-97b3dea16612
|
||
|
CVE-2022-1503 - https://github.com/joinia/project/blob/main/GetSimple/GetSimplereadme.md
|
||
|
CVE-2022-1503 - https://vuldb.com/?id.198542
|
||
|
CVE-2022-1504 - https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6
|
||
|
CVE-2022-1506 - https://wpscan.com/vulnerability/ee4f6786-27e4-474c-85e0-715b0c0f2776
|
||
|
CVE-2022-1507 - https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95
|
||
|
CVE-2022-1508 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c2b3b74918200e46699338d7bcc19b1ea12110
|
||
|
CVE-2022-1509 - https://huntr.dev/bounties/09e69dff-f281-4e51-8312-ed7ab7606338
|
||
|
CVE-2022-1511 - https://huntr.dev/bounties/4a1723e9-5bc4-4c4b-bceb-1c45964cc71d
|
||
|
CVE-2022-1512 - https://packetstormsecurity.com/files/166820/
|
||
|
CVE-2022-1512 - https://wpscan.com/vulnerability/a754a516-07fc-44f1-9c34-31e963460301
|
||
|
CVE-2022-1514 - https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c
|
||
|
CVE-2022-1526 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/emlog%3C=pro-1.2.2%20Stored%20Cross-Site%20Scripting(XSS).md
|
||
|
CVE-2022-1527 - https://wpscan.com/vulnerability/0260d5c0-52a9-44ce-b7be-aff642056d16
|
||
|
CVE-2022-1528 - https://wpscan.com/vulnerability/d1e59894-382f-4151-8c4c-5608f3d8ac1f
|
||
|
CVE-2022-1529 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770048
|
||
|
CVE-2022-1530 - https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6
|
||
|
CVE-2022-1531 - https://huntr.dev/bounties/fc4eb544-ef1e-412d-9fdb-0ceb04e038fe
|
||
|
CVE-2022-1532 - https://wpscan.com/vulnerability/d106cd93-cb9b-4558-9a29-0d556fd7c9e1
|
||
|
CVE-2022-1533 - https://huntr.dev/bounties/cb574ce1-fbf7-42ea-9e6a-91e17adecdc3
|
||
|
CVE-2022-1534 - https://huntr.dev/bounties/9a90ffa1-38f5-4685-9c00-68ba9068ce3d
|
||
|
CVE-2022-1536 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/automad%3C%3D1.10.9%20Stored%20Cross-Site%20Scripting(XSS).md
|
||
|
CVE-2022-1536 - https://vuldb.com/?id.198706
|
||
|
CVE-2022-1537 - https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d
|
||
|
CVE-2022-1538 - https://wpscan.com/vulnerability/b19adf7c-3983-487b-9b46-0f2922b08c1c/
|
||
|
CVE-2022-1539 - https://wpscan.com/vulnerability/50f70927-9677-4ba4-a388-0a41ed356523
|
||
|
CVE-2022-1540 - https://wpscan.com/vulnerability/77a524d8-0b1a-407a-98d2-d8d0ed78fa0f
|
||
|
CVE-2022-1541 - https://wpscan.com/vulnerability/053a9815-cf0a-472e-844a-3dea407ce022
|
||
|
CVE-2022-1542 - https://wpscan.com/vulnerability/40916242-df03-49a1-9a6a-9af33907e359
|
||
|
CVE-2022-1543 - https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9f
|
||
|
CVE-2022-1544 - https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4
|
||
|
CVE-2022-1546 - https://wpscan.com/vulnerability/5ec6182c-6917-4c48-90ce-e0ebe38e7595
|
||
|
CVE-2022-1547 - https://wpscan.com/vulnerability/83eca346-7045-414e-81fc-e0d9b735f0bd
|
||
|
CVE-2022-1548 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1549 - https://wpscan.com/vulnerability/afef06f5-71a6-4372-9648-0db59f9b254f
|
||
|
CVE-2022-1551 - https://wpscan.com/vulnerability/51b4752a-7922-444d-a022-f1c7159b5d84
|
||
|
CVE-2022-1553 - https://huntr.dev/bounties/b398e4c9-6cdf-4973-ad86-da796cde221f
|
||
|
CVE-2022-1554 - https://huntr.dev/bounties/7acac778-5ba4-4f02-99e2-e4e17a81e600
|
||
|
CVE-2022-1555 - https://huntr.dev/bounties/d9f9b5bd-16f3-4eaa-9e36-d4958b557687
|
||
|
CVE-2022-1556 - https://packetstormsecurity.com/files/166918/
|
||
|
CVE-2022-1556 - https://wpscan.com/vulnerability/04890549-6bd1-44dd-8bce-7125c01be5d4
|
||
|
CVE-2022-1557 - https://packetstormsecurity.com/files/166564/
|
||
|
CVE-2022-1557 - https://wpscan.com/vulnerability/e2b6dbf5-8709-4a2c-90be-3214ff55ed56
|
||
|
CVE-2022-1558 - https://packetstormsecurity.com/files/166839/
|
||
|
CVE-2022-1558 - https://wpscan.com/vulnerability/0414dad4-e90b-4122-8b77-a8a958ab824d
|
||
|
CVE-2022-1559 - https://packetstormsecurity.com/files/166530/
|
||
|
CVE-2022-1559 - https://wpscan.com/vulnerability/99059337-c3cd-4e91-9a03-df32a05b719c
|
||
|
CVE-2022-1560 - https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de
|
||
|
CVE-2022-1562 - https://wpscan.com/vulnerability/8e5b1e4f-c132-42ee-b2d0-7306ab4ab615
|
||
|
CVE-2022-1563 - https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456/
|
||
|
CVE-2022-1564 - https://wpscan.com/vulnerability/a487c7e7-667c-4c92-a427-c43cc13b348d
|
||
|
CVE-2022-1565 - http://packetstormsecurity.com/files/171578/WordPress-WP-All-Import-3.6.7-Remote-Code-Execution.html
|
||
|
CVE-2022-1566 - https://wpscan.com/vulnerability/0af030d8-b676-4826-91c0-98706b816f3c
|
||
|
CVE-2022-1568 - https://wpscan.com/vulnerability/88328d17-ffc9-4b94-8b01-ad2fd3047fbc
|
||
|
CVE-2022-1569 - https://wpscan.com/vulnerability/5a2756c1-9abf-4fd6-8ce2-9f840514dfcc
|
||
|
CVE-2022-1570 - https://wpscan.com/vulnerability/c0257564-48ee-4d02-865f-82c8b5e793c9
|
||
|
CVE-2022-1571 - https://huntr.dev/bounties/4578a690-73e5-4313-840c-ee15e5329741
|
||
|
CVE-2022-1572 - https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5
|
||
|
CVE-2022-1573 - https://wpscan.com/vulnerability/9c1acd9c-999f-4a35-a272-1ad31552e685
|
||
|
CVE-2022-1574 - https://wpscan.com/vulnerability/c36d0ea8-bf5c-4af9-bd3d-911eb02adc14
|
||
|
CVE-2022-1575 - https://huntr.dev/bounties/033d3423-eb05-4b53-a747-1bfcba873127
|
||
|
CVE-2022-1576 - https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf
|
||
|
CVE-2022-1577 - https://wpscan.com/vulnerability/39388900-266d-4308-88e7-d40ca6bbe346
|
||
|
CVE-2022-1578 - https://wpscan.com/vulnerability/c280da92-4ac2-43ea-93a2-6c583b79b98b
|
||
|
CVE-2022-1579 - https://wpscan.com/vulnerability/6f3d40fa-458b-44f0-9407-763e80b29668
|
||
|
CVE-2022-1580 - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a
|
||
|
CVE-2022-1582 - https://wpscan.com/vulnerability/cbb75383-4351-4488-aaca-ddb0f6f120cd
|
||
|
CVE-2022-1583 - https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9
|
||
|
CVE-2022-1584 - https://huntr.dev/bounties/69f4ca67-d615-4f25-b2d1-19df7bf1107d
|
||
|
CVE-2022-1585 - https://wpscan.com/vulnerability/e709958c-7bce-45d7-9a0a-6e0ed12cd03f
|
||
|
CVE-2022-1589 - https://wpscan.com/vulnerability/257f9e14-4f43-4852-8384-80c15d087633
|
||
|
CVE-2022-1590 - https://github.com/joinia/webray.com.cn/blob/main/Bludit/Bluditreadme.md
|
||
|
CVE-2022-1590 - https://vuldb.com/?id.199060
|
||
|
CVE-2022-1591 - https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa
|
||
|
CVE-2022-1592 - https://huntr.dev/bounties/352b39da-0f2e-415a-9793-5480cae8bd27
|
||
|
CVE-2022-1593 - https://wpscan.com/vulnerability/67678666-402b-4010-ac56-7067a0f40185
|
||
|
CVE-2022-1594 - https://wpscan.com/vulnerability/bb0efc5e-044b-47dc-9101-9aae40cdbaa5
|
||
|
CVE-2022-1595 - https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b
|
||
|
CVE-2022-1597 - https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e
|
||
|
CVE-2022-1598 - https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8
|
||
|
CVE-2022-1599 - https://wpscan.com/vulnerability/4a36e876-7e3b-4a81-9f16-9ff5fbb20dd6
|
||
|
CVE-2022-1600 - https://wpscan.com/vulnerability/2b7445fd-0992-47cd-9a48-f5f18d8171f7
|
||
|
CVE-2022-1601 - https://wpscan.com/vulnerability/f6d3408c-2ceb-4a89-822b-13f5272a5fce
|
||
|
CVE-2022-1603 - https://wpscan.com/vulnerability/0e12ba6f-a86f-4cc6-9013-8a15586098d0
|
||
|
CVE-2022-1604 - https://wpscan.com/vulnerability/557c1c49-7195-4085-b67a-9fd8aca57845
|
||
|
CVE-2022-1605 - https://wpscan.com/vulnerability/a1b69615-690a-423b-afdf-729dcd32bc2f
|
||
|
CVE-2022-1608 - https://wpscan.com/vulnerability/56d2d55b-bd09-47af-988c-7f47eec4151f
|
||
|
CVE-2022-1609 - https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2/
|
||
|
CVE-2022-1610 - https://wpscan.com/vulnerability/88014da6-6179-4527-8f67-fbb610804d93
|
||
|
CVE-2022-1611 - https://wpscan.com/vulnerability/3843b867-7784-4976-b5ab-8a1e7d45618a
|
||
|
CVE-2022-1612 - https://wpscan.com/vulnerability/a8cec792-6435-4047-bca8-597c104dbc1f
|
||
|
CVE-2022-1613 - https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b
|
||
|
CVE-2022-1614 - https://wpscan.com/vulnerability/a5940d0b-6b88-4418-87e2-02c0897bc2f1
|
||
|
CVE-2022-1616 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1616 - https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
|
||
|
CVE-2022-1617 - https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/
|
||
|
CVE-2022-1618 - https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d/
|
||
|
CVE-2022-1619 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1619 - https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
|
||
|
CVE-2022-1620 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1620 - https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
|
||
|
CVE-2022-1621 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1621 - https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
|
||
|
CVE-2022-1622 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1624 - https://wpscan.com/vulnerability/06e547fd-cddf-4294-87be-54f58d6138a7
|
||
|
CVE-2022-1625 - https://wpscan.com/vulnerability/e1693318-900c-47f1-bb77-008b0d33327f
|
||
|
CVE-2022-1626 - https://wpscan.com/vulnerability/3d1f90d9-45da-42f8-93f8-15c8a4ff90ca
|
||
|
CVE-2022-1627 - https://wpscan.com/vulnerability/70ce3654-8fd9-4c33-b594-fac13ec26137
|
||
|
CVE-2022-1629 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1629 - https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
|
||
|
CVE-2022-1630 - https://wpscan.com/vulnerability/178d0c49-3a93-4948-8734-f3d7518361b3
|
||
|
CVE-2022-1631 - http://packetstormsecurity.com/files/167376/Microweber-CMS-1.2.15-Account-Takeover.html
|
||
|
CVE-2022-1631 - https://huntr.dev/bounties/5494e258-5c7b-44b4-b443-85cff7ae0ba4
|
||
|
CVE-2022-1643 - https://wpscan.com/vulnerability/73111c7e-c772-4bed-b282-854c1ae57444
|
||
|
CVE-2022-1644 - https://wpscan.com/vulnerability/0184d70a-548c-4258-b01d-7477f03cc346
|
||
|
CVE-2022-1645 - https://wpscan.com/vulnerability/915b7d79-f9dd-451d-bf8f-6d14ec3e67d2
|
||
|
CVE-2022-1646 - https://wpscan.com/vulnerability/8a32896d-bf1b-4d7b-8d84-dc38b877928b
|
||
|
CVE-2022-1647 - https://wpscan.com/vulnerability/8e8f6b08-90ab-466a-9828-dca0c0da2c9c
|
||
|
CVE-2022-1649 - https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449
|
||
|
CVE-2022-1650 - https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e
|
||
|
CVE-2022-1651 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b
|
||
|
CVE-2022-1653 - https://wpscan.com/vulnerability/52eff451-8ce3-4ac4-b530-3196aa82db48
|
||
|
CVE-2022-1663 - https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70
|
||
|
CVE-2022-1671 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ff8376ade4f668130385839cef586a0990f8ef87
|
||
|
CVE-2022-1672 - https://wpscan.com/vulnerability/5c5955d7-24f0-45e6-9c27-78ef50446dad
|
||
|
CVE-2022-1673 - https://wpscan.com/vulnerability/14283389-a6b8-4dd8-9441-f16fcc4ab3c0
|
||
|
CVE-2022-1674 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1674 - https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385
|
||
|
CVE-2022-1681 - https://huntr.dev/bounties/591b11e1-7504-4a96-99c6-08f2b419e767
|
||
|
CVE-2022-1682 - https://huntr.dev/bounties/e962d191-93e2-405e-a6af-b4a4e4d02527
|
||
|
CVE-2022-1683 - https://wpscan.com/vulnerability/359d145b-c365-4e7c-a12e-c26b7b8617ce
|
||
|
CVE-2022-1684 - https://bulletin.iese.de/post/cube-slider_1-2
|
||
|
CVE-2022-1684 - https://wpscan.com/vulnerability/db7fb815-945a-41c7-8932-834cc646a806
|
||
|
CVE-2022-1685 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_1
|
||
|
CVE-2022-1685 - https://wpscan.com/vulnerability/86bd28d5-6767-4bca-ab59-710c1c4ecd97
|
||
|
CVE-2022-1686 - https://bulletin.iese.de/post/five-minute-webshop_1-3-2_2
|
||
|
CVE-2022-1686 - https://wpscan.com/vulnerability/1a5ce0dd-6847-42e7-8d88-3b63053fab71
|
||
|
CVE-2022-1687 - https://bulletin.iese.de/post/logo-slider_1-4-8
|
||
|
CVE-2022-1687 - https://wpscan.com/vulnerability/e7506906-5c3d-4963-ae24-55f18c3e5081
|
||
|
CVE-2022-1688 - https://bulletin.iese.de/post/note-press_0-1-10_1
|
||
|
CVE-2022-1688 - https://wpscan.com/vulnerability/63d4444b-9b04-47f5-a692-c6c6c8ea7d92
|
||
|
CVE-2022-1689 - https://bulletin.iese.de/post/note-press_0-1-10_2
|
||
|
CVE-2022-1689 - https://wpscan.com/vulnerability/982f84a1-216d-41ed-87bd-433b695cec28
|
||
|
CVE-2022-1690 - https://bulletin.iese.de/post/note-press_0-1-10_3
|
||
|
CVE-2022-1690 - https://wpscan.com/vulnerability/54e16f0a-667c-44ea-98ad-0306c4a35d9d
|
||
|
CVE-2022-1691 - https://bulletin.iese.de/post/realty-workstation_1-0-6
|
||
|
CVE-2022-1691 - https://wpscan.com/vulnerability/f9363b4c-c434-4f15-93f8-46162d2d7049
|
||
|
CVE-2022-1692 - https://bulletin.iese.de/post/cp-image-store_1-0-67
|
||
|
CVE-2022-1692 - https://wpscan.com/vulnerability/83bae80c-f583-4d89-8282-e6384bbc7571
|
||
|
CVE-2022-1694 - https://wpscan.com/vulnerability/169a6c81-6c76-4f29-8f60-b2551042b962
|
||
|
CVE-2022-1695 - https://wpscan.com/vulnerability/2ac5b87b-1390-41ce-af6e-c50e5709baaa
|
||
|
CVE-2022-1697 - https://help.okta.com/en-us/Content/Topics/Directory/ad-agent-update.htm
|
||
|
CVE-2022-1698 - https://huntr.dev/bounties/f4ab747b-e89a-4514-9432-ac1ea56639f3
|
||
|
CVE-2022-1699 - https://huntr.dev/bounties/3024b2bb-50ca-46a2-85db-1cc916791cda
|
||
|
CVE-2022-1709 - https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc
|
||
|
CVE-2022-1710 - https://wpscan.com/vulnerability/ed162ccc-88e6-41e8-b24d-1b9f77a038b6
|
||
|
CVE-2022-1711 - https://huntr.dev/bounties/c32afff5-6ad5-4d4d-beea-f55ab4925797
|
||
|
CVE-2022-1712 - https://wpscan.com/vulnerability/9ab9626f-66d5-47e4-bdb8-d8fb519f9515
|
||
|
CVE-2022-1713 - https://huntr.dev/bounties/cad3902f-3afb-4ed2-abd0-9f96a248de11
|
||
|
CVE-2022-1714 - https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0
|
||
|
CVE-2022-1715 - https://huntr.dev/bounties/58918962-ccb5-47f9-bb43-ffd8cae1ef24
|
||
|
CVE-2022-1716 - https://fluidattacks.com/advisories/tyler/
|
||
|
CVE-2022-1717 - https://wpscan.com/vulnerability/79a532e9-bc6e-4722-8d67-9c15720d06a6
|
||
|
CVE-2022-1718 - https://huntr.dev/bounties/1ff8afe4-6ff7-45aa-a652-d8aac7e5be7e
|
||
|
CVE-2022-1719 - https://huntr.dev/bounties/790ba3fd-41e9-4393-8e2f-71161b56279b
|
||
|
CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-1720 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-1720 - https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
|
||
|
CVE-2022-1721 - https://huntr.dev/bounties/000931cc-6d0e-4a4f-b4d8-4ba46ba0e699
|
||
|
CVE-2022-1722 - https://huntr.dev/bounties/c903d563-ba97-44e9-b421-22bfab1e0cbd
|
||
|
CVE-2022-1723 - https://huntr.dev/bounties/619851a4-2a08-4196-80e9-ab41953491d8
|
||
|
CVE-2022-1724 - https://wpscan.com/vulnerability/96a0a667-9c4b-4ea6-b78a-0681e9a9bbae
|
||
|
CVE-2022-1725 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1725 - https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c
|
||
|
CVE-2022-1726 - https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea
|
||
|
CVE-2022-1727 - https://huntr.dev/bounties/b242e806-fc8c-41c0-aad7-e0c9c37ecdee
|
||
|
CVE-2022-1728 - https://huntr.dev/bounties/3c6cb129-6995-4722-81b5-af052572b519
|
||
|
CVE-2022-1729 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac6487e584a1eb54071dbe1212e05b884136704
|
||
|
CVE-2022-1730 - https://huntr.dev/bounties/fded4835-bd49-4533-8311-1d71e0ed7c00
|
||
|
CVE-2022-1731 - https://www.tenable.com/security/research/tra-2022-17
|
||
|
CVE-2022-1732 - https://wpscan.com/vulnerability/3620a087-032e-4a5f-99c8-f9e7e9c29813
|
||
|
CVE-2022-1733 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1733 - https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
|
||
|
CVE-2022-1734 - https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098
|
||
|
CVE-2022-1735 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1735 - https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
|
||
|
CVE-2022-1752 - https://huntr.dev/bounties/66e9bfa9-598f-49ab-a472-752911df3f2d
|
||
|
CVE-2022-1753 - https://vuldb.com/?id.199974
|
||
|
CVE-2022-1753 - https://www.youtube.com/watch?v=tIzOZtp2fxA
|
||
|
CVE-2022-1753 - https://youtu.be/tIzOZtp2fxA
|
||
|
CVE-2022-1754 - https://huntr.dev/bounties/2f65af7c-a74b-46a6-8847-5db6785f1cf2
|
||
|
CVE-2022-1755 - https://wpscan.com/vulnerability/62b2548e-6b59-48b8-b1c2-9bd47e634982
|
||
|
CVE-2022-1756 - https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072
|
||
|
CVE-2022-1757 - https://wpscan.com/vulnerability/e648633e-868b-45b2-870a-308a2f9cb7f5
|
||
|
CVE-2022-1758 - https://wpscan.com/vulnerability/211816ce-d2bc-469b-9a8e-e0c2a5c4461b
|
||
|
CVE-2022-1759 - https://wpscan.com/vulnerability/d8e63f78-f38a-4f68-96ba-8059d175cea8
|
||
|
CVE-2022-1760 - https://wpscan.com/vulnerability/c7906b1d-25c9-4f34-bd02-66824878b88e/
|
||
|
CVE-2022-1761 - https://wpscan.com/vulnerability/31b413e1-d4b5-463e-9910-37876881c062
|
||
|
CVE-2022-1762 - https://wpscan.com/vulnerability/03254977-37cc-4365-979b-326f9637be85
|
||
|
CVE-2022-1763 - https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8
|
||
|
CVE-2022-1764 - https://wpscan.com/vulnerability/04305e4e-37e3-4f35-bf66-3b79b99d2868
|
||
|
CVE-2022-1765 - https://wpscan.com/vulnerability/b50e7622-c1dc-485b-a5f5-b010b40eef20
|
||
|
CVE-2022-1767 - https://huntr.dev/bounties/b1ce040c-9ed1-4d36-9b48-82df42310868
|
||
|
CVE-2022-1768 - http://packetstormsecurity.com/files/176549/WordPress-RSVPMaker-9.3.2-SQL-Injection.html
|
||
|
CVE-2022-1768 - https://gist.github.com/Xib3rR4dAr/441d6bb4a5b8ad4b25074a49210a02cc
|
||
|
CVE-2022-1769 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1769 - https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c
|
||
|
CVE-2022-1770 - https://huntr.dev/bounties/74a252a2-8bf6-4f88-a180-b90338a239fa
|
||
|
CVE-2022-1771 - https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
|
||
|
CVE-2022-1772 - https://wpscan.com/vulnerability/02addade-d191-4e45-b7b5-2f3f673679ab
|
||
|
CVE-2022-1773 - https://wpscan.com/vulnerability/c2cc3d8e-f3ac-46c6-871e-894cf3ba67f6
|
||
|
CVE-2022-1774 - https://huntr.dev/bounties/6ac07c49-bb7f-47b5-b361-33e6757b8757
|
||
|
CVE-2022-1775 - https://huntr.dev/bounties/0966043c-602f-463e-a6e5-9a1745f4fbfa
|
||
|
CVE-2022-1776 - https://wpscan.com/vulnerability/46ed56db-9b9d-4390-80fc-343a01fcc3c9
|
||
|
CVE-2022-1777 - https://wpscan.com/vulnerability/a50dc7f8-a9e6-41fa-a047-ad1c3bc309b4
|
||
|
CVE-2022-1779 - https://wpscan.com/vulnerability/45117646-88ff-41d4-8abd-e2f18d4b693e
|
||
|
CVE-2022-1780 - https://wpscan.com/vulnerability/dd22ea1e-49a9-4b06-8dd9-bb224110f98a
|
||
|
CVE-2022-1781 - https://wpscan.com/vulnerability/7f2ae2c9-57d4-46a0-a9a1-585ec543b153
|
||
|
CVE-2022-1782 - https://huntr.dev/bounties/7555693f-94e4-4183-98cb-3497da6df028
|
||
|
CVE-2022-1784 - https://huntr.dev/bounties/d1330ce8-cccb-4bae-b9a9-a03b97f444a5
|
||
|
CVE-2022-1785 - https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
|
||
|
CVE-2022-1787 - https://wpscan.com/vulnerability/b85920b3-dfc1-4112-abd8-ce6a5d91ae0d
|
||
|
CVE-2022-1788 - https://wpscan.com/vulnerability/c39719e5-dadd-4414-a96d-5e70a1e3d462
|
||
|
CVE-2022-1790 - https://wpscan.com/vulnerability/176d5761-4f01-4173-a70c-6052a6a9963e
|
||
|
CVE-2022-1791 - https://wpscan.com/vulnerability/5c185269-cb3a-4463-8d73-b190813d4431
|
||
|
CVE-2022-1792 - https://wpscan.com/vulnerability/44555c79-480d-4b6a-9fda-988183c06909
|
||
|
CVE-2022-1793 - https://wpscan.com/vulnerability/fd8b84b4-6944-4638-bdc1-1cb6aaabd42c
|
||
|
CVE-2022-1795 - https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc
|
||
|
CVE-2022-1796 - https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e
|
||
|
CVE-2022-1800 - https://wpscan.com/vulnerability/4267109c-0ca2-441d-889d-fb39c235f128
|
||
|
CVE-2022-1801 - https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06
|
||
|
CVE-2022-1803 - https://huntr.dev/bounties/47cc6621-2474-40f9-ab68-3cf62389a124
|
||
|
CVE-2022-1806 - https://huntr.dev/bounties/101a2a31-0b27-433a-ad3a-a216238ca4d1
|
||
|
CVE-2022-1809 - https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17
|
||
|
CVE-2022-1810 - https://huntr.dev/bounties/9b2d7579-032e-42da-b736-4b10a868eacb
|
||
|
CVE-2022-1811 - https://huntr.dev/bounties/4d97f665-c9f1-4c38-b774-692255a7c44c
|
||
|
CVE-2022-1812 - https://huntr.dev/bounties/17d86a50-265c-4ec8-9592-0bd909ddc8f3
|
||
|
CVE-2022-1813 - https://huntr.dev/bounties/b255cf59-9ecd-4255-b9a2-b40b5ec6c572
|
||
|
CVE-2022-1814 - https://wpscan.com/vulnerability/b5624fb3-b110-4b36-a00f-20bbc3a8fdb9
|
||
|
CVE-2022-1815 - https://huntr.dev/bounties/6e856a25-9117-47c6-9375-52f78876902f
|
||
|
CVE-2022-1816 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Zoo-Management-System/Zoo-Management-System(XSS).md
|
||
|
CVE-2022-1817 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Badminton%20Center%20Management%20System(XSS).md
|
||
|
CVE-2022-1817 - https://vuldb.com/?id.200559
|
||
|
CVE-2022-1818 - https://wpscan.com/vulnerability/9d6c628f-cdea-481c-a2e5-101dc167718d
|
||
|
CVE-2022-1819 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Student%20Information%20System/SIS_Stored_Cross_Site_Scripting(XSS).md
|
||
|
CVE-2022-1825 - https://huntr.dev/bounties/c6ad4cef-1b3d-472f-af0e-68e46341dfe5
|
||
|
CVE-2022-1826 - https://wpscan.com/vulnerability/b9dba241-d94c-4ce5-8730-445ba8005e66
|
||
|
CVE-2022-1827 - https://wpscan.com/vulnerability/0bd25283-e079-4010-b139-cce9afb1d54d
|
||
|
CVE-2022-1828 - https://wpscan.com/vulnerability/877ce7a5-b1ff-4d03-9cd8-6beed5595af8
|
||
|
CVE-2022-1829 - https://wpscan.com/vulnerability/8353aa12-dbb7-433f-9dd9-d61a3f303d4b
|
||
|
CVE-2022-1830 - https://wpscan.com/vulnerability/a6b3e927-41e2-4e48-b9e1-8c58a1b9a933
|
||
|
CVE-2022-1831 - https://wpscan.com/vulnerability/91c44a4f-b599-46c0-a8df-d1fb87472abe
|
||
|
CVE-2022-1832 - https://wpscan.com/vulnerability/e025f821-81c3-4072-a89e-a5b3d0fb1275
|
||
|
CVE-2022-1837 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_add_register.php_File_Upload_Getshell.md
|
||
|
CVE-2022-1837 - https://vuldb.com/?id.200582
|
||
|
CVE-2022-1838 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_admin_SQL_Inject.md
|
||
|
CVE-2022-1838 - https://vuldb.com/?id.200583
|
||
|
CVE-2022-1839 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/HCS_login_email_SQL_injection.md
|
||
|
CVE-2022-1839 - https://vuldb.com/?id.200584
|
||
|
CVE-2022-1840 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Home%20Clean%20Services%20Management%20System/Home%20Clean%20Services%20Management%20System%20Stored%20Cross-Site%20Scripting(XSS).md
|
||
|
CVE-2022-1842 - https://wpscan.com/vulnerability/77aafeb9-af80-490a-b3d7-4fa973bab61c
|
||
|
CVE-2022-1843 - https://wpscan.com/vulnerability/aa59f811-2375-4593-93d4-f587f9870ed1
|
||
|
CVE-2022-1844 - https://wpscan.com/vulnerability/f0b0baac-7f44-44e1-af73-5a72b967858d
|
||
|
CVE-2022-1845 - https://wpscan.com/vulnerability/6ee3e9e2-ff57-41c4-8cc5-b258801a8a02
|
||
|
CVE-2022-1846 - https://wpscan.com/vulnerability/5fa5838e-4843-4d9c-9884-e3ebbf56fc6a
|
||
|
CVE-2022-1847 - https://wpscan.com/vulnerability/d34ed713-4cca-4cef-b431-f132f1b10aa6
|
||
|
CVE-2022-1848 - https://huntr.dev/bounties/8dfe0877-e44b-4a1a-8eee-5c03c93ae90a
|
||
|
CVE-2022-1849 - https://huntr.dev/bounties/881f8f36-d5c8-470d-8261-f109e6d5db4b
|
||
|
CVE-2022-1850 - https://huntr.dev/bounties/07755f07-a412-4911-84a4-2f8c03c8f7ce
|
||
|
CVE-2022-1851 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1851 - https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d
|
||
|
CVE-2022-1883 - https://huntr.dev/bounties/a25d15bd-cd23-487e-85cd-587960f1b9e7
|
||
|
CVE-2022-1885 - https://wpscan.com/vulnerability/8416cbcf-086d-42ff-b2a4-f3954c8ff0c8
|
||
|
CVE-2022-1886 - https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a
|
||
|
CVE-2022-1889 - https://wpscan.com/vulnerability/ee3832e2-ce40-4063-a23e-44c7f7f5f46a
|
||
|
CVE-2022-1893 - https://huntr.dev/bounties/a1cfe61b-5248-4a73-9a80-0b764edc9b26
|
||
|
CVE-2022-1894 - https://wpscan.com/vulnerability/68af14ef-ca66-40d6-a1e5-09f74e2cd971
|
||
|
CVE-2022-1895 - https://wpscan.com/vulnerability/bd9ef7e0-ebbb-4b91-8c58-265218a3c536
|
||
|
CVE-2022-1896 - https://wpscan.com/vulnerability/3e8bd875-2435-4a15-8ee8-8a00882b499c
|
||
|
CVE-2022-1897 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1897 - https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118
|
||
|
CVE-2022-1898 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1898 - https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea
|
||
|
CVE-2022-1899 - https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04
|
||
|
CVE-2022-1903 - https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08
|
||
|
CVE-2022-1904 - https://wpscan.com/vulnerability/92215d07-d129-49b4-a838-0de1a944c06b
|
||
|
CVE-2022-1905 - https://wpscan.com/vulnerability/ff5fd894-aff3-400a-8eec-fad9d50f788e
|
||
|
CVE-2022-1906 - https://wpscan.com/vulnerability/af4f459e-e60b-4384-aad9-0dc18aa3b338
|
||
|
CVE-2022-1907 - https://huntr.dev/bounties/4eb0fa3e-4480-4fb5-8ec0-fbcd71de6012
|
||
|
CVE-2022-1908 - https://huntr.dev/bounties/a7436e88-0488-4bd4-816f-2e2c803e93e8
|
||
|
CVE-2022-1909 - https://huntr.dev/bounties/8f83eb8f-51a8-41c0-bc7d-077f48faebdc
|
||
|
CVE-2022-1910 - https://wpscan.com/vulnerability/8afe1638-66fa-44c7-9d02-c81573193b47
|
||
|
CVE-2022-1913 - https://wpscan.com/vulnerability/2cafef43-e64a-4897-8c41-f0ed473d7ead
|
||
|
CVE-2022-1914 - https://wpscan.com/vulnerability/8c8dad47-8591-47dc-b84f-8c5cb18b2d78
|
||
|
CVE-2022-1915 - https://wpscan.com/vulnerability/c3c28edf-19bc-4f3a-b58e-f1c67557aa29
|
||
|
CVE-2022-1916 - https://wpscan.com/vulnerability/d16a0c3d-4318-4ecd-9e65-fc4165af8808
|
||
|
CVE-2022-1921 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1224
|
||
|
CVE-2022-1922 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
||
|
CVE-2022-1923 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
||
|
CVE-2022-1924 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
||
|
CVE-2022-1925 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
||
|
CVE-2022-1926 - https://huntr.dev/bounties/3fda8902-68ee-4734-86a3-9551ab17c893
|
||
|
CVE-2022-1927 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1927 - https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
|
||
|
CVE-2022-1928 - https://huntr.dev/bounties/6336ec42-5c4d-4f61-ae38-2bb539f433d2
|
||
|
CVE-2022-1929 - https://research.jfrog.com/vulnerabilities/devcert-redos-xray-211352/
|
||
|
CVE-2022-1930 - https://research.jfrog.com/vulnerabilities/eth-account-redos-xray-248681/
|
||
|
CVE-2022-1931 - https://huntr.dev/bounties/50c4cb63-65db-41c5-a16d-0560d7131fde
|
||
|
CVE-2022-1932 - https://wpscan.com/vulnerability/005c2300-f6bd-416e-97a6-d42284bbb093
|
||
|
CVE-2022-1933 - https://wpscan.com/vulnerability/6cedb27f-6140-4cba-836f-63de98e521bf
|
||
|
CVE-2022-1934 - https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
|
||
|
CVE-2022-1937 - https://wpscan.com/vulnerability/eb40ea5d-a463-4947-9a40-d55911ff50e9
|
||
|
CVE-2022-1938 - https://wpscan.com/vulnerability/70aed824-c53e-4672-84c9-039dc34ed5fa
|
||
|
CVE-2022-1939 - https://wpscan.com/vulnerability/4d7b62e1-558b-4504-a6e2-78246a8b554f
|
||
|
CVE-2022-1940 - https://gitlab.com/gitlab-org/gitlab/-/issues/359142
|
||
|
CVE-2022-1941 - http://www.openwall.com/lists/oss-security/2022/09/27/1
|
||
|
CVE-2022-1941 - https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
|
||
|
CVE-2022-1942 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1942 - https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
|
||
|
CVE-2022-1943 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1ad35dd0548ce947d97aaf92f7f2f9a202951cf
|
||
|
CVE-2022-1945 - https://wpscan.com/vulnerability/4ad297e5-c92d-403c-abf4-9decf7e8378b
|
||
|
CVE-2022-1946 - https://wpscan.com/vulnerability/0903920c-be2e-4515-901f-87253eb30940
|
||
|
CVE-2022-1947 - https://huntr.dev/bounties/cb4d0ab3-51ba-4a42-9e38-ac0e544266f1
|
||
|
CVE-2022-1948 - https://gitlab.com/gitlab-org/security/gitlab/-/issues/673
|
||
|
CVE-2022-1950 - https://wpscan.com/vulnerability/4352283f-dd43-4827-b417-0c55d0f4637d
|
||
|
CVE-2022-1951 - https://wpscan.com/vulnerability/f56f7244-e8ec-4a87-9419-643bc13b45a0
|
||
|
CVE-2022-1952 - https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04
|
||
|
CVE-2022-1953 - https://wpscan.com/vulnerability/b66d6682-edbc-435f-a73a-dced32a32770
|
||
|
CVE-2022-1955 - https://fluidattacks.com/advisories/tempest/
|
||
|
CVE-2022-1955 - https://github.com/oxen-io/session-android/pull/897
|
||
|
CVE-2022-1956 - https://wpscan.com/vulnerability/ef6d0393-0ce3-465c-84c8-53bf8c58958a
|
||
|
CVE-2022-1957 - https://wpscan.com/vulnerability/ad3f6f3d-e12c-4867-906c-73aa001c7351
|
||
|
CVE-2022-1958 - https://vuldb.com/?id.201960
|
||
|
CVE-2022-1960 - https://wpscan.com/vulnerability/bc97dd57-e9f6-4bc3-a4c2-40303786ae4a
|
||
|
CVE-2022-1961 - https://gist.github.com/Xib3rR4dAr/02a21cd0ea0b7bf586131c5eebb69f1d
|
||
|
CVE-2022-1964 - https://wpscan.com/vulnerability/52cf7e3c-2a0c-45c4-be27-be87424f1338
|
||
|
CVE-2022-1967 - https://wpscan.com/vulnerability/02d25736-c796-49bd-b774-66e0e3fcf4c9
|
||
|
CVE-2022-1968 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-1968 - https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
|
||
|
CVE-2022-1971 - https://wpscan.com/vulnerability/1bffbbef-7876-43a6-9cb0-6e09bb4ff2b0
|
||
|
CVE-2022-1977 - https://wpscan.com/vulnerability/1b640519-75e1-48cb-944e-b9bff9de6d3d
|
||
|
CVE-2022-1979 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Message'%20Stored%20Cross-Site%20Scripting(XSS).md
|
||
|
CVE-2022-1979 - https://vuldb.com/?id.200950
|
||
|
CVE-2022-1980 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Product%20Show%20Room%20Site/'Telephone'%20Stored%20Cross-Site%20Scripting(XSS).md
|
||
|
CVE-2022-1980 - https://vuldb.com/?id.200951
|
||
|
CVE-2022-1982 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-1986 - https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930
|
||
|
CVE-2022-1987 - https://huntr.dev/bounties/e8197737-7557-443e-a59f-2a86e8dda75f
|
||
|
CVE-2022-1988 - https://huntr.dev/bounties/7882a35a-b27e-4d7e-9fcc-e9e009d0b01c
|
||
|
CVE-2022-1990 - https://wpscan.com/vulnerability/42f1bf1f-95a8-41ee-a637-88deb80ab870
|
||
|
CVE-2022-1991 - https://cyberthoth.medium.com/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6
|
||
|
CVE-2022-1991 - https://vuldb.com/?id.201276
|
||
|
CVE-2022-1992 - https://huntr.dev/bounties/2e8cdc57-a9cf-46ae-9088-87f09e6c90ab
|
||
|
CVE-2022-1993 - https://huntr.dev/bounties/22f9c074-cf60-4c67-b5c4-72fdf312609d
|
||
|
CVE-2022-1994 - https://wpscan.com/vulnerability/114d94be-b567-4b4b-9a44-f2c05cdbe18e
|
||
|
CVE-2022-1995 - https://wpscan.com/vulnerability/62fb399d-3327-45d0-b10f-769d2d164903
|
||
|
CVE-2022-1996 - https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
|
||
|
CVE-2022-1997 - https://huntr.dev/bounties/28861ae9-7b09-45b7-a003-eccf903db71d
|
||
|
CVE-2022-1998 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d
|
||
|
CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-2000 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-2000 - https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0
|
||
|
CVE-2022-2014 - https://huntr.dev/bounties/911a4ada-7fd6-467a-a464-b88604b16ffc
|
||
|
CVE-2022-2015 - https://huntr.dev/bounties/0d32f448-155c-4b71-9291-9e8bcd522b37
|
||
|
CVE-2022-2016 - https://huntr.dev/bounties/5fa17e9b-c767-46b4-af64-aafb8c2aa521
|
||
|
CVE-2022-2017 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI)2.md
|
||
|
CVE-2022-2017 - https://vuldb.com/?id.201365
|
||
|
CVE-2022-2018 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(SQLI).md
|
||
|
CVE-2022-2018 - https://vuldb.com/?id.201366
|
||
|
CVE-2022-20186 - http://packetstormsecurity.com/files/172852/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html
|
||
|
CVE-2022-2019 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System--.md
|
||
|
CVE-2022-2019 - https://vuldb.com/?id.201367
|
||
|
CVE-2022-2020 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Prison%20Management%20System(XSS).md
|
||
|
CVE-2022-2020 - https://vuldb.com/?id.201368
|
||
|
CVE-2022-2022 - https://huntr.dev/bounties/f6082949-40d3-411c-b613-23ada2691913
|
||
|
CVE-2022-2023 - https://huntr.dev/bounties/0f35b1d3-56e6-49e4-bc5a-830f52e094b3
|
||
|
CVE-2022-2024 - https://huntr.dev/bounties/18cf9256-23ab-4098-a769-85f8da130f97
|
||
|
CVE-2022-2026 - https://huntr.dev/bounties/dcfa6790-c609-4ed5-ba5e-8f31f98e5e11
|
||
|
CVE-2022-2027 - https://huntr.dev/bounties/fb99c27c-7eaa-48db-be39-b804cb83871d
|
||
|
CVE-2022-2028 - https://huntr.dev/bounties/588fb241-bc8f-40fc-82a4-df249956d69f
|
||
|
CVE-2022-2029 - https://huntr.dev/bounties/9052a874-634c-473e-a2b3-65112181543f
|
||
|
CVE-2022-2034 - https://wpscan.com/vulnerability/aba3dd58-7a8e-4129-add5-4dd5972c0426
|
||
|
CVE-2022-2035 - https://www.tenable.com/security/research/tra-2022-21
|
||
|
CVE-2022-2036 - https://huntr.dev/bounties/c7715149-f99c-4d62-a5c6-c78bfdb41905
|
||
|
CVE-2022-2037 - https://huntr.dev/bounties/4431ef84-93f2-4bc5-bc1a-97d7f229b28e
|
||
|
CVE-2022-2040 - https://wpscan.com/vulnerability/ab53a70c-57d5-400f-b11f-b1b7b2b0cf01
|
||
|
CVE-2022-2041 - https://wpscan.com/vulnerability/8edb11bc-9e8d-4a98-8538-aaff0f072109
|
||
|
CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-2042 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-2042 - https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba
|
||
|
CVE-2022-2046 - https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807
|
||
|
CVE-2022-2050 - https://wpscan.com/vulnerability/016453e3-803b-4a67-8ea7-2d228c2998d4
|
||
|
CVE-2022-2054 - https://huntr.dev/bounties/ea4a842c-c48c-4aae-a599-3305125c63a7
|
||
|
CVE-2022-2056 - https://gitlab.com/libtiff/libtiff/-/issues/415
|
||
|
CVE-2022-2057 - https://gitlab.com/libtiff/libtiff/-/issues/427
|
||
|
CVE-2022-2058 - https://gitlab.com/libtiff/libtiff/-/issues/428
|
||
|
CVE-2022-2060 - https://huntr.dev/bounties/2acfc8fe-247c-4f88-aeaa-042b6b8690a0
|
||
|
CVE-2022-2061 - https://huntr.dev/bounties/365ab61f-9a63-421c-97e6-21d4653021f0
|
||
|
CVE-2022-20612 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-20613 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-20614 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-20615 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-2062 - https://huntr.dev/bounties/35593b4c-f127-4699-8ad3-f0b2203a8ef6
|
||
|
CVE-2022-2063 - https://huntr.dev/bounties/156f405b-21d6-4384-9bff-17ebfe484e20
|
||
|
CVE-2022-2064 - https://huntr.dev/bounties/39523d51-fc5c-48b8-a082-171da79761bb
|
||
|
CVE-2022-20659 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-xss-P8fBz2FW
|
||
|
CVE-2022-2066 - https://huntr.dev/bounties/da4bbbfd-501f-4c7e-be83-47778103cb59
|
||
|
CVE-2022-20660 - http://packetstormsecurity.com/files/165567/Cisco-IP-Phone-Cleartext-Password-Storage.html
|
||
|
CVE-2022-20660 - http://seclists.org/fulldisclosure/2022/Jan/34
|
||
|
CVE-2022-2067 - https://huntr.dev/bounties/a85a53a4-3009-4f41-ac33-8bed8bbe16a8
|
||
|
CVE-2022-20699 - http://packetstormsecurity.com/files/167113/Cisco-RV340-SSL-VPN-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2022-20699 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20700 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20701 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20702 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20703 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20704 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20705 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html
|
||
|
CVE-2022-20705 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20706 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20707 - http://packetstormsecurity.com/files/170988/Cisco-RV-Series-Authentication-Bypass-Command-Injection.html
|
||
|
CVE-2022-20707 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20708 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20709 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-2071 - https://wpscan.com/vulnerability/d3653976-9e0a-4f2b-87f7-26b5e7a74b9d
|
||
|
CVE-2022-20710 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20711 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20712 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20713 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO
|
||
|
CVE-2022-20713 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-LOeKsNmO
|
||
|
CVE-2022-20718 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-px2c-q384-5wxc
|
||
|
CVE-2022-20719 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-8v5w-4fhm-gqxj
|
||
|
CVE-2022-2072 - https://wpscan.com/vulnerability/3014540c-21b3-481c-83a1-ce3017151af4
|
||
|
CVE-2022-2073 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66
|
||
|
CVE-2022-20738 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swg-fbyps-3z4qT7p
|
||
|
CVE-2022-20749 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
|
||
|
CVE-2022-20759 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-gq88-gqmj-7v24
|
||
|
CVE-2022-20775 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc
|
||
|
CVE-2022-20777 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-v56f-9gq3-rx3g
|
||
|
CVE-2022-20779 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-77vw-2pmg-q492
|
||
|
CVE-2022-2078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85
|
||
|
CVE-2022-20780 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-hrpq-384f-vrpg
|
||
|
CVE-2022-2079 - https://huntr.dev/bounties/2615adf2-ff40-4623-97fb-2e4a3800202a
|
||
|
CVE-2022-20791 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd
|
||
|
CVE-2022-20795 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vpndtls-dos-TunzLEV
|
||
|
CVE-2022-2080 - https://wpscan.com/vulnerability/5395d196-a39a-4a58-913e-5b5b9d6123a5
|
||
|
CVE-2022-20816 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-file-delete-N2VPmOnE
|
||
|
CVE-2022-20822 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-path-trav-Dz5dpzyM
|
||
|
CVE-2022-20822 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-path-traversal/
|
||
|
CVE-2022-20828 - http://packetstormsecurity.com/files/168256/Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection.html
|
||
|
CVE-2022-20829 - https://github.com/jbaines-r7/theway
|
||
|
CVE-2022-2083 - https://wpscan.com/vulnerability/2bbfc855-6901-462f-8a93-120d7fb5d268
|
||
|
CVE-2022-2085 - https://bugs.ghostscript.com/show_bug.cgi?id=704945
|
||
|
CVE-2022-2086 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbanksql.md
|
||
|
CVE-2022-2086 - https://vuldb.com/?id.202034
|
||
|
CVE-2022-2087 - https://github.com/joinia/webray.com.cn/blob/main/php-bank/phpbankxss.md
|
||
|
CVE-2022-2087 - https://vuldb.com/?id.202035
|
||
|
CVE-2022-2089 - https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8
|
||
|
CVE-2022-2090 - https://wpscan.com/vulnerability/0201f365-7acb-4640-bd3f-7119432f4917
|
||
|
CVE-2022-2091 - https://wpscan.com/vulnerability/03e7c2dc-1c6d-4cff-af59-6b41ead74978
|
||
|
CVE-2022-20917 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-jabber-xmpp-Ne9SCM
|
||
|
CVE-2022-2092 - https://wpscan.com/vulnerability/87546554-276a-45fe-b2aa-b18bfc55db2d
|
||
|
CVE-2022-20921 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mso-prvesc-BPFp9cZs
|
||
|
CVE-2022-20929 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-4f6q-86ww-gmcr
|
||
|
CVE-2022-2093 - https://wpscan.com/vulnerability/a11628e4-f47b-42d8-9c09-7536d49fce4c
|
||
|
CVE-2022-2094 - https://wpscan.com/vulnerability/c9a106e1-29ae-47ad-907b-01086af3d3fb
|
||
|
CVE-2022-20956 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx
|
||
|
CVE-2022-20956 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx
|
||
|
CVE-2022-20956 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-broken-access-control/
|
||
|
CVE-2022-20959 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-twLnpy3M
|
||
|
CVE-2022-20959 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-cross-site-scripting/
|
||
|
CVE-2022-20964 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
||
|
CVE-2022-20964 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
||
|
CVE-2022-20965 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
||
|
CVE-2022-20965 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
||
|
CVE-2022-20966 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
||
|
CVE-2022-20966 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
||
|
CVE-2022-20967 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-7Q4TNYUx
|
||
|
CVE-2022-20967 - https://yoroi.company/en/research/cve-advisory-full-disclosure-cisco-ise-multiple-vulnerabilities-rce-with-1-click/
|
||
|
CVE-2022-20968 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U
|
||
|
CVE-2022-20968 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U
|
||
|
CVE-2022-2098 - https://huntr.dev/bounties/a5d6c854-e158-49e9-bf40-bddc93dda7e6
|
||
|
CVE-2022-2099 - https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b
|
||
|
CVE-2022-2100 - https://wpscan.com/vulnerability/7d8b7871-baa5-4a54-a9e9-2c9d302cdd12
|
||
|
CVE-2022-2101 - https://medium.com/%40andreabocchetti88/download-manager-3-2-43-contributor-cross-site-scripting-fa4970fba45c
|
||
|
CVE-2022-2101 - https://packetstormsecurity.com/files/167573/
|
||
|
CVE-2022-2111 - https://huntr.dev/bounties/a0e5c68e-0f75-499b-bd7b-d935fb8c0cd1
|
||
|
CVE-2022-2112 - https://huntr.dev/bounties/e57c36e7-fa39-435f-944a-3a52ee066f73
|
||
|
CVE-2022-21122 - https://snyk.io/vuln/SNYK-JS-METACALC-2826197
|
||
|
CVE-2022-21129 - https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747
|
||
|
CVE-2022-2113 - https://huntr.dev/bounties/4cae8442-c042-43c2-ad89-6f666eaf3d57
|
||
|
CVE-2022-21134 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1447
|
||
|
CVE-2022-2114 - https://wpscan.com/vulnerability/59911ba4-fa06-498a-9e7c-0c337cce691c
|
||
|
CVE-2022-21144 - https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756
|
||
|
CVE-2022-21145 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1442
|
||
|
CVE-2022-21147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1452
|
||
|
CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036
|
||
|
CVE-2022-21149 - https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035
|
||
|
CVE-2022-2115 - https://wpscan.com/vulnerability/1f0ae535-c560-4510-ae9a-059e2435ad39
|
||
|
CVE-2022-21154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1464
|
||
|
CVE-2022-21159 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1467
|
||
|
CVE-2022-21159 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1467
|
||
|
CVE-2022-2116 - https://wpscan.com/vulnerability/01568da4-2ecf-4cf9-8030-31868ce0a87a
|
||
|
CVE-2022-21164 - https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723
|
||
|
CVE-2022-21165 - https://security.snyk.io/vuln/SNYK-JS-FONTCONVERTER-2976194
|
||
|
CVE-2022-21169 - https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4
|
||
|
CVE-2022-21169 - https://security.snyk.io/vuln/SNYK-JS-EXPRESSXSSSANITIZER-3027443
|
||
|
CVE-2022-21178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1457
|
||
|
CVE-2022-2118 - https://wpscan.com/vulnerability/9a19af60-d6e6-4fa3-82eb-3636599b814c
|
||
|
CVE-2022-21182 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1472
|
||
|
CVE-2022-21184 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1461
|
||
|
CVE-2022-21186 - https://security.snyk.io/vuln/SNYK-JS-ACRONTUMFILESYSTEMTEMPLATE-2419071
|
||
|
CVE-2022-21187 - https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204
|
||
|
CVE-2022-21189 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805308
|
||
|
CVE-2022-21189 - https://snyk.io/vuln/SNYK-JS-DEXIE-2607042
|
||
|
CVE-2022-21190 - https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808
|
||
|
CVE-2022-21190 - https://snyk.io/vuln/SNYK-JS-CONVICT-2774757
|
||
|
CVE-2022-21191 - https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973
|
||
|
CVE-2022-21192 - https://gist.github.com/lirantal/9ccdfda0edcb95e36d07a04b0b6c2db0
|
||
|
CVE-2022-21192 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149916
|
||
|
CVE-2022-21195 - https://snyk.io/vuln/SNYK-PYTHON-URLREGEX-2347643
|
||
|
CVE-2022-21199 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1448
|
||
|
CVE-2022-21201 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1456
|
||
|
CVE-2022-21208 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988723
|
||
|
CVE-2022-21210 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1444
|
||
|
CVE-2022-21211 - https://snyk.io/vuln/SNYK-JS-POSIX-2400719
|
||
|
CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2870623
|
||
|
CVE-2022-21213 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2870622
|
||
|
CVE-2022-21213 - https://snyk.io/vuln/SNYK-JS-MOUT-2342654
|
||
|
CVE-2022-21217 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1445
|
||
|
CVE-2022-2122 - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225
|
||
|
CVE-2022-21222 - https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488
|
||
|
CVE-2022-21223 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280
|
||
|
CVE-2022-21225 - http://packetstormsecurity.com/files/170180/Intel-Data-Center-Manager-4.1-SQL-Injection.html
|
||
|
CVE-2022-21225 - http://seclists.org/fulldisclosure/2022/Dec/1
|
||
|
CVE-2022-21227 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470
|
||
|
CVE-2022-21227 - https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645
|
||
|
CVE-2022-2123 - https://wpscan.com/vulnerability/46b634f6-92bc-4e00-a4c0-c25135c61922
|
||
|
CVE-2022-21231 - https://snyk.io/vuln/SNYK-JS-DEEPGETSET-2342655
|
||
|
CVE-2022-21234 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1443
|
||
|
CVE-2022-21235 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078
|
||
|
CVE-2022-21236 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1446
|
||
|
CVE-2022-21238 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1469
|
||
|
CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-2124 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-2124 - https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
|
||
|
CVE-2022-21242 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21243 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21244 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21245 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21246 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21247 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21248 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21249 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-2125 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-2125 - https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
|
||
|
CVE-2022-21250 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21251 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21252 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21253 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21254 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21255 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21256 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21257 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21258 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21259 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-2126 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-2126 - https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
|
||
|
CVE-2022-21260 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21261 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21262 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21263 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21264 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21265 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21266 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21267 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21268 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21269 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21270 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21271 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21271 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21272 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21273 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21274 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21275 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21276 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21277 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21278 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21279 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2128 - https://huntr.dev/bounties/ec40ec76-c7db-4384-a33b-024f3dd21d75
|
||
|
CVE-2022-21280 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21281 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21282 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21283 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21284 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21285 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21286 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21287 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21288 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21289 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2129 - https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
|
||
|
CVE-2022-21290 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21291 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21292 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21293 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21294 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21295 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21296 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21297 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21298 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21299 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2130 - https://huntr.dev/bounties/0142970a-5cb8-4dba-8bbc-4fa2f3bee65c
|
||
|
CVE-2022-21300 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21301 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21302 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21303 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21304 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21305 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21306 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21307 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21308 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21309 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21310 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21311 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21312 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21313 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21314 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21315 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21316 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21317 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21318 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21319 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21320 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21321 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21322 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21323 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21324 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21325 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21326 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21327 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21328 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21329 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2133 - https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de
|
||
|
CVE-2022-21330 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21331 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21332 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21333 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21334 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21335 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21336 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21337 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21338 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21339 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-2134 - https://huntr.dev/bounties/57b0f272-a97f-4cb3-b546-c863c68a561a
|
||
|
CVE-2022-21340 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21341 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21342 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21344 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21345 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21346 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21347 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21348 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21349 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21350 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21351 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21352 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21353 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21354 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21355 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21356 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21357 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21358 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21359 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21360 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21361 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21362 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21363 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21364 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21365 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21366 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21367 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21368 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21369 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21370 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21371 - http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html
|
||
|
CVE-2022-21371 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21372 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21373 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21374 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21375 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21375 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21376 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21377 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21378 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21379 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21380 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21381 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21382 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21383 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21385 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea010070d0a7497253d5a6f919f6dd107450b31a
|
||
|
CVE-2022-21386 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21387 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21388 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21389 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21390 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21391 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21392 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21393 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21394 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21395 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21396 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21397 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21398 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21399 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21400 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21401 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21402 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21403 - https://www.oracle.com/security-alerts/cpujan2022.html
|
||
|
CVE-2022-21404 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21405 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21409 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21410 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21411 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21412 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21413 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21414 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21415 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21416 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21417 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21418 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21419 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21420 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21421 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21422 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21423 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21424 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21425 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21426 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21427 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21428 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21429 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2143 - http://packetstormsecurity.com/files/168108/Advantech-iView-NetworkServlet-Command-Injection.html
|
||
|
CVE-2022-21430 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21431 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21432 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21434 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21435 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21436 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21437 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21438 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21439 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2144 - https://wpscan.com/vulnerability/419054d4-95e8-4f4a-b864-a98b3e18435a
|
||
|
CVE-2022-21440 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21441 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21442 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21443 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21444 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21445 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21446 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21447 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21448 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21449 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21450 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21451 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21452 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21453 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21454 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21455 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21456 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21457 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21458 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21459 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-2146 - https://wpscan.com/vulnerability/adc1d752-331e-44af-b5dc-b463d56c2cb4
|
||
|
CVE-2022-21460 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21461 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21462 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21463 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21464 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21465 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21466 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21467 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21468 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21469 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21470 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21471 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21472 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21473 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21474 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21475 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21476 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21477 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21478 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21479 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-2148 - https://wpscan.com/vulnerability/92214311-da6d-49a8-95c9-86f47635264f
|
||
|
CVE-2022-21480 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21481 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21482 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21483 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21484 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21485 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21486 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21487 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21488 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21489 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-2149 - https://wpscan.com/vulnerability/40191e87-8648-47ef-add0-d7180e8ffe13
|
||
|
CVE-2022-21490 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21491 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21492 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21493 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21494 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21496 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21497 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21498 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21499 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
|
||
|
CVE-2022-21500 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21508 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21509 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2151 - https://wpscan.com/vulnerability/7c08e4c1-57c5-471c-a990-dcb9fd7ce0f4
|
||
|
CVE-2022-21510 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21511 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21512 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21513 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21514 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21515 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21516 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21517 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21518 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21519 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2152 - https://wpscan.com/vulnerability/e972e2c5-0d56-4d2a-81cc-2b0dff750124
|
||
|
CVE-2022-21520 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21521 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21522 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21523 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21524 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21525 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21526 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21527 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21528 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21529 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2153 - https://www.openwall.com/lists/oss-security/2022/06/22/1
|
||
|
CVE-2022-21530 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21531 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21532 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21533 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21534 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21535 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21536 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21537 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21538 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21539 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21540 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21541 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21542 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21543 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21544 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21545 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21547 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21548 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21549 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21550 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21551 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21552 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21553 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21554 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21555 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21556 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21557 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21558 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21559 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21560 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21561 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21562 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21563 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21564 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21565 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21566 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21567 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21568 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21569 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21570 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21571 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21572 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21573 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21574 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21575 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21576 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21577 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21578 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21579 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21580 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21581 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21582 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21583 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21584 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21585 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21586 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-21587 - http://packetstormsecurity.com/files/171208/Oracle-E-Business-Suite-EBS-Unauthenticated-Arbitrary-File-Upload.html
|
||
|
CVE-2022-21587 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21589 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21590 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21591 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21592 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21593 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21594 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21595 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21596 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21597 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21598 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21599 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21600 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21601 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21602 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21603 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21604 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21605 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21606 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21607 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21608 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21609 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21610 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21611 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21612 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21613 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21614 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21615 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21616 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21617 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21618 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21619 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21620 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21621 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21622 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21623 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21624 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21625 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21626 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21627 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21628 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21629 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21630 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21631 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21632 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21633 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21634 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21635 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21636 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21637 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21638 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21639 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21640 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21641 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-21649 - https://www.huntr.dev/bounties/4532a0ac-4e7c-4fcf-9fe3-630e132325c0/
|
||
|
CVE-2022-21650 - https://www.huntr.dev/bounties/ae424798-de01-4972-b73b-2db674f82368/
|
||
|
CVE-2022-21658 - https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
|
||
|
CVE-2022-2166 - https://huntr.dev/bounties/2f96f990-01c2-44ea-ae47-58bdb3aa455b
|
||
|
CVE-2022-21661 - http://packetstormsecurity.com/files/165540/WordPress-Core-5.8.2-SQL-Injection.html
|
||
|
CVE-2022-21661 - https://www.exploit-db.com/exploits/50663
|
||
|
CVE-2022-2167 - https://wpscan.com/vulnerability/ad35fbae-1e90-47a0-b1d2-f8d91a5db90e
|
||
|
CVE-2022-21677 - https://github.com/discourse/discourse/security/advisories/GHSA-768r-ppv4-5r27
|
||
|
CVE-2022-2168 - https://wpscan.com/vulnerability/66789b32-049e-4440-8b19-658649851010
|
||
|
CVE-2022-21680 - https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf
|
||
|
CVE-2022-21681 - https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj
|
||
|
CVE-2022-21689 - https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc
|
||
|
CVE-2022-2169 - https://wpscan.com/vulnerability/a9f4aab7-b42b-4bb6-b05d-05407f935230
|
||
|
CVE-2022-21694 - https://github.com/onionshare/onionshare/issues/1389
|
||
|
CVE-2022-21699 - https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x
|
||
|
CVE-2022-2170 - https://wpscan.com/vulnerability/6eaef938-ce98-4d57-8a1d-fa9d1ae3d6ed
|
||
|
CVE-2022-2171 - https://wpscan.com/vulnerability/11937296-7ecf-4b94-b274-06f7990dbede
|
||
|
CVE-2022-21711 - https://github.com/liyansong2018/elfspirit/issues/1
|
||
|
CVE-2022-21716 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-2172 - https://wpscan.com/vulnerability/bfb6ed12-ae64-4075-9d0b-5620e998df74
|
||
|
CVE-2022-21720 - https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83
|
||
|
CVE-2022-21723 - http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
|
||
|
CVE-2022-2173 - https://wpscan.com/vulnerability/86bfe0cc-a579-43d6-a26b-6e06000251f6
|
||
|
CVE-2022-2174 - https://huntr.dev/bounties/ac68e3fc-8cf1-4a62-90ee-95c4b2bad607
|
||
|
CVE-2022-2175 - https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
|
||
|
CVE-2022-21796 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1451
|
||
|
CVE-2022-21797 - https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033
|
||
|
CVE-2022-2180 - https://wpscan.com/vulnerability/c330f92b-1e21-414f-b316-d5e97cb62bd1
|
||
|
CVE-2022-21801 - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1450
|
||
|
CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936781
|
||
|
CVE-2022-21802 - https://security.snyk.io/vuln/SNYK-JS-GRAPESJS-2935960
|
||
|
CVE-2022-21803 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2632450
|
||
|
CVE-2022-21803 - https://snyk.io/vuln/SNYK-JS-NCONF-2395478
|
||
|
CVE-2022-21806 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1440
|
||
|
CVE-2022-21809 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1468
|
||
|
CVE-2022-2181 - https://wpscan.com/vulnerability/68ddf343-6e69-44a7-bd33-72004053d41e
|
||
|
CVE-2022-21810 - https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613
|
||
|
CVE-2022-21817 - https://nvidia.custhelp.com/app/answers/detail/a_id/5318
|
||
|
CVE-2022-2182 - https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
|
||
|
CVE-2022-21820 - http://packetstormsecurity.com/files/167396/NVIDIA-Data-Center-GPU-Manager-Remote-Memory-Corruption.html
|
||
|
CVE-2022-21824 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-21824 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2183 - https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975
|
||
|
CVE-2022-2184 - https://wpscan.com/vulnerability/e777784f-5ba0-4966-be27-e0a0cbbfe056
|
||
|
CVE-2022-2186 - https://wpscan.com/vulnerability/b766103a-7f91-4d91-9f9c-bff4bfd53f57
|
||
|
CVE-2022-2187 - https://wpscan.com/vulnerability/4fd2f1ef-39c6-4425-8b4d-1a332dabac8d
|
||
|
CVE-2022-2188 - https://kcm.trellix.com/corporate/index?page=content&id=SB10383
|
||
|
CVE-2022-21881 - http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html
|
||
|
CVE-2022-21882 - http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html
|
||
|
CVE-2022-2189 - https://wpscan.com/vulnerability/b6ed4d64-ee98-41bd-a97a-8350c2a8a546
|
||
|
CVE-2022-2190 - https://wpscan.com/vulnerability/1af4beb6-ba16-429b-acf2-43f9594f5ace
|
||
|
CVE-2022-21907 - http://packetstormsecurity.com/files/165566/HTTP-Protocol-Stack-Denial-Of-Service-Remote-Code-Execution.html
|
||
|
CVE-2022-21907 - http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html
|
||
|
CVE-2022-21907 - https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907
|
||
|
CVE-2022-2194 - https://wpscan.com/vulnerability/ecf4b707-dea9-42d0-9ade-d788a9f97190
|
||
|
CVE-2022-21948 - https://bugzilla.suse.com/show_bug.cgi?id=1197930
|
||
|
CVE-2022-21952 - https://bugzilla.suse.com/show_bug.cgi?id=1199512
|
||
|
CVE-2022-2196 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
|
||
|
CVE-2022-2198 - https://wpscan.com/vulnerability/867248f2-d497-4ea8-b3f8-0f2e8aaaa2bd
|
||
|
CVE-2022-21999 - http://packetstormsecurity.com/files/166344/Windows-SpoolFool-Privilege-Escalation.html
|
||
|
CVE-2022-22026 - http://packetstormsecurity.com/files/168068/Windows-sxs-CNodeFactory-XMLParser_Element_doc_assembly_assemblyIdentity-Heap-Buffer-Overflow.html
|
||
|
CVE-2022-22031 - http://packetstormsecurity.com/files/168094/Windows-Credential-Guard-Domain-Joined-Device-Public-Key-Privilege-Escalation.html
|
||
|
CVE-2022-22049 - http://packetstormsecurity.com/files/168069/Windows-sxssrv-BaseSrvActivationContextCacheDuplicateUnicodeString-Heap-Buffer-Overflow.html
|
||
|
CVE-2022-22057 - http://packetstormsecurity.com/files/172850/Qualcomm-kgsl-Driver-Use-After-Free.html
|
||
|
CVE-2022-2206 - https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668
|
||
|
CVE-2022-2207 - https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
|
||
|
CVE-2022-2208 - https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1
|
||
|
CVE-2022-2210 - https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
|
||
|
CVE-2022-22107 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107
|
||
|
CVE-2022-22108 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108
|
||
|
CVE-2022-22109 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109
|
||
|
CVE-2022-22110 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110
|
||
|
CVE-2022-22111 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111
|
||
|
CVE-2022-22112 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22112
|
||
|
CVE-2022-22113 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22113
|
||
|
CVE-2022-22114 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22114
|
||
|
CVE-2022-22115 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22115
|
||
|
CVE-2022-22116 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22116
|
||
|
CVE-2022-22117 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22117
|
||
|
CVE-2022-2212 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/File_Upload/POC.md
|
||
|
CVE-2022-2212 - https://vuldb.com/?id.202758
|
||
|
CVE-2022-22120 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22120
|
||
|
CVE-2022-22121 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22121
|
||
|
CVE-2022-22123 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22123
|
||
|
CVE-2022-22124 - https://github.com/halo-dev/halo/issues/1575
|
||
|
CVE-2022-22124 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22124
|
||
|
CVE-2022-22125 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22125
|
||
|
CVE-2022-2213 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Cross%20Site%20Scripting(Stored)/POC.md
|
||
|
CVE-2022-2213 - https://vuldb.com/?id.202759
|
||
|
CVE-2022-22137 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1449
|
||
|
CVE-2022-22138 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367
|
||
|
CVE-2022-2214 - https://github.com/CyberThoth/CVE/blob/main/CVE/Library%20Management%20System%20with%20QR%20code%20Attendance/Sql%20Injection/POC.md
|
||
|
CVE-2022-2214 - https://vuldb.com/?id.202760
|
||
|
CVE-2022-22140 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1458
|
||
|
CVE-2022-22143 - https://snyk.io/vuln/SNYK-JS-CONVICT-2340604
|
||
|
CVE-2022-22144 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1459
|
||
|
CVE-2022-22149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1441
|
||
|
CVE-2022-2215 - https://wpscan.com/vulnerability/daa9b6c1-1ee1-434c-9f88-fd273b7e20bb
|
||
|
CVE-2022-22150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439
|
||
|
CVE-2022-2216 - https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1
|
||
|
CVE-2022-2217 - https://huntr.dev/bounties/4e046c63-b1ca-4bcc-b418-29796918a71b
|
||
|
CVE-2022-2218 - https://huntr.dev/bounties/024912d3-f103-4daf-a1d0-567f4d9f2bf5
|
||
|
CVE-2022-2219 - https://wpscan.com/vulnerability/1240797c-7f45-4c36-83f0-501c544ce76a
|
||
|
CVE-2022-2222 - https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b
|
||
|
CVE-2022-22263 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22264 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22265 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22266 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22267 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22268 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22269 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22270 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22271 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22272 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=1
|
||
|
CVE-2022-22291 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-22292 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-22293 - https://github.com/Dolibarr/dolibarr/issues/20237
|
||
|
CVE-2022-2231 - https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5
|
||
|
CVE-2022-22312 - https://www.ibm.com/support/pages/node/6574671
|
||
|
CVE-2022-22323 - https://www.ibm.com/support/pages/node/6574671
|
||
|
CVE-2022-2239 - https://wpscan.com/vulnerability/42127d96-547f-46cb-95d0-a19a8fe7580e
|
||
|
CVE-2022-2241 - https://wpscan.com/vulnerability/8670d196-972b-491b-8d9b-25994a345f57
|
||
|
CVE-2022-2242 - https://www.kuka.com/advisories-CVE-2022-2242
|
||
|
CVE-2022-2245 - https://wpscan.com/vulnerability/33705003-1f82-4b0c-9b4b-d4de75da309c
|
||
|
CVE-2022-2250 - https://gitlab.com/gitlab-org/gitlab/-/issues/355509
|
||
|
CVE-2022-2251 - https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27386
|
||
|
CVE-2022-2252 - https://huntr.dev/bounties/4d394bcc-a000-4f96-8cd2-8c565e1347e8
|
||
|
CVE-2022-22521 - http://packetstormsecurity.com/files/166881/Miele-Benchmark-Programming-Tool-1.1.49-1.2.71-Privilege-Escalation.html
|
||
|
CVE-2022-22521 - http://seclists.org/fulldisclosure/2022/Apr/42
|
||
|
CVE-2022-22528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22530 - https://launchpad.support.sap.com/#/notes/3112928
|
||
|
CVE-2022-22531 - https://launchpad.support.sap.com/#/notes/3112928
|
||
|
CVE-2022-22532 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22533 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22534 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22535 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22536 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22537 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22538 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22539 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22540 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22541 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22542 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22543 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22544 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22545 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22546 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-22547 - http://packetstormsecurity.com/files/167562/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Information-Disclosure.html
|
||
|
CVE-2022-2257 - https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
|
||
|
CVE-2022-2260 - https://wpscan.com/vulnerability/831b3afa-8fa3-4cb7-8374-36d0c368292f
|
||
|
CVE-2022-2261 - https://wpscan.com/vulnerability/f6091d7b-97b5-42f2-b2f4-09a0fe6d5a21
|
||
|
CVE-2022-2262 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_all_room.php%20id%20SQL%20inject.md
|
||
|
CVE-2022-2262 - https://vuldb.com/?id.202981
|
||
|
CVE-2022-2263 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/Online%20Hotel%20Booking%20System/Online%20Hotel%20Booking%20System%20edit_room_cat.php%20id%20SQL%20inject.md
|
||
|
CVE-2022-2263 - https://vuldb.com/?id.202982
|
||
|
CVE-2022-2264 - https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c
|
||
|
CVE-2022-22666 - http://packetstormsecurity.com/files/167144/AppleVideoDecoder-CreateHeaderBuffer-Out-Of-Bounds-Free.html
|
||
|
CVE-2022-2267 - https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870
|
||
|
CVE-2022-2268 - https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7
|
||
|
CVE-2022-2269 - https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65
|
||
|
CVE-2022-22700 - https://fluidattacks.com/advisories/porter/
|
||
|
CVE-2022-22701 - https://fluidattacks.com/advisories/hendrix/
|
||
|
CVE-2022-22702 - https://fluidattacks.com/advisories/joplin/
|
||
|
CVE-2022-2271 - https://wpscan.com/vulnerability/b064940f-9614-4b7b-b2c4-e79528746833
|
||
|
CVE-2022-22719 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-22720 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-22720 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22721 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-22721 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2273 - https://wpscan.com/vulnerability/724729d9-1c4a-485c-9c90-a27664c47c84
|
||
|
CVE-2022-22734 - https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251
|
||
|
CVE-2022-22735 - https://wpscan.com/vulnerability/6940a97e-5a75-405c-be74-bedcc3a8ee00
|
||
|
CVE-2022-22737 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
|
||
|
CVE-2022-22739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
|
||
|
CVE-2022-22740 - https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
|
||
|
CVE-2022-22744 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737252
|
||
|
CVE-2022-22748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
|
||
|
CVE-2022-2275 - https://wpscan.com/vulnerability/07757d1e-39ad-4199-bc7a-ecb821dfc996
|
||
|
CVE-2022-22753 - https://bugzilla.mozilla.org/show_bug.cgi?id=1732435
|
||
|
CVE-2022-22753 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22754 - https://bugzilla.mozilla.org/show_bug.cgi?id=1750565
|
||
|
CVE-2022-22754 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22755 - https://bugzilla.mozilla.org/show_bug.cgi?id=1309630
|
||
|
CVE-2022-22755 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22756 - https://bugzilla.mozilla.org/show_bug.cgi?id=1317873
|
||
|
CVE-2022-22756 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22757 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22758 - https://bugzilla.mozilla.org/show_bug.cgi?id=1728742
|
||
|
CVE-2022-22758 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22759 - https://bugzilla.mozilla.org/show_bug.cgi?id=1739957
|
||
|
CVE-2022-22759 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-2276 - https://wpscan.com/vulnerability/92de9c1b-48dd-4a5f-bbb3-455f8f172b09
|
||
|
CVE-2022-22760 - https://bugzilla.mozilla.org/show_bug.cgi?id=1740985
|
||
|
CVE-2022-22760 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22761 - https://bugzilla.mozilla.org/show_bug.cgi?id=1745566
|
||
|
CVE-2022-22761 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22762 - https://bugzilla.mozilla.org/show_bug.cgi?id=1743931
|
||
|
CVE-2022-22762 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-22764 - https://www.mozilla.org/security/advisories/mfsa2022-04/
|
||
|
CVE-2022-2278 - https://wpscan.com/vulnerability/4481731d-4dbf-4bfa-b4cc-64f10bb7e7bf
|
||
|
CVE-2022-22787 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
|
||
|
CVE-2022-2279 - https://huntr.dev/bounties/68c249e2-779d-4871-b7e3-851f03aca2de
|
||
|
CVE-2022-22805 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02
|
||
|
CVE-2022-22806 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-02
|
||
|
CVE-2022-22819 - https://oxide.computer/blog/another-vulnerability-in-the-lpc55s69-rom
|
||
|
CVE-2022-22831 - http://packetstormsecurity.com/files/165863/Servisnet-Tessa-Authentication-Bypass.html
|
||
|
CVE-2022-22831 - https://www.exploit-db.com/exploits/50714
|
||
|
CVE-2022-22831 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Add-sysAdmin-User-Unauthenticated.html
|
||
|
CVE-2022-22832 - http://packetstormsecurity.com/files/165873/Servisnet-Tessa-Privilege-Escalation.html
|
||
|
CVE-2022-22832 - https://www.exploit-db.com/exploits/50712
|
||
|
CVE-2022-22832 - https://www.pentest.com.tr/exploits/Servisnet-Tessa-Privilege-Escalation.html
|
||
|
CVE-2022-22833 - http://packetstormsecurity.com/files/165867/Servisnet-Tessa-MQTT-Credential-Disclosure.html
|
||
|
CVE-2022-22833 - https://pentest.com.tr/exploits/Servisnet-Tessa-MQTT-Credentials-Dump-Unauthenticated.html
|
||
|
CVE-2022-22833 - https://www.exploit-db.com/exploits/50713
|
||
|
CVE-2022-22834 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/
|
||
|
CVE-2022-22835 - https://labs.yarix.com/2022/03/overit-framework-xslt-injection-and-xxe-cve-2022-22834-cve-2022-22835/
|
||
|
CVE-2022-22836 - https://yoursecuritybores.me/coreftp-vulnerabilities/
|
||
|
CVE-2022-2284 - https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
|
||
|
CVE-2022-22844 - https://gitlab.com/libtiff/libtiff/-/issues/355
|
||
|
CVE-2022-2285 - https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
|
||
|
CVE-2022-22853 - https://github.com/Dheeraj-Deshmukh/stored-xss-in-Hospital-s-Patient-Records-Management-System
|
||
|
CVE-2022-22853 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hprms_0.zip
|
||
|
CVE-2022-2286 - https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
|
||
|
CVE-2022-2287 - https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
|
||
|
CVE-2022-2288 - https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
|
||
|
CVE-2022-2289 - https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
|
||
|
CVE-2022-22890 - https://github.com/jerryscript-project/jerryscript/issues/4847
|
||
|
CVE-2022-22891 - https://github.com/jerryscript-project/jerryscript/issues/4871
|
||
|
CVE-2022-22892 - https://github.com/jerryscript-project/jerryscript/issues/4872
|
||
|
CVE-2022-22893 - https://github.com/jerryscript-project/jerryscript/issues/4901
|
||
|
CVE-2022-22894 - https://github.com/jerryscript-project/jerryscript/issues/4890
|
||
|
CVE-2022-22895 - https://github.com/jerryscript-project/jerryscript/issues/4882
|
||
|
CVE-2022-22897 - http://packetstormsecurity.com/files/168148/PrestaShop-Ap-Pagebuilder-2.4.4-SQL-Injection.html
|
||
|
CVE-2022-22897 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/05/appagebuilder.html
|
||
|
CVE-2022-22899 - https://yoursecuritybores.me/coreftp-vulnerabilities/
|
||
|
CVE-2022-2290 - https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf
|
||
|
CVE-2022-22901 - https://github.com/jerryscript-project/jerryscript/issues/4916
|
||
|
CVE-2022-22909 - https://github.com/0z09e/CVE-2022-22909
|
||
|
CVE-2022-2291 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Refelected)/POC.md
|
||
|
CVE-2022-2291 - https://vuldb.com/?id.203165
|
||
|
CVE-2022-22916 - https://github.com/wendell1224/O2OA-POC/blob/main/POC.md
|
||
|
CVE-2022-2292 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Hotel%20Management%20system/Cross%20Site%20Scripting(Stored)/POC.md
|
||
|
CVE-2022-22922 - https://github.com/emremulazimoglu/cve/blob/main/CWE330-TL-WA850RE-v6.md
|
||
|
CVE-2022-2293 - https://github.com/CyberThoth/CVE/blob/a203e5c7b3ac88a5a0bc7200324f2b24716e8fc2/CVE/Simple%20Sales%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md
|
||
|
CVE-2022-22934 - https://github.com/saltstack/salt/releases,
|
||
|
CVE-2022-22935 - https://github.com/saltstack/salt/releases,
|
||
|
CVE-2022-22936 - https://github.com/saltstack/salt/releases,
|
||
|
CVE-2022-22941 - https://github.com/saltstack/salt/releases,
|
||
|
CVE-2022-22946 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22947 - http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html
|
||
|
CVE-2022-22947 - http://packetstormsecurity.com/files/168742/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html
|
||
|
CVE-2022-22947 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-22947 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22954 - http://packetstormsecurity.com/files/166935/VMware-Workspace-ONE-Access-Template-Injection-Command-Execution.html
|
||
|
CVE-2022-22956 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html
|
||
|
CVE-2022-22956 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html
|
||
|
CVE-2022-22957 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html
|
||
|
CVE-2022-22957 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html
|
||
|
CVE-2022-22960 - http://packetstormsecurity.com/files/171918/Mware-Workspace-ONE-Remote-Code-Execution.html
|
||
|
CVE-2022-22960 - http://packetstormsecurity.com/files/171918/VMware-Workspace-ONE-Remote-Code-Execution.html
|
||
|
CVE-2022-22960 - http://packetstormsecurity.com/files/171935/VMware-Workspace-ONE-Access-Privilege-Escalation.html
|
||
|
CVE-2022-22963 - http://packetstormsecurity.com/files/173430/Spring-Cloud-3.2.2-Remote-Command-Execution.html
|
||
|
CVE-2022-22963 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-scf-rce-DQrHhJxH
|
||
|
CVE-2022-22963 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-22963 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22965 - http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html
|
||
|
CVE-2022-22965 - http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html
|
||
|
CVE-2022-22965 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-22965 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22968 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22969 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2297 - https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/CVE/Clinic's%20Patient%20Management%20System/Unrestricted%20file%20upload%20(RCE)/POC.md
|
||
|
CVE-2022-22970 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22971 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22976 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-22978 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2298 - https://github.com/CyberThoth/CVE/blob/63e283e7d7dad3783237f15cdae2bb649bc1e198/CVE/Clinic's%20Patient%20Management%20System/SQLi/POC.md
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625
|
||
|
CVE-2022-22984 - https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680
|
||
|
CVE-2022-22988 - https://www.westerndigital.com/support/product-security/wdc-22003-edgerover-desktop-app-version-1-5-0-576
|
||
|
CVE-2022-22989 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
||
|
CVE-2022-2299 - https://wpscan.com/vulnerability/29015c35-0470-41b8-b197-c71b800ae2a9
|
||
|
CVE-2022-22990 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
||
|
CVE-2022-22991 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
||
|
CVE-2022-22992 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
||
|
CVE-2022-22993 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
||
|
CVE-2022-22994 - https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
|
||
|
CVE-2022-22995 - https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities
|
||
|
CVE-2022-22996 - https://www.westerndigital.com/support/product-security/wdc-22007-sandisk-professional-g-raid-4-8-software-utility-setup-for-windows-privilege-escalation
|
||
|
CVE-2022-22997 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107
|
||
|
CVE-2022-22998 - https://www.westerndigital.com/support/product-security/wdc-22009-my-cloud-home-firmware-version-8-7-0-107
|
||
|
CVE-2022-22999 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114
|
||
|
CVE-2022-2300 - https://huntr.dev/bounties/882d6cf9-64f5-4614-a873-a3030473c817
|
||
|
CVE-2022-23000 - https://www.westerndigital.com/support/product-security/wdc-22011-my-cloud-firmware-version-5-23-114
|
||
|
CVE-2022-23001 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
||
|
CVE-2022-23002 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
||
|
CVE-2022-23003 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
||
|
CVE-2022-23004 - https://www.westerndigital.com/support/product-security/wdc-22013-sweet-b-incorrect-output-vulnerabilities
|
||
|
CVE-2022-23005 - https://documents.westerndigital.com/content/dam/doc-library/en_us/assets/public/western-digital/collateral/white-paper/white-paper-host-boot-rom-code-vulnerability-and-mitigation.pdf
|
||
|
CVE-2022-23005 - https://www.westerndigital.com/support/product-security/wdc-23001-host-boot-rom-code-vulnerability-in-systems-implementing-ufs-boot-feature
|
||
|
CVE-2022-2301 - https://huntr.dev/bounties/f6b9114b-671d-4948-b946-ffe5c9aeb816
|
||
|
CVE-2022-2304 - https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
|
||
|
CVE-2022-23043 - https://fluidattacks.com/advisories/simone/
|
||
|
CVE-2022-23045 - https://fluidattacks.com/advisories/osbourne/
|
||
|
CVE-2022-23046 - http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.html
|
||
|
CVE-2022-23046 - https://fluidattacks.com/advisories/mercury/
|
||
|
CVE-2022-23047 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1459
|
||
|
CVE-2022-23047 - https://fluidattacks.com/advisories/franklin/
|
||
|
CVE-2022-23048 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1460
|
||
|
CVE-2022-23048 - https://fluidattacks.com/advisories/dylan/
|
||
|
CVE-2022-23049 - https://exponentcms.lighthouseapp.com/projects/61783/tickets/1461
|
||
|
CVE-2022-23049 - https://fluidattacks.com/advisories/cobain/
|
||
|
CVE-2022-2305 - https://wpscan.com/vulnerability/ea0180cd-e018-43ea-88b9-fa8e71bf34bf
|
||
|
CVE-2022-23050 - https://fluidattacks.com/advisories/cerati/
|
||
|
CVE-2022-23051 - https://fluidattacks.com/advisories/brown/
|
||
|
CVE-2022-23052 - https://fluidattacks.com/advisories/jett/
|
||
|
CVE-2022-23055 - https://www.mend.io/vulnerability-database/CVE-2022-23055
|
||
|
CVE-2022-23056 - https://www.mend.io/vulnerability-database/CVE-2022-23056
|
||
|
CVE-2022-23057 - https://www.mend.io/vulnerability-database/CVE-2022-23057
|
||
|
CVE-2022-23058 - https://www.mend.io/vulnerability-database/CVE-2022-23058
|
||
|
CVE-2022-23059 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059
|
||
|
CVE-2022-2306 - https://huntr.dev/bounties/35acf263-6db4-4310-ab27-4c3c3a53f796
|
||
|
CVE-2022-23060 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23060
|
||
|
CVE-2022-23061 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23061
|
||
|
CVE-2022-23063 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23063
|
||
|
CVE-2022-23064 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064
|
||
|
CVE-2022-23065 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23065
|
||
|
CVE-2022-23066 - https://blocksecteam.medium.com/how-a-critical-bug-in-solana-network-was-detected-and-timely-patched-a701870e1324
|
||
|
CVE-2022-23066 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23066
|
||
|
CVE-2022-23067 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23067
|
||
|
CVE-2022-23068 - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23068
|
||
|
CVE-2022-23071 - https://www.mend.io/vulnerability-database/CVE-2022-23071
|
||
|
CVE-2022-23072 - https://www.mend.io/vulnerability-database/CVE-2022-23072
|
||
|
CVE-2022-23073 - https://www.mend.io/vulnerability-database/CVE-2022-23073
|
||
|
CVE-2022-23074 - https://www.mend.io/vulnerability-database/CVE-2022-23074
|
||
|
CVE-2022-23077 - https://www.mend.io/vulnerability-database/CVE-2022-23077
|
||
|
CVE-2022-23078 - https://www.mend.io/vulnerability-database/CVE-2022-23078
|
||
|
CVE-2022-23079 - https://www.mend.io/vulnerability-database/CVE-2022-23079
|
||
|
CVE-2022-23080 - https://www.mend.io/vulnerability-database/CVE-2022-23080
|
||
|
CVE-2022-23081 - https://www.mend.io/vulnerability-database/CVE-2022-23081
|
||
|
CVE-2022-23082 - https://www.mend.io/vulnerability-database/CVE-2022-23082
|
||
|
CVE-2022-2309 - https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
|
||
|
CVE-2022-23099 - https://seclists.org/fulldisclosure/2022/Jul/11
|
||
|
CVE-2022-2310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10384&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
|
||
|
CVE-2022-23100 - https://seclists.org/fulldisclosure/2022/Jul/11
|
||
|
CVE-2022-23101 - https://seclists.org/fulldisclosure/2022/Jul/11
|
||
|
CVE-2022-23102 - http://packetstormsecurity.com/files/165966/SIEMENS-SINEMA-Remote-Connect-1.0-SP3-HF1-Open-Redirection.html
|
||
|
CVE-2022-23102 - http://seclists.org/fulldisclosure/2022/Feb/20
|
||
|
CVE-2022-23103 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1462
|
||
|
CVE-2022-2311 - https://wpscan.com/vulnerability/287a14dc-d1fc-481d-84af-7eb172dc68c9
|
||
|
CVE-2022-23119 - https://success.trendmicro.com/solution/000290104
|
||
|
CVE-2022-23119 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt
|
||
|
CVE-2022-2312 - https://wpscan.com/vulnerability/7548c1fb-77b5-4290-a297-35820edfe0f8
|
||
|
CVE-2022-23120 - https://success.trendmicro.com/solution/000290104
|
||
|
CVE-2022-23120 - https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt
|
||
|
CVE-2022-2313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10385&actp=null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
|
||
|
CVE-2022-2314 - https://wpscan.com/vulnerability/b22fe77c-844e-4c24-8023-014441cc1e82
|
||
|
CVE-2022-2317 - https://wpscan.com/vulnerability/77b7ca19-294c-4480-8f57-6fddfc67fffb
|
||
|
CVE-2022-23178 - https://www.redteam-pentesting.de/advisories/rt-sa-2021-009
|
||
|
CVE-2022-23179 - https://wpscan.com/vulnerability/90b8af99-e4a1-4076-99fa-efe805dd4be4/
|
||
|
CVE-2022-2318 - https://github.com/torvalds/linux/commit/9cc02ede696272c5271a401e4f27c262359bc2f6
|
||
|
CVE-2022-23180 - https://wpscan.com/vulnerability/da87358a-3a72-4cf7-a2af-a266dd9b4290/
|
||
|
CVE-2022-23181 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23181 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2321 - https://huntr.dev/bounties/3055b3f5-6b80-4d47-8e00-3500dfb458bc
|
||
|
CVE-2022-23218 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23219 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23221 - http://packetstormsecurity.com/files/165676/H2-Database-Console-Remote-Code-Execution.html
|
||
|
CVE-2022-23221 - http://seclists.org/fulldisclosure/2022/Jan/39
|
||
|
CVE-2022-23221 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23221 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23227 - https://github.com/pedrib/PoC/blob/master/advisories/NUUO/nuuo_nvrmini_round2.mkd
|
||
|
CVE-2022-23227 - https://github.com/rapid7/metasploit-framework/pull/16044
|
||
|
CVE-2022-23227 - https://portswigger.net/daily-swig/researcher-discloses-alleged-zero-day-vulnerabilities-in-nuuo-nvrmini2-recording-device
|
||
|
CVE-2022-2325 - https://wpscan.com/vulnerability/c8dcd7a7-5ad4-452c-a6a5-2362986656e4
|
||
|
CVE-2022-2326 - https://gitlab.com/gitlab-org/gitlab/-/issues/356665
|
||
|
CVE-2022-23277 - http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html
|
||
|
CVE-2022-2328 - https://wpscan.com/vulnerability/dbac391b-fc48-4e5e-b63a-2b3ddb0d5552
|
||
|
CVE-2022-2330 - https://kcm.trellix.com/corporate/index?page=content&id=SB10386
|
||
|
CVE-2022-23302 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23302 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23305 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23305 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23307 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23307 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23308 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23316 - https://github.com/taogogo/taocms/issues/15
|
||
|
CVE-2022-23320 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/
|
||
|
CVE-2022-23321 - https://www.triaxiomsecurity.com/xmpie-ustore-vulnerabilities-discovered/
|
||
|
CVE-2022-23332 - https://github.com/kyl3song/CVE/tree/main/CVE-2022-23332
|
||
|
CVE-2022-23334 - https://www.on-x.com/wp-content/uploads/2023/01/ON-X-Security-Advisory-Ip-label-Ekara-Newtest-CVE-2022-23334.pdf
|
||
|
CVE-2022-23340 - https://github.com/laurent22/joplin/issues/6004
|
||
|
CVE-2022-23342 - https://github.com/InitRoot/CVE-2022-23342
|
||
|
CVE-2022-23345 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23345
|
||
|
CVE-2022-23346 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23346
|
||
|
CVE-2022-23347 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347
|
||
|
CVE-2022-23348 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23348
|
||
|
CVE-2022-23349 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23349
|
||
|
CVE-2022-23350 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23350
|
||
|
CVE-2022-23352 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23352
|
||
|
CVE-2022-23366 - http://packetstormsecurity.com/files/165948/Hospital-Management-Startup-1.0-SQL-Injection.html
|
||
|
CVE-2022-23366 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-23366
|
||
|
CVE-2022-23367 - https://gist.github.com/bincat99/311aff295c270371dc8ee89599b016f1
|
||
|
CVE-2022-23377 - https://www.exploit-db.com/exploits/50665
|
||
|
CVE-2022-23378 - https://github.com/TheGetch/CVE-2022-23378
|
||
|
CVE-2022-2339 - https://huntr.dev/bounties/fff06de8-2a82-49b1-8e81-968731e87eef
|
||
|
CVE-2022-23390 - https://github.com/diyhi/bbs/issues/51
|
||
|
CVE-2022-23399 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1454
|
||
|
CVE-2022-2340 - https://packetstormsecurity.com/files/167595/
|
||
|
CVE-2022-2340 - https://wpscan.com/vulnerability/306ea895-0b90-4276-bb97-eecb34f9bfae
|
||
|
CVE-2022-23400 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1465
|
||
|
CVE-2022-23409 - http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html
|
||
|
CVE-2022-23409 - https://sec-consult.com/vulnerability-lab/
|
||
|
CVE-2022-2341 - https://packetstormsecurity.com/files/167597/
|
||
|
CVE-2022-2341 - https://wpscan.com/vulnerability/4a98a024-1f84-482f-9dc9-4714ac42c094
|
||
|
CVE-2022-2342 - https://huntr.dev/bounties/b2caceaa-5b28-40ba-9980-70144159efba
|
||
|
CVE-2022-23425 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23426 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23427 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23428 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23429 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-2343 - https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
|
||
|
CVE-2022-23431 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23432 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23437 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23437 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2344 - https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
|
||
|
CVE-2022-2345 - https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
|
||
|
CVE-2022-23457 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23458 - https://securitylab.github.com/advisories/GHSL-2022-029_nhn_tui_grid/
|
||
|
CVE-2022-23459 - https://securitylab.github.com/advisories/GHSL-2022-048_Jsonxx
|
||
|
CVE-2022-23461 - https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/
|
||
|
CVE-2022-23463 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/
|
||
|
CVE-2022-23464 - https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/
|
||
|
CVE-2022-23474 - https://securitylab.github.com/advisories/GHSL-2022-028_codex-team_editor_js/
|
||
|
CVE-2022-2350 - https://wpscan.com/vulnerability/de28543b-c110-4a9f-bfe9-febccfba3a96
|
||
|
CVE-2022-23507 - https://github.com/informalsystems/tendermint-rs/security/advisories/GHSA-xqqc-c5gw-c5r5
|
||
|
CVE-2022-2351 - https://wpscan.com/vulnerability/f3fda033-58f5-446d-ade4-2336a39bfb87
|
||
|
CVE-2022-23512 - https://github.com/metersphere/metersphere/security/advisories/GHSA-5mwp-xw7p-5j27
|
||
|
CVE-2022-23513 - http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html
|
||
|
CVE-2022-23513 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497
|
||
|
CVE-2022-2352 - https://wpscan.com/vulnerability/dc99ac40-646a-4f8e-b2b9-dc55d6d4c55c
|
||
|
CVE-2022-23520 - https://hackerone.com/reports/1654310
|
||
|
CVE-2022-23522 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-7x45-phmr-9wqp
|
||
|
CVE-2022-23529 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
||
|
CVE-2022-2353 - https://huntr.dev/bounties/7782c095-9e8c-48b0-a7f5-3a8f52e8af52
|
||
|
CVE-2022-23530 - https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v
|
||
|
CVE-2022-23539 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
||
|
CVE-2022-2354 - https://wpscan.com/vulnerability/1c8c5861-ce87-4813-9e26-470d63c1903a
|
||
|
CVE-2022-23540 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
||
|
CVE-2022-23541 - https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
|
||
|
CVE-2022-23544 - https://github.com/metersphere/metersphere/security/advisories/GHSA-vrv6-cg45-rmjj
|
||
|
CVE-2022-2355 - https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826
|
||
|
CVE-2022-23553 - https://securitylab.github.com/advisories/GHSL-2021-1009-Alpine/
|
||
|
CVE-2022-23555 - https://github.com/goauthentik/authentik/security/advisories/GHSA-9qwp-jf7p-vr7h
|
||
|
CVE-2022-2356 - https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43
|
||
|
CVE-2022-2357 - https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553
|
||
|
CVE-2022-23596 - https://github.com/junrar/junrar/issues/73
|
||
|
CVE-2022-23608 - http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
|
||
|
CVE-2022-2361 - https://wpscan.com/vulnerability/aa69377d-ba9e-4a2f-921c-be2ab5edcb4e
|
||
|
CVE-2022-2362 - https://wpscan.com/vulnerability/d94b721e-9ce2-45e5-a673-2a57b0137653
|
||
|
CVE-2022-23626 - http://packetstormsecurity.com/files/167235/m1k1os-Blog-1.3-Remote-Code-Execution.html
|
||
|
CVE-2022-2363 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Refelected)/POC.md
|
||
|
CVE-2022-23632 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2364 - https://github.com/CyberThoth/CVE/blob/eea3090b960da014312f7ad4b09aa58d23966d77/CVE/Simple%20Parking%20Management%20System/Cross%20Site%20Scripting(Stored)/POC.md
|
||
|
CVE-2022-23642 - http://packetstormsecurity.com/files/167506/Sourcegraph-Gitserver-3.36.3-Remote-Code-Execution.html
|
||
|
CVE-2022-23642 - http://packetstormsecurity.com/files/167741/Sourcegraph-gitserver-sshCommand-Remote-Command-Execution.html
|
||
|
CVE-2022-23648 - http://packetstormsecurity.com/files/166421/containerd-Image-Volume-Insecure-Handling.html
|
||
|
CVE-2022-2366 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-2367 - https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f
|
||
|
CVE-2022-2368 - https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452
|
||
|
CVE-2022-2369 - https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d
|
||
|
CVE-2022-2370 - https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334
|
||
|
CVE-2022-2371 - https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7
|
||
|
CVE-2022-23712 - https://www.elastic.co/community/security/
|
||
|
CVE-2022-23713 - https://www.elastic.co/community/security
|
||
|
CVE-2022-23714 - https://www.elastic.co/community/security
|
||
|
CVE-2022-23715 - https://www.elastic.co/community/security
|
||
|
CVE-2022-23716 - https://www.elastic.co/community/security/
|
||
|
CVE-2022-2372 - https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45
|
||
|
CVE-2022-2373 - https://wpscan.com/vulnerability/6aa9aa0d-b447-4584-a07e-b8a0d1b83a31
|
||
|
CVE-2022-2374 - https://wpscan.com/vulnerability/12062d78-7a0d-4dc1-9bd6-6c54aa6bc761
|
||
|
CVE-2022-2375 - https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81
|
||
|
CVE-2022-2376 - https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad
|
||
|
CVE-2022-2377 - https://wpscan.com/vulnerability/f4e606e9-0664-42fb-a59b-21de306eb530
|
||
|
CVE-2022-23772 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23773 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-23774 - https://docs.docker.com/docker-for-windows/release-notes/
|
||
|
CVE-2022-2378 - https://wpscan.com/vulnerability/3f4e8fe5-1c92-49ad-b709-a40749c80596
|
||
|
CVE-2022-2379 - https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6
|
||
|
CVE-2022-23793 - http://packetstormsecurity.com/files/166546/Joomla-4.1.0-Zip-Slip-File-Overwrite-Path-Traversal.html
|
||
|
CVE-2022-23803 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
||
|
CVE-2022-23803 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453
|
||
|
CVE-2022-23804 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
||
|
CVE-2022-23804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1453
|
||
|
CVE-2022-23806 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2381 - https://wpscan.com/vulnerability/c39c41bf-f622-4239-a0a1-4dfe0e079f7f
|
||
|
CVE-2022-2382 - https://wpscan.com/vulnerability/777d4637-444b-4eda-bc21-95d3a3bf6cd3
|
||
|
CVE-2022-2383 - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531
|
||
|
CVE-2022-2384 - https://wpscan.com/vulnerability/0917b964-f347-487e-b8d7-c4f09c290fe5
|
||
|
CVE-2022-23850 - https://github.com/kevinboone/epub2txt2/issues/17
|
||
|
CVE-2022-23852 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23854 - https://crisec.de/advisory-aveva-intouch-access-anywhere-secure-gateway-path-traversal
|
||
|
CVE-2022-2386 - https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886
|
||
|
CVE-2022-23865 - https://www.exploit-db.com/exploits/50674
|
||
|
CVE-2022-2387 - https://wpscan.com/vulnerability/db3c3c78-1724-4791-9ab6-ebb2e8a4c8b8
|
||
|
CVE-2022-23878 - https://blog.csdn.net/miuzzx/article/details/122249953
|
||
|
CVE-2022-2388 - https://wpscan.com/vulnerability/50acd35f-eb31-4aba-bf32-b390e9514beb
|
||
|
CVE-2022-23881 - https://github.com/metaStor/Vuls/blob/main/zzzcms/zzzphp%20V2.1.0%20RCE/zzzphp%20V2.1.0%20RCE.md
|
||
|
CVE-2022-23882 - https://github.com/yeyinshi/tuzicms/issues/10
|
||
|
CVE-2022-23887 - https://github.com/yzmcms/yzmcms/issues/59
|
||
|
CVE-2022-23888 - https://github.com/yzmcms/yzmcms/issues/60
|
||
|
CVE-2022-2389 - https://wpscan.com/vulnerability/e70f00b7-6251-476e-9297-60af509e6ad9
|
||
|
CVE-2022-23896 - https://huntr.dev/bounties/79c2d16c-bae2-417f-ab50-10c52707a30f/
|
||
|
CVE-2022-23900 - https://stigward.medium.com/wavlink-command-injection-cve-2022-23900-51988f6f15df
|
||
|
CVE-2022-23907 - http://dev.cmsmadesimple.org/bug/view/12503
|
||
|
CVE-2022-23909 - http://packetstormsecurity.com/files/166574/Sherpa-Connector-Service-2020.2.20328.2050-Unquoted-Service-Path.html
|
||
|
CVE-2022-2391 - https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3
|
||
|
CVE-2022-23911 - https://wpscan.com/vulnerability/77fd6749-4fb2-48fa-a191-437b442f28e9
|
||
|
CVE-2022-23912 - https://wpscan.com/vulnerability/09512431-aa33-4514-8b20-1963c5d89f33
|
||
|
CVE-2022-23915 - https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
|
||
|
CVE-2022-23918 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455
|
||
|
CVE-2022-23919 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1455
|
||
|
CVE-2022-2392 - https://wpscan.com/vulnerability/5001ed18-858e-4c9d-9d7b-a1305fcdf61b
|
||
|
CVE-2022-23923 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254
|
||
|
CVE-2022-23923 - https://snyk.io/vuln/SNYK-JS-JAILED-2391490
|
||
|
CVE-2022-23935 - https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429
|
||
|
CVE-2022-23940 - https://github.com/manuelz120
|
||
|
CVE-2022-23943 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23946 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
||
|
CVE-2022-23946 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460
|
||
|
CVE-2022-23947 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EMCGSSP3FIWCSL2KXVXLF35JYZKZE5Q/
|
||
|
CVE-2022-23947 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1460
|
||
|
CVE-2022-2395 - https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b
|
||
|
CVE-2022-2396 - https://github.com/CyberThoth/CVE/blob/83c243538386cd0761025f85eb747eab7cae5c21/CVE/Simple%20e-Learning%20System/Cross%20Site%20Scripting(Stored)/POC.md
|
||
|
CVE-2022-2396 - https://vuldb.com/?id.203779
|
||
|
CVE-2022-23967 - https://github.com/MaherAzzouzi/CVE-2022-23967
|
||
|
CVE-2022-23968 - https://neosmart.net/blog/2022/xerox-vulnerability-allows-unauthenticated-network-users-to-remotely-brick-printers/
|
||
|
CVE-2022-2398 - https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672
|
||
|
CVE-2022-23987 - https://wpscan.com/vulnerability/1697351b-c201-4e85-891e-94fdccbdfb55
|
||
|
CVE-2022-23988 - https://wpscan.com/vulnerability/9d5738f9-9a2e-4878-8a03-745894420bf6
|
||
|
CVE-2022-23990 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-23994 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23995 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23996 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23997 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-23999 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-2400 - https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a
|
||
|
CVE-2022-24000 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=2
|
||
|
CVE-2022-24004 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/
|
||
|
CVE-2022-24005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-2401 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-24010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-24029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
|
||
|
CVE-2022-2404 - https://wpscan.com/vulnerability/0d889dde-b9d5-46cf-87d3-4f8a85cf9b98
|
||
|
CVE-2022-2405 - https://wpscan.com/vulnerability/50037028-2790-47ee-aae1-faf0724eb917
|
||
|
CVE-2022-2406 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-24065 - https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281
|
||
|
CVE-2022-24066 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820
|
||
|
CVE-2022-24066 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306
|
||
|
CVE-2022-2407 - https://wpscan.com/vulnerability/5be611e8-5b7a-4579-9757-45a4c94a53ca
|
||
|
CVE-2022-2408 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-24082 - http://packetstormsecurity.com/files/169480/Pega-Platform-8.7.3-Remote-Code-Execution.html
|
||
|
CVE-2022-2409 - https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea
|
||
|
CVE-2022-2410 - https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18
|
||
|
CVE-2022-24108 - http://packetstormsecurity.com/files/167197/OpenCart-So-Listing-Tabs-2.2.0-Unsafe-Deserialization.html
|
||
|
CVE-2022-2411 - https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294
|
||
|
CVE-2022-24112 - http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html
|
||
|
CVE-2022-24112 - http://packetstormsecurity.com/files/166328/Apache-APISIX-2.12.1-Remote-Code-Execution.html
|
||
|
CVE-2022-2412 - https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6
|
||
|
CVE-2022-24121 - https://www.coresecurity.com/core-labs/advisories/unified-office-total-connect-sql-injection
|
||
|
CVE-2022-24124 - http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html
|
||
|
CVE-2022-24124 - https://github.com/casdoor/casdoor/issues/439
|
||
|
CVE-2022-24124 - https://github.com/casdoor/casdoor/pull/442
|
||
|
CVE-2022-24125 - https://github.com/tremwil/ds3-nrssr-rce
|
||
|
CVE-2022-24126 - https://github.com/tremwil/ds3-nrssr-rce
|
||
|
CVE-2022-24127 - https://labs.nettitude.com/blog/cve-2022-24004-cve-2022-24127-vanderbilt-redcap-stored-cross-site-scripting/
|
||
|
CVE-2022-24129 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220127-01_Shibboleth_IdP_OIDC_OP_Plugin_SSRF
|
||
|
CVE-2022-2413 - https://wpscan.com/vulnerability/2e38b1bb-4410-45e3-87ca-d47a2cce9e22/
|
||
|
CVE-2022-24138 - https://github.com/tomerpeled92/CVE/
|
||
|
CVE-2022-24139 - https://github.com/tomerpeled92/CVE/
|
||
|
CVE-2022-24140 - https://github.com/tomerpeled92/CVE/
|
||
|
CVE-2022-24141 - https://github.com/tomerpeled92/CVE/
|
||
|
CVE-2022-2415 - http://packetstormsecurity.com/files/167972/Chrome-WebGL-Uniform-Integer-Overflows.html
|
||
|
CVE-2022-2417 - https://gitlab.com/gitlab-org/gitlab/-/issues/361179
|
||
|
CVE-2022-2418 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20img_upload.php%20File%20upload%20vulnerability.md
|
||
|
CVE-2022-24187 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
||
|
CVE-2022-24188 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
||
|
CVE-2022-24189 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
||
|
CVE-2022-2419 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20upload.php%20File%20upload%20vulnerability.md
|
||
|
CVE-2022-24190 - https://www.scrawledsecurityblog.com/2022/11/automating-unsolicited-richard-pics.html
|
||
|
CVE-2022-24191 - https://github.com/michaelrsweet/htmldoc/issues/470
|
||
|
CVE-2022-24196 - https://github.com/itext/itext7/pull/78
|
||
|
CVE-2022-24196 - https://github.com/itext/itext7/pull/78#issuecomment-1089279222
|
||
|
CVE-2022-24197 - https://github.com/itext/itext7/pull/78
|
||
|
CVE-2022-24197 - https://github.com/itext/itext7/pull/78#issuecomment-1089282165
|
||
|
CVE-2022-24198 - https://github.com/itext/itext7/pull/78
|
||
|
CVE-2022-24198 - https://github.com/itext/itext7/pull/78#issuecomment-1089287808
|
||
|
CVE-2022-2420 - https://github.com/joinia/webray.com.cn/blob/main/URVE/URVE%20Web%20Manager%20uploader.php%20%20File%20upload%20vulnerability.md
|
||
|
CVE-2022-24223 - http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html
|
||
|
CVE-2022-2423 - https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2
|
||
|
CVE-2022-24231 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Student-Information
|
||
|
CVE-2022-2424 - https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909
|
||
|
CVE-2022-24247 - https://cxsecurity.com/issue/WLB-2022010019
|
||
|
CVE-2022-24247 - https://www.exploit-db.com/exploits/50614
|
||
|
CVE-2022-24248 - https://en.0day.today/exploit/description/37177
|
||
|
CVE-2022-24248 - https://www.exploit-db.com/exploits/50615
|
||
|
CVE-2022-24249 - https://github.com/gpac/gpac/issues/2081
|
||
|
CVE-2022-2425 - https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d
|
||
|
CVE-2022-24251 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
||
|
CVE-2022-24252 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
||
|
CVE-2022-24253 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
||
|
CVE-2022-24254 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
||
|
CVE-2022-24255 - https://www.whiteoaksecurity.com/blog/extensis-portfolio-vulnerability-disclosure/
|
||
|
CVE-2022-2426 - https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422
|
||
|
CVE-2022-24263 - http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html
|
||
|
CVE-2022-24263 - https://github.com/kishan0725/Hospital-Management-System/issues/17
|
||
|
CVE-2022-24263 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263
|
||
|
CVE-2022-24264 - https://github.com/CuppaCMS/CuppaCMS/issues/13
|
||
|
CVE-2022-24265 - https://github.com/CuppaCMS/CuppaCMS/issues/14
|
||
|
CVE-2022-24266 - https://github.com/CuppaCMS/CuppaCMS/issues/17
|
||
|
CVE-2022-24278 - https://github.com/neocotic/convert-svg/issues/86
|
||
|
CVE-2022-24278 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859830
|
||
|
CVE-2022-24279 - https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572
|
||
|
CVE-2022-24298 - https://security.snyk.io/vuln/SNYK-UNMANAGED-FREEOPCUAFREEOPCUA-2988720
|
||
|
CVE-2022-24302 - https://www.paramiko.org/changelog.html
|
||
|
CVE-2022-2431 - https://packetstormsecurity.com/files/167920/wpdownloadmanager3250-filedelete.txt
|
||
|
CVE-2022-24329 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-24329 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24356 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24357 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24358 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24359 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24360 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24361 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24362 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24363 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24364 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24365 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24366 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24367 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24368 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24369 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24370 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24372 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-046.txt
|
||
|
CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382
|
||
|
CVE-2022-24373 - https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa
|
||
|
CVE-2022-24373 - https://security.snyk.io/vuln/SNYK-JS-REACTNATIVEREANIMATED-2949507
|
||
|
CVE-2022-24375 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988725
|
||
|
CVE-2022-24376 - https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310
|
||
|
CVE-2022-24377 - https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955
|
||
|
CVE-2022-24381 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988735
|
||
|
CVE-2022-24396 - http://packetstormsecurity.com/files/167560/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Missing-Authentication.html
|
||
|
CVE-2022-24396 - http://seclists.org/fulldisclosure/2022/Jun/38
|
||
|
CVE-2022-24399 - http://packetstormsecurity.com/files/167559/SAP-FRUN-2.00-3.00-Cross-Site-Scripting.html
|
||
|
CVE-2022-24399 - http://seclists.org/fulldisclosure/2022/Jun/37
|
||
|
CVE-2022-24400 - https://tetraburst.com/
|
||
|
CVE-2022-24401 - https://tetraburst.com/
|
||
|
CVE-2022-24402 - https://tetraburst.com/
|
||
|
CVE-2022-24403 - https://tetraburst.com/
|
||
|
CVE-2022-24404 - https://tetraburst.com/
|
||
|
CVE-2022-24405 - https://seclists.org/fulldisclosure/2022/Jul/11
|
||
|
CVE-2022-24406 - https://seclists.org/fulldisclosure/2022/Jul/11
|
||
|
CVE-2022-24407 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2441 - https://www.exploit-db.com/exploits/51025
|
||
|
CVE-2022-24428 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
||
|
CVE-2022-24429 - https://github.com/neocotic/convert-svg/issues/84
|
||
|
CVE-2022-24429 - https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2859212
|
||
|
CVE-2022-24431 - https://security.snyk.io/vuln/SNYK-JS-ABACUSEXTCMDLINE-3157950
|
||
|
CVE-2022-24433 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245
|
||
|
CVE-2022-24433 - https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199
|
||
|
CVE-2022-24434 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2838865
|
||
|
CVE-2022-24434 - https://snyk.io/vuln/SNYK-JS-DICER-2311764
|
||
|
CVE-2022-24437 - https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b
|
||
|
CVE-2022-24437 - https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307
|
||
|
CVE-2022-24439 - https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
|
||
|
CVE-2022-24440 - https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278
|
||
|
CVE-2022-24448 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
|
||
|
CVE-2022-24448 - https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/
|
||
|
CVE-2022-24449 - https://github.com/jet-pentest/CVE-2022-24449
|
||
|
CVE-2022-2448 - https://wpscan.com/vulnerability/a4599942-2878-4da4-b55d-077775323b61
|
||
|
CVE-2022-2449 - https://wpscan.com/vulnerability/6e42f26b-3403-4d55-99ad-2c8e2d76e537
|
||
|
CVE-2022-2450 - https://wpscan.com/vulnerability/1b3ff124-f973-4584-a7d7-26cc404bfe2b
|
||
|
CVE-2022-2453 - https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a
|
||
|
CVE-2022-2454 - https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f
|
||
|
CVE-2022-24545 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html
|
||
|
CVE-2022-24562 - http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html
|
||
|
CVE-2022-24562 - https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d
|
||
|
CVE-2022-24571 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24571
|
||
|
CVE-2022-24574 - https://huntr.dev/bounties/a08437cc-25aa-4116-8069-816f78a2247c/
|
||
|
CVE-2022-24575 - https://github.com/gpac/gpac/issues/2058
|
||
|
CVE-2022-24575 - https://huntr.dev/bounties/1d9bf402-f756-4583-9a1d-436722609c1e/
|
||
|
CVE-2022-24576 - https://github.com/gpac/gpac/issues/2061
|
||
|
CVE-2022-24576 - https://huntr.dev/bounties/011ac07c-6139-4f43-b745-424143e60ac7/
|
||
|
CVE-2022-24577 - https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/
|
||
|
CVE-2022-24578 - https://huntr.dev/bounties/1691cca3-ab54-4259-856b-751be2395b11/
|
||
|
CVE-2022-24582 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Accounting-Journal-Management
|
||
|
CVE-2022-24594 - https://github.com/walinejs/waline/issues/785
|
||
|
CVE-2022-24595 - https://youtu.be/E-ZTuWSg-JU
|
||
|
CVE-2022-24599 - https://github.com/mpruett/audiofile/issues/60
|
||
|
CVE-2022-2460 - https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db
|
||
|
CVE-2022-2461 - https://packetstormsecurity.com/files/167870/wptransposh107-auth.txt
|
||
|
CVE-2022-2461 - https://www.exploitalert.com/view-details.html?id=38891
|
||
|
CVE-2022-24613 - https://github.com/drewnoakes/metadata-extractor/issues/561
|
||
|
CVE-2022-24614 - https://github.com/drewnoakes/metadata-extractor/issues/561
|
||
|
CVE-2022-2462 - https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
|
||
|
CVE-2022-24620 - https://github.com/Piwigo/Piwigo/issues/1605
|
||
|
CVE-2022-24637 - http://packetstormsecurity.com/files/169811/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html
|
||
|
CVE-2022-24637 - http://packetstormsecurity.com/files/171389/Open-Web-Analytics-1.7.3-Remote-Code-Execution.html
|
||
|
CVE-2022-24644 - https://github.com/gerr-re/cve-2022-24644/blob/main/cve-2022-24644_public-advisory.pdf
|
||
|
CVE-2022-24646 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263
|
||
|
CVE-2022-24647 - https://github.com/CuppaCMS/CuppaCMS/issues/23
|
||
|
CVE-2022-24654 - https://github.com/leonardobg/CVE-2022-24654
|
||
|
CVE-2022-24654 - https://packetstormsecurity.com/files/168064/Intelbras-ATA-200-Cross-Site-Scripting.html
|
||
|
CVE-2022-24655 - https://kb.netgear.com/000064615/Security-Advisory-for-Pre-Authentication-Command-Injection-on-EX6100v1-and-Pre-Authentication-Stack-Overflow-on-Multiple-Products-PSV-2021-0282-PSV-2021-0288
|
||
|
CVE-2022-24656 - https://github.com/zhuzhuyule/HexoEditor/issues/3
|
||
|
CVE-2022-2467 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md
|
||
|
CVE-2022-24676 - https://github.com/hyyyp/HYBBS2/issues/33
|
||
|
CVE-2022-24677 - https://github.com/hyyyp/HYBBS2/issues/34
|
||
|
CVE-2022-2468 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Garage-Management-System.md
|
||
|
CVE-2022-2468 - https://vuldb.com/?id.204161
|
||
|
CVE-2022-24681 - https://raxis.com/blog/cve-2022-24681
|
||
|
CVE-2022-2470 - https://huntr.dev/bounties/3f1f679c-c243-431c-8ed0-e61543b9921b
|
||
|
CVE-2022-24706 - http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html
|
||
|
CVE-2022-24706 - http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html
|
||
|
CVE-2022-24706 - https://medium.com/@_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd
|
||
|
CVE-2022-24707 - http://packetstormsecurity.com/files/167060/Anuko-Time-Tracker-1.20.0.5640-SQL-Injection.html
|
||
|
CVE-2022-2471 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams
|
||
|
CVE-2022-24715 - http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html
|
||
|
CVE-2022-24716 - http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html
|
||
|
CVE-2022-2472 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-in-ezviz-smart-cams
|
||
|
CVE-2022-24723 - https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/
|
||
|
CVE-2022-24724 - http://packetstormsecurity.com/files/166599/cmark-gfm-Integer-overflow.html
|
||
|
CVE-2022-24728 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24729 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2473 - https://packetstormsecurity.com/files/167864/wpuseronline2876-xss.txt
|
||
|
CVE-2022-2473 - https://www.exploit-db.com/exploits/50988
|
||
|
CVE-2022-2473 - https://youtu.be/Q3zInrUnAV0
|
||
|
CVE-2022-24734 - http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html
|
||
|
CVE-2022-24734 - http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html
|
||
|
CVE-2022-24735 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24736 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24755 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/
|
||
|
CVE-2022-24756 - https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/
|
||
|
CVE-2022-2476 - https://github.com/dbry/WavPack/issues/121
|
||
|
CVE-2022-24760 - https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/
|
||
|
CVE-2022-24780 - http://packetstormsecurity.com/files/167236/iTop-Remote-Command-Execution.html
|
||
|
CVE-2022-24780 - https://markus-krell.de/itop-template-injection-inside-customer-portal/
|
||
|
CVE-2022-24799 - https://github.com/wireapp/wire-webapp/releases/tag/2022-03-30-production.0
|
||
|
CVE-2022-2480 - http://packetstormsecurity.com/files/168115/Chrome-content-ServiceWorkerVersion-MaybeTimeoutRequest-Heap-Use-After-Free.html
|
||
|
CVE-2022-24801 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24823 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24833 - https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw
|
||
|
CVE-2022-24836 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-24839 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-24844 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-5g92-6hpp-w425
|
||
|
CVE-2022-24851 - https://github.com/LDAPAccountManager/lam/issues/170
|
||
|
CVE-2022-2486 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md
|
||
|
CVE-2022-2486 - https://vuldb.com/?id.204537
|
||
|
CVE-2022-24860 - https://user-images.githubusercontent.com/75008428/163742517-ecc1c787-1ef6-4df9-bdf2-407b2b31e111.png
|
||
|
CVE-2022-24865 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76/
|
||
|
CVE-2022-2487 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md
|
||
|
CVE-2022-2487 - https://vuldb.com/?id.204538
|
||
|
CVE-2022-2488 - https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20touchlist_sync.cgi.md
|
||
|
CVE-2022-2489 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md
|
||
|
CVE-2022-2489 - https://vuldb.com/?id.204551
|
||
|
CVE-2022-24891 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2490 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-E-Learning-System.md#search.php
|
||
|
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/issues/350
|
||
|
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/pull/351
|
||
|
CVE-2022-24900 - https://github.com/onlaj/Piano-LED-Visualizer/security/advisories/GHSA-g78x-q3x8-r6m4
|
||
|
CVE-2022-2491 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md
|
||
|
CVE-2022-2491 - https://vuldb.com/?id.204574
|
||
|
CVE-2022-24910 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1471
|
||
|
CVE-2022-2492 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Library-Management-System-with-QR-code-Attendance-and-Auto-Generate-Library-Card.md#index.php
|
||
|
CVE-2022-2492 - https://vuldb.com/?id.204575
|
||
|
CVE-2022-24928 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-24929 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-24930 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-24931 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-24932 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-2494 - https://huntr.dev/bounties/74ddb017-c1fd-4e72-bd30-3b2033911472
|
||
|
CVE-2022-24949 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxg8-4r3q-p9rv
|
||
|
CVE-2022-2495 - https://huntr.dev/bounties/00affb69-275d-4f4c-b419-437922bc7798
|
||
|
CVE-2022-24950 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-85gw-pchc-4rf3
|
||
|
CVE-2022-24951 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q
|
||
|
CVE-2022-24952 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw
|
||
|
CVE-2022-24954 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24955 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24956 - https://syss.de
|
||
|
CVE-2022-24956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-018.txt
|
||
|
CVE-2022-24957 - https://syss.de
|
||
|
CVE-2022-24957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-019.txt
|
||
|
CVE-2022-24958 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=89f3594d0de58e8a57d92d497dea9fee3d4b9cda
|
||
|
CVE-2022-24959 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
|
||
|
CVE-2022-24971 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-24976 - https://www.openwall.com/lists/oss-security/2022/01/30/4
|
||
|
CVE-2022-24977 - https://r0.haxors.org/posts?id=8
|
||
|
CVE-2022-24989 - https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990
|
||
|
CVE-2022-24989 - https://packetstormsecurity.com/files/172904
|
||
|
CVE-2022-24990 - http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html
|
||
|
CVE-2022-24995 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX3/7
|
||
|
CVE-2022-24999 - https://github.com/n8tz/CVE-2022-24999
|
||
|
CVE-2022-25003 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25003
|
||
|
CVE-2022-25004 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-25004/
|
||
|
CVE-2022-25012 - https://www.exploit-db.com/exploits/50130
|
||
|
CVE-2022-25013 - https://github.com/gamonoid/icehrm/issues/284
|
||
|
CVE-2022-25014 - https://github.com/gamonoid/icehrm/issues/283
|
||
|
CVE-2022-25015 - https://github.com/gamonoid/icehrm/issues/285
|
||
|
CVE-2022-25017 - https://gist.github.com/zaee-k/390b2f8e50407e4b199df806baa7e4ef
|
||
|
CVE-2022-25020 - https://youtu.be/TsGp-QB5XWI
|
||
|
CVE-2022-25022 - http://danpros.com
|
||
|
CVE-2022-25022 - https://youtu.be/acookTqf3Nc
|
||
|
CVE-2022-25023 - https://github.com/adamstark/AudioFile/issues/58
|
||
|
CVE-2022-25026 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/
|
||
|
CVE-2022-25027 - https://labs.nettitude.com/blog/cve-2022-25026-cve-2022-25027-vulnerabilities-in-rocket-trufusion-enterprise/
|
||
|
CVE-2022-2503 - https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
|
||
|
CVE-2022-25044 - https://github.com/espruino/Espruino/issues/2142
|
||
|
CVE-2022-25045 - https://github.com/VivekPanday12/CVE-/issues/6
|
||
|
CVE-2022-25045 - https://www.linkedin.com/in/vivek-panday-796768149/
|
||
|
CVE-2022-25046 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel
|
||
|
CVE-2022-25047 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel
|
||
|
CVE-2022-25048 - https://github.com/Immersive-Labs-Sec/CentOS-WebPanel
|
||
|
CVE-2022-2505 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-25072 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/Archer%20A54
|
||
|
CVE-2022-25073 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841N
|
||
|
CVE-2022-25074 - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC
|
||
|
CVE-2022-25075 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3000RU/README.md
|
||
|
CVE-2022-25076 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A800R/README.md
|
||
|
CVE-2022-25077 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3100R/README.md
|
||
|
CVE-2022-25078 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A3600R/README.md
|
||
|
CVE-2022-25079 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A810R/README.md
|
||
|
CVE-2022-25080 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A830R/README.md
|
||
|
CVE-2022-25081 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T10/README.md
|
||
|
CVE-2022-25082 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A950RG/README.md
|
||
|
CVE-2022-25083 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/A860R/README.md
|
||
|
CVE-2022-25084 - https://github.com/EPhaha/IOT_vuln/blob/main/TOTOLink/T6/README.md
|
||
|
CVE-2022-25089 - http://packetstormsecurity.com/files/167013/Printix-1.3.1106.0-Privileged-API-Abuse.html
|
||
|
CVE-2022-25089 - https://www.exploit-db.com/exploits/50798
|
||
|
CVE-2022-25090 - http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html
|
||
|
CVE-2022-25090 - http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html
|
||
|
CVE-2022-25090 - https://github.com/ComparedArray/printix-CVE-2022-25090
|
||
|
CVE-2022-25090 - https://www.exploit-db.com/exploits/50812
|
||
|
CVE-2022-25094 - https://www.exploit-db.com/exploits/50731
|
||
|
CVE-2022-25095 - https://www.exploit-db.com/exploits/50730
|
||
|
CVE-2022-25096 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management
|
||
|
CVE-2022-25096 - https://www.exploit-db.com/exploits/50732
|
||
|
CVE-2022-25104 - https://github.com/ttimot24/HorizontCMS/issues/43
|
||
|
CVE-2022-25106 - https://github.com/chunklhit/cve/blob/master/dlink/DIR859/BufferOverflow.md
|
||
|
CVE-2022-25106 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-25108 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-25114 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/PuneethReddyHC/event-management-1.0
|
||
|
CVE-2022-25115 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Home-Owners-Collection-Management
|
||
|
CVE-2022-25131 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_14/14.md
|
||
|
CVE-2022-25139 - https://github.com/nginx/njs/issues/451
|
||
|
CVE-2022-2514 - https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429
|
||
|
CVE-2022-25148 - http://packetstormsecurity.com/files/174482/WordPress-WP-Statistics-13.1.5-SQL-Injection.html
|
||
|
CVE-2022-25148 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042
|
||
|
CVE-2022-25149 - https://gist.github.com/Xib3rR4dAr/5dbd58b7f57a5037fe461fba8e696042
|
||
|
CVE-2022-2515 - https://gist.github.com/Xib3rR4dAr/6aa9e730c1d030a5ee9f9d1eae6fbd5e
|
||
|
CVE-2022-25164 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-25165 - https://github.com/RhinoSecurityLabs/CVEs
|
||
|
CVE-2022-25165 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/
|
||
|
CVE-2022-25166 - https://github.com/RhinoSecurityLabs/CVEs
|
||
|
CVE-2022-25166 - https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/
|
||
|
CVE-2022-25169 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-25171 - https://security.snyk.io/vuln/SNYK-JS-P4-3167330
|
||
|
CVE-2022-25172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1470
|
||
|
CVE-2022-25216 - https://www.tenable.com/security/research/tra-2022-07
|
||
|
CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22
|
||
|
CVE-2022-2522 - https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/
|
||
|
CVE-2022-25220 - https://fluidattacks.com/advisories/armstrong/
|
||
|
CVE-2022-25220 - https://github.com/1modm/petereport/issues/35
|
||
|
CVE-2022-25221 - https://fluidattacks.com/advisories/charles/
|
||
|
CVE-2022-25222 - https://fluidattacks.com/advisories/berry/
|
||
|
CVE-2022-25223 - https://fluidattacks.com/advisories/jagger/
|
||
|
CVE-2022-25224 - https://fluidattacks.com/advisories/lennon/
|
||
|
CVE-2022-25225 - https://fluidattacks.com/advisories/spinetta/
|
||
|
CVE-2022-25226 - https://fluidattacks.com/advisories/sinatra/
|
||
|
CVE-2022-25227 - https://fluidattacks.com/advisories/clapton/
|
||
|
CVE-2022-25228 - https://fluidattacks.com/advisories/jackson/
|
||
|
CVE-2022-25229 - https://fluidattacks.com/advisories/bowie/
|
||
|
CVE-2022-25229 - https://github.com/popcorn-official/popcorn-desktop/issues/2491
|
||
|
CVE-2022-2523 - https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f
|
||
|
CVE-2022-25231 - https://security.snyk.io/vuln/SNYK-JS-NODEOPCUA-2988724
|
||
|
CVE-2022-25235 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-25236 - http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html
|
||
|
CVE-2022-25236 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-25237 - https://rhinosecuritylabs.com/application-security/cve-2022-25237-bonitasoft-authorization-bypass/
|
||
|
CVE-2022-25241 - http://packetstormsecurity.com/files/166074/FileCloud-21.2-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-25241 - https://herolab.usd.de/security-advisories/
|
||
|
CVE-2022-25242 - https://herolab.usd.de/security-advisories/
|
||
|
CVE-2022-25245 - https://raxis.com/blog/cve-2022-25245
|
||
|
CVE-2022-25258 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
|
||
|
CVE-2022-25265 - https://github.com/x0reaxeax/exec-prot-bypass
|
||
|
CVE-2022-25276 - https://www.drupal.org/sa-core-2022-015
|
||
|
CVE-2022-25295 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOPHISHGOPHISH-2404177
|
||
|
CVE-2022-25296 - https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623
|
||
|
CVE-2022-25297 - https://snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-2407243
|
||
|
CVE-2022-25298 - https://snyk.io/vuln/SNYK-UNMANAGED-SPRINFALLWEBCC-2404182
|
||
|
CVE-2022-25299 - https://snyk.io/vuln/SNYK-UNMANAGED-CESANTAMONGOOSE-2404180
|
||
|
CVE-2022-25301 - https://github.com/metabench/jsgui-lang-essentials/issues/1
|
||
|
CVE-2022-25301 - https://snyk.io/vuln/SNYK-JS-JSGUILANGESSENTIALS-2316897
|
||
|
CVE-2022-25302 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ASNEGOPCUASTACK-2988732
|
||
|
CVE-2022-25303 - https://snyk.io/vuln/SNYK-PYTHON-WHOOGLESEARCH-2803306
|
||
|
CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731
|
||
|
CVE-2022-25304 - https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730
|
||
|
CVE-2022-25305 - https://gist.github.com/Xib3rR4dAr/af90cef7867583ab2de4cccea2a8c87d
|
||
|
CVE-2022-25306 - https://gist.github.com/Xib3rR4dAr/89fc87ea1d62348c21c99fc11a3bfd88
|
||
|
CVE-2022-25307 - https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb
|
||
|
CVE-2022-25308 - https://github.com/fribidi/fribidi/issues/181
|
||
|
CVE-2022-25309 - https://github.com/fribidi/fribidi/issues/182
|
||
|
CVE-2022-2531 - https://gitlab.com/gitlab-org/gitlab/-/issues/364252
|
||
|
CVE-2022-25310 - https://github.com/fribidi/fribidi/issues/183
|
||
|
CVE-2022-25313 - https://github.com/libexpat/libexpat/pull/558
|
||
|
CVE-2022-25313 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-25314 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-25315 - https://github.com/libexpat/libexpat/pull/559
|
||
|
CVE-2022-25315 - https://www.oracle.com/security-alerts/cpuapr2022.html
|
||
|
CVE-2022-2532 - https://wpscan.com/vulnerability/07278b12-58e6-4230-b2fb-19237e9785d8
|
||
|
CVE-2022-25324 - https://snyk.io/vuln/SNYK-JS-BIGNUM-2388581
|
||
|
CVE-2022-25329 - https://www.tenable.com/security/research/tra-2022-05
|
||
|
CVE-2022-25330 - https://www.tenable.com/security/research/tra-2022-05
|
||
|
CVE-2022-25331 - https://www.tenable.com/security/research/tra-2022-05
|
||
|
CVE-2022-25332 - https://tetraburst.com/
|
||
|
CVE-2022-25333 - https://tetraburst.com/
|
||
|
CVE-2022-25334 - https://tetraburst.com/
|
||
|
CVE-2022-25342 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-25343 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-25344 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-25345 - https://snyk.io/vuln/SNYK-JS-DISCORDJSOPUS-2403100
|
||
|
CVE-2022-25349 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498
|
||
|
CVE-2022-25349 - https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800
|
||
|
CVE-2022-2535 - https://wpscan.com/vulnerability/0e13c375-044c-4c2e-ab8e-48cb89d90d02
|
||
|
CVE-2022-25350 - https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616
|
||
|
CVE-2022-25352 - https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117
|
||
|
CVE-2022-25354 - https://snyk.io/vuln/SNYK-JS-SETIN-2388571
|
||
|
CVE-2022-25356 - https://www.swascan.com/security-advisory-alt-n-security-gateway/
|
||
|
CVE-2022-25359 - https://packetstormsecurity.com/files/166103/ICL-ScadaFlex-II-SCADA-Controllers-SC-1-SC-2-1.03.07-Remote-File-Modification.html
|
||
|
CVE-2022-2536 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-2536.txt
|
||
|
CVE-2022-2536 - https://packetstormsecurity.com/files/168120/wptransposh1081-authz.txt
|
||
|
CVE-2022-2536 - https://www.exploitalert.com/view-details.html?id=38949
|
||
|
CVE-2022-2536 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2536
|
||
|
CVE-2022-2537 - https://wpscan.com/vulnerability/ae613148-85d8-47a0-952d-49c29584676f
|
||
|
CVE-2022-25373 - https://raxis.com/blog/cve-2022-25373
|
||
|
CVE-2022-25375 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
|
||
|
CVE-2022-25377 - https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/
|
||
|
CVE-2022-2538 - https://wpscan.com/vulnerability/afa1e159-30bc-42d2-b3f8-8c868b113d3e
|
||
|
CVE-2022-25389 - https://www.adminxe.com/3246.html
|
||
|
CVE-2022-25390 - https://www.adminxe.com/3276.html
|
||
|
CVE-2022-25393 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Bakery-Shop-Management
|
||
|
CVE-2022-25394 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/abhisheks008/2022/Medical-Store-Management-System
|
||
|
CVE-2022-25395 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store
|
||
|
CVE-2022-25396 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Cosmetics-and-Beauty-Product-Online-Store/SQL-Injection
|
||
|
CVE-2022-25398 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/pavanpatil45/Auto-Spare-Parts-Management
|
||
|
CVE-2022-25399 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Real-Estate-Portal-System
|
||
|
CVE-2022-25402 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md
|
||
|
CVE-2022-25403 - https://github.com/dota-st/Vulnerability/blob/master/HMS/HMS.md
|
||
|
CVE-2022-25407 - https://github.com/kishan0725/Hospital-Management-System/issues/21
|
||
|
CVE-2022-25408 - https://github.com/kishan0725/Hospital-Management-System/issues/22
|
||
|
CVE-2022-25409 - https://github.com/kishan0725/Hospital-Management-System/issues/20
|
||
|
CVE-2022-25411 - https://github.com/maxsite/cms/issues/487
|
||
|
CVE-2022-25412 - https://github.com/maxsite/cms/issues/486
|
||
|
CVE-2022-25414 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1
|
||
|
CVE-2022-25417 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3
|
||
|
CVE-2022-25418 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2
|
||
|
CVE-2022-25427 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/2
|
||
|
CVE-2022-25428 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/3
|
||
|
CVE-2022-25429 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/1
|
||
|
CVE-2022-2543 - https://wpscan.com/vulnerability/5dc8b671-f2fa-47be-8664-9005c4fdbea8
|
||
|
CVE-2022-25431 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/4
|
||
|
CVE-2022-25433 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/5
|
||
|
CVE-2022-25434 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/6
|
||
|
CVE-2022-25435 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/7
|
||
|
CVE-2022-25437 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/9
|
||
|
CVE-2022-25438 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/11
|
||
|
CVE-2022-25439 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/8
|
||
|
CVE-2022-2544 - https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053
|
||
|
CVE-2022-25440 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/13
|
||
|
CVE-2022-25441 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/12
|
||
|
CVE-2022-25445 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/1
|
||
|
CVE-2022-25446 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/3
|
||
|
CVE-2022-25447 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/4
|
||
|
CVE-2022-25448 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/2
|
||
|
CVE-2022-25449 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/5
|
||
|
CVE-2022-25450 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/8
|
||
|
CVE-2022-25451 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/9
|
||
|
CVE-2022-25452 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/7
|
||
|
CVE-2022-25453 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/6
|
||
|
CVE-2022-25454 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/10
|
||
|
CVE-2022-25455 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/11
|
||
|
CVE-2022-25456 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/12
|
||
|
CVE-2022-25457 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/14
|
||
|
CVE-2022-25458 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/13
|
||
|
CVE-2022-25459 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/15
|
||
|
CVE-2022-2546 - https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58
|
||
|
CVE-2022-25460 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/17
|
||
|
CVE-2022-25461 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC6/16
|
||
|
CVE-2022-25465 - https://github.com/espruino/Espruino/issues/2136
|
||
|
CVE-2022-25481 - https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md
|
||
|
CVE-2022-25484 - https://github.com/appneta/tcpreplay/issues/715
|
||
|
CVE-2022-25485 - https://github.com/CuppaCMS/CuppaCMS/issues/24
|
||
|
CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/15
|
||
|
CVE-2022-25486 - https://github.com/CuppaCMS/CuppaCMS/issues/25
|
||
|
CVE-2022-25486 - https://github.com/hansmach1ne/MyExploits/tree/main/Multiple_LFIs_in_CuppaCMS_alerts
|
||
|
CVE-2022-25487 - http://packetstormsecurity.com/files/166532/Atom-CMS-1.0.2-Shell-Upload.html
|
||
|
CVE-2022-25487 - https://github.com/thedigicraft/Atom.CMS/issues/256
|
||
|
CVE-2022-25488 - https://github.com/thedigicraft/Atom.CMS/issues/257
|
||
|
CVE-2022-2549 - https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537
|
||
|
CVE-2022-25494 - https://github.com/g33kyrash/Online-Banking-system/issues/16
|
||
|
CVE-2022-25495 - https://github.com/CuppaCMS/CuppaCMS/issues/26
|
||
|
CVE-2022-25497 - https://github.com/CuppaCMS/CuppaCMS/issues/28
|
||
|
CVE-2022-25498 - https://github.com/CuppaCMS/CuppaCMS/issues/29
|
||
|
CVE-2022-2550 - https://huntr.dev/bounties/6ab4384d-bcbe-4d98-bf67-35c3535fc5c7
|
||
|
CVE-2022-25506 - https://github.com/FreeTAKTeam/UI/issues/27
|
||
|
CVE-2022-2551 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551
|
||
|
CVE-2022-2551 - https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0
|
||
|
CVE-2022-25511 - https://github.com/FreeTAKTeam/UI/issues/29
|
||
|
CVE-2022-25514 - https://github.com/nothings/stb/issues/1286
|
||
|
CVE-2022-25515 - https://github.com/nothings/stb/issues/1286
|
||
|
CVE-2022-25515 - https://github.com/nothings/stb/issues/1288
|
||
|
CVE-2022-25516 - https://github.com/nothings/stb/issues/1286
|
||
|
CVE-2022-25516 - https://github.com/nothings/stb/issues/1287
|
||
|
CVE-2022-2552 - https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2552
|
||
|
CVE-2022-2552 - https://wpscan.com/vulnerability/6b540712-fda5-4be6-ae4b-bd30a9d9d698
|
||
|
CVE-2022-25521 - https://medium.com/@dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0
|
||
|
CVE-2022-25523 - https://github.com/Typesetter/Typesetter/issues/697
|
||
|
CVE-2022-2554 - https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9
|
||
|
CVE-2022-25546 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/6
|
||
|
CVE-2022-25548 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/5
|
||
|
CVE-2022-25549 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/4
|
||
|
CVE-2022-2555 - https://wpscan.com/vulnerability/7ec9e493-bc48-4a5d-8c7e-34beaba892ae
|
||
|
CVE-2022-25550 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/9
|
||
|
CVE-2022-25551 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/8
|
||
|
CVE-2022-25552 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/3
|
||
|
CVE-2022-25553 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/7
|
||
|
CVE-2022-25554 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/10
|
||
|
CVE-2022-25555 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/2
|
||
|
CVE-2022-25556 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/6
|
||
|
CVE-2022-25557 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/11
|
||
|
CVE-2022-25558 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/13
|
||
|
CVE-2022-2556 - https://wpscan.com/vulnerability/f2a59eaa-6b44-4098-912f-823289cf33b0
|
||
|
CVE-2022-25560 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/4
|
||
|
CVE-2022-25561 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX12/5
|
||
|
CVE-2022-25566 - https://github.com/sec-bin/IoT-CVE/tree/main/Tenda/AX1806/12
|
||
|
CVE-2022-25568 - https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/
|
||
|
CVE-2022-2557 - https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e
|
||
|
CVE-2022-25576 - https://github.com/butterflyhack/anchorcms-0.12.7-CSRF
|
||
|
CVE-2022-25577 - https://github.com/ph0nkybit/proof-of-concepts/tree/main/Use_Of_Hardcoded_Password_In_ALF-BanCO_8.2.x
|
||
|
CVE-2022-2558 - https://wpscan.com/vulnerability/6e096269-eedc-4614-88ce-6795c4adf32f
|
||
|
CVE-2022-2559 - https://wpscan.com/vulnerability/062599ce-c630-487e-bb43-c3b27a62b9ec
|
||
|
CVE-2022-2563 - https://wpscan.com/vulnerability/98cd761c-7527-4224-965d-d34472b5c19f
|
||
|
CVE-2022-25630 - http://packetstormsecurity.com/files/171781/Symantec-Messaging-Gateway-10.7.4-Cross-Site-Scripting.html
|
||
|
CVE-2022-25636 - http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
|
||
|
CVE-2022-25636 - https://github.com/Bonfee/CVE-2022-25636
|
||
|
CVE-2022-25636 - https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
|
||
|
CVE-2022-25636 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2564 - https://huntr.dev/bounties/055be524-9296-4b2f-b68d-6d5b810d1ddd
|
||
|
CVE-2022-25641 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-25644 - https://security.snyk.io/vuln/SNYK-JS-PENDO324GETPROCESSBYNAME-2419094
|
||
|
CVE-2022-25645 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974
|
||
|
CVE-2022-25645 - https://snyk.io/vuln/SNYK-JS-DSET-2330881
|
||
|
CVE-2022-25646 - https://github.com/myliang/x-spreadsheet/issues/580
|
||
|
CVE-2022-25646 - https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381
|
||
|
CVE-2022-25646 - https://youtu.be/Ij-8VVKNh7U
|
||
|
CVE-2022-25647 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-25648 - https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
|
||
|
CVE-2022-2565 - https://wpscan.com/vulnerability/d89eff7d-a3e6-4876-aa0e-6d17e206af83
|
||
|
CVE-2022-25664 - http://packetstormsecurity.com/files/172853/Qualcomm-Adreno-GPU-Information-Leak.html
|
||
|
CVE-2022-2567 - https://wpscan.com/vulnerability/dfa21dde-a9fc-4a35-9602-c3fde907ca54
|
||
|
CVE-2022-2571 - https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571
|
||
|
CVE-2022-2574 - https://wpscan.com/vulnerability/9dec8ac7-befd-4c9d-9a9e-7da9e395dbf2
|
||
|
CVE-2022-25743 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html
|
||
|
CVE-2022-2575 - https://wpscan.com/vulnerability/e934af78-9dfd-4e14-853d-dc453de6e365
|
||
|
CVE-2022-25758 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2936782
|
||
|
CVE-2022-25758 - https://snyk.io/vuln/SNYK-JS-SCSSTOKENIZER-2339884
|
||
|
CVE-2022-25759 - https://github.com/neocotic/convert-svg/issues/81
|
||
|
CVE-2022-25759 - https://security.snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-2849633
|
||
|
CVE-2022-25760 - https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099
|
||
|
CVE-2022-25761 - https://security.snyk.io/vuln/SNYK-UNMANAGED-OPEN62541OPEN62541-2988719
|
||
|
CVE-2022-25762 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-25765 - http://packetstormsecurity.com/files/171746/pdfkit-0.8.7.2-Command-Injection.html
|
||
|
CVE-2022-25765 - https://security.snyk.io/vuln/SNYK-RUBY-PDFKIT-2869795
|
||
|
CVE-2022-25766 - https://github.com/FredrikNoren/ungit/pull/1510
|
||
|
CVE-2022-25766 - https://snyk.io/vuln/SNYK-JS-UNGIT-2414099
|
||
|
CVE-2022-25767 - https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPORT-2322018
|
||
|
CVE-2022-2577 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(SQLI).md
|
||
|
CVE-2022-2577 - https://vuldb.com/?id.205300
|
||
|
CVE-2022-25778 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25779 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-2578 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System--.md
|
||
|
CVE-2022-25780 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25781 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25782 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25783 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25784 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25785 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25786 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-25787 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-2579 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Garage%20Management%20System(XSS).md
|
||
|
CVE-2022-2579 - https://vuldb.com/?id.205302
|
||
|
CVE-2022-2580 - https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249
|
||
|
CVE-2022-2581 - https://huntr.dev/bounties/0bedbae2-82ae-46ae-aa68-1c28b309b60b
|
||
|
CVE-2022-25810 - https://wpscan.com/vulnerability/9a934a84-f0c7-42ed-b980-bb168b2c5892
|
||
|
CVE-2022-25811 - https://wpscan.com/vulnerability/0e0d2c5f-3396-4a0a-a5c6-6a98de3802c9
|
||
|
CVE-2022-25812 - https://wpscan.com/vulnerability/1f6bd346-4743-44b8-86d7-4fbe09bad657
|
||
|
CVE-2022-25814 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25815 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25816 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25817 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25818 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25819 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25820 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
|
||
|
CVE-2022-25831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-25832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-25833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-25836 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
||
|
CVE-2022-25837 - https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
|
||
|
CVE-2022-25839 - https://snyk.io/vuln/SNYK-JS-URLJS-2414030
|
||
|
CVE-2022-25842 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABAONEAGENT-2407874
|
||
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736
|
||
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738
|
||
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737
|
||
|
CVE-2022-25844 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735
|
||
|
CVE-2022-25845 - https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222
|
||
|
CVE-2022-25845 - https://www.ddosi.org/fastjson-poc/
|
||
|
CVE-2022-25845 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-25847 - https://gist.github.com/lirantal/52debd25284726fcc2eaed9c7512975c
|
||
|
CVE-2022-25847 - https://security.snyk.io/vuln/SNYK-JS-SERVELITE-3149915
|
||
|
CVE-2022-25848 - https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd
|
||
|
CVE-2022-25848 - https://security.snyk.io/vuln/SNYK-JS-STATICDEVSERVER-3149917
|
||
|
CVE-2022-25849 - https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544
|
||
|
CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5564-1
|
||
|
CVE-2022-2585 - https://ubuntu.com/security/notices/USN-5566-1
|
||
|
CVE-2022-2585 - https://www.openwall.com/lists/oss-security/2022/08/09/7
|
||
|
CVE-2022-25850 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMHOPPSCOTCHPROXYSCOTCH-2435228
|
||
|
CVE-2022-25851 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2860295
|
||
|
CVE-2022-25851 - https://snyk.io/vuln/SNYK-JS-JPEGJS-2859218
|
||
|
CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-LIBPQ-2392366
|
||
|
CVE-2022-25852 - https://snyk.io/vuln/SNYK-JS-PGNATIVE-2392365
|
||
|
CVE-2022-25853 - https://security.snyk.io/vuln/SNYK-JS-SEMVERTAGS-3175612
|
||
|
CVE-2022-25854 - https://bsg.tech/blog/cve-2022-25854-stored-xss-in-yaireo-tagify-npm-module/
|
||
|
CVE-2022-25855 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOAPP3-3157951
|
||
|
CVE-2022-25858 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949722
|
||
|
CVE-2022-25858 - https://snyk.io/vuln/SNYK-JS-TERSER-2806366
|
||
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5560-2
|
||
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5562-1
|
||
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5564-1
|
||
|
CVE-2022-2586 - https://ubuntu.com/security/notices/USN-5566-1
|
||
|
CVE-2022-2586 - https://www.openwall.com/lists/oss-security/2022/08/09/5
|
||
|
CVE-2022-25860 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391
|
||
|
CVE-2022-25862 - https://snyk.io/vuln/SNYK-JS-SDS-2385944
|
||
|
CVE-2022-25863 - https://snyk.io/vuln/SNYK-JS-GATSBYPLUGINMDX-2405699
|
||
|
CVE-2022-25865 - https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201
|
||
|
CVE-2022-25866 - https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349
|
||
|
CVE-2022-25867 - https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738
|
||
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783
|
||
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2949784
|
||
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2949782
|
||
|
CVE-2022-25869 - https://snyk.io/vuln/SNYK-JS-ANGULAR-2949781
|
||
|
CVE-2022-25871 - https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488
|
||
|
CVE-2022-25872 - https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392368
|
||
|
CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVUETIFYJS-3024407
|
||
|
CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3024406
|
||
|
CVE-2022-25873 - https://security.snyk.io/vuln/SNYK-JS-VUETIFY-3019858
|
||
|
CVE-2022-25875 - https://snyk.io/vuln/SNYK-JS-SVELTE-2931080
|
||
|
CVE-2022-25876 - https://snyk.io/vuln/SNYK-JS-LINKPREVIEWJS-2933520
|
||
|
CVE-2022-25878 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2841507
|
||
|
CVE-2022-25878 - https://snyk.io/vuln/SNYK-JS-PROTOBUFJS-2441248
|
||
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5560-2
|
||
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5562-1
|
||
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5564-1
|
||
|
CVE-2022-2588 - https://ubuntu.com/security/notices/USN-5566-1
|
||
|
CVE-2022-2588 - https://www.openwall.com/lists/oss-security/2022/08/09/6
|
||
|
CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
|
||
|
CVE-2022-25881 - https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
|
||
|
CVE-2022-25882 - https://gist.github.com/jnovikov/02a9aff9bf2188033e77bd91ff062856
|
||
|
CVE-2022-25882 - https://github.com/onnx/onnx/issues/3991
|
||
|
CVE-2022-25882 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479
|
||
|
CVE-2022-25883 - https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
|
||
|
CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091139
|
||
|
CVE-2022-25885 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3091137
|
||
|
CVE-2022-25888 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751
|
||
|
CVE-2022-2589 - https://huntr.dev/bounties/8705800d-cf2f-433d-9c3e-dbef6a3f7e08
|
||
|
CVE-2022-25890 - https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615
|
||
|
CVE-2022-25891 - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINRRRSHOUTRRRPKGUTIL-2849059
|
||
|
CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-HUMMUS-3091138
|
||
|
CVE-2022-25892 - https://security.snyk.io/vuln/SNYK-JS-MUHAMMARA-3060320
|
||
|
CVE-2022-25893 - https://security.snyk.io/vuln/SNYK-JS-VM2-2990237
|
||
|
CVE-2022-25894 - https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112
|
||
|
CVE-2022-25895 - https://gist.github.com/lirantal/0f8a48c3f5ac581ce73123abe9f7f120
|
||
|
CVE-2022-25895 - https://security.snyk.io/vuln/SNYK-JS-LITEDEVSERVER-3153718
|
||
|
CVE-2022-25897 - https://security.snyk.io/vuln/SNYK-JAVA-ORGECLIPSEMILO-2990191
|
||
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2935898
|
||
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-2935897
|
||
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2935896
|
||
|
CVE-2022-25898 - https://snyk.io/vuln/SNYK-JS-JSRSASIGN-2869122
|
||
|
CVE-2022-25900 - https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308
|
||
|
CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681
|
||
|
CVE-2022-25901 - https://security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984
|
||
|
CVE-2022-25903 - https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750
|
||
|
CVE-2022-25904 - https://github.com/hacksparrow/safe-eval/issues/26
|
||
|
CVE-2022-25904 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3175701
|
||
|
CVE-2022-25906 - https://security.snyk.io/vuln/SNYK-JS-ISHTTP2-3153878
|
||
|
CVE-2022-25907 - https://security.snyk.io/vuln/SNYK-JS-TSDEEPMERGE-2959975
|
||
|
CVE-2022-25908 - https://security.snyk.io/vuln/SNYK-JS-CREATECHOOELECTRON-3157953
|
||
|
CVE-2022-2591 - http://packetstormsecurity.com/files/172323/FLEX-Denial-Of-Service.html
|
||
|
CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532
|
||
|
CVE-2022-25912 - https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221
|
||
|
CVE-2022-25914 - https://security.snyk.io/vuln/SNYK-JAVA-COMGOOGLECLOUDTOOLS-2968871
|
||
|
CVE-2022-25916 - https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394
|
||
|
CVE-2022-25918 - https://security.snyk.io/vuln/SNYK-JS-SHESCAPE-3061108
|
||
|
CVE-2022-25921 - https://security.snyk.io/vuln/SNYK-JS-MORGANJSON-2976193
|
||
|
CVE-2022-25923 - https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956
|
||
|
CVE-2022-25926 - https://security.snyk.io/vuln/SNYK-JS-WINDOWCONTROL-3186345
|
||
|
CVE-2022-25927 - https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450
|
||
|
CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-3177369
|
||
|
CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-3177368
|
||
|
CVE-2022-25929 - https://security.snyk.io/vuln/SNYK-JS-SMOOTHIE-3177364
|
||
|
CVE-2022-2593 - https://wpscan.com/vulnerability/229a065e-1062-44d4-818d-29aa3b6b6d41
|
||
|
CVE-2022-25931 - https://gist.github.com/lirantal/fdfbe26561788c8194a54bf6d31772c9
|
||
|
CVE-2022-25931 - https://security.snyk.io/vuln/SNYK-JS-EASYSTATICSERVER-3153539
|
||
|
CVE-2022-25932 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1523
|
||
|
CVE-2022-25936 - https://gist.github.com/lirantal/691d02d607753d54856f9335f9a1692f
|
||
|
CVE-2022-25936 - https://security.snyk.io/vuln/SNYK-JS-SERVST-3244896
|
||
|
CVE-2022-25937 - https://security.snyk.io/vuln/SNYK-JS-GLANCE-3318395
|
||
|
CVE-2022-2594 - https://wpscan.com/vulnerability/3fde5336-552c-4861-8b4d-89a16735c0e2
|
||
|
CVE-2022-25940 - https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb
|
||
|
CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3175617
|
||
|
CVE-2022-25940 - https://security.snyk.io/vuln/SNYK-JS-LITESERVER-3153540
|
||
|
CVE-2022-25942 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1486
|
||
|
CVE-2022-25943 - https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE
|
||
|
CVE-2022-2595 - https://huntr.dev/bounties/1c6afb84-2025-46d8-9e9f-cbfc20e5d04d
|
||
|
CVE-2022-2596 - https://huntr.dev/bounties/a7e6a136-0a4b-46c4-ad20-802f1dd60bf7
|
||
|
CVE-2022-25962 - https://security.snyk.io/vuln/SNYK-JS-VAGRANTJS-3175614
|
||
|
CVE-2022-25967 - https://security.snyk.io/vuln/SNYK-JS-ETA-2936803
|
||
|
CVE-2022-2597 - https://wpscan.com/vulnerability/3ffcee7c-1e03-448c-8006-a9405658cdb7
|
||
|
CVE-2022-25972 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1485
|
||
|
CVE-2022-25973 - https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070
|
||
|
CVE-2022-25978 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070
|
||
|
CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253331
|
||
|
CVE-2022-25979 - https://security.snyk.io/vuln/SNYK-JS-JSUITES-3226764
|
||
|
CVE-2022-2598 - https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
|
||
|
CVE-2022-25989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1479
|
||
|
CVE-2022-2599 - https://wpscan.com/vulnerability/276a7fc5-3d0d-446d-92cf-20060aecd0ef
|
||
|
CVE-2022-25995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1477
|
||
|
CVE-2022-25996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1482
|
||
|
CVE-2022-26002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1476
|
||
|
CVE-2022-26007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1475
|
||
|
CVE-2022-26009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1483
|
||
|
CVE-2022-2602 - http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html
|
||
|
CVE-2022-2602 - https://ubuntu.com/security/notices/USN-5693-1
|
||
|
CVE-2022-26020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1474
|
||
|
CVE-2022-26023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1520
|
||
|
CVE-2022-26026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1491
|
||
|
CVE-2022-26042 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1478
|
||
|
CVE-2022-26043 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1489
|
||
|
CVE-2022-26061 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487
|
||
|
CVE-2022-26067 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1492
|
||
|
CVE-2022-26068 - https://snyk.io/vuln/SNYK-UNMANAGED-PISTACHEIOPISTACHE-2806332
|
||
|
CVE-2022-26073 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1480
|
||
|
CVE-2022-26075 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1500
|
||
|
CVE-2022-26077 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1490
|
||
|
CVE-2022-26082 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493
|
||
|
CVE-2022-26085 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1473
|
||
|
CVE-2022-26088 - http://packetstormsecurity.com/files/169863/BMC-Remedy-ITSM-Suite-9.1.10-20.02-HTML-Injection.html
|
||
|
CVE-2022-26088 - http://seclists.org/fulldisclosure/2022/Nov/10
|
||
|
CVE-2022-26088 - https://sec-consult.com/vulnerability-lab/advisory/html-injection-in-bmc-remedy-itsm-suite/
|
||
|
CVE-2022-26090 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26091 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26092 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26093 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26094 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26095 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26096 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26097 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26098 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26099 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-26101 - http://packetstormsecurity.com/files/167561/SAP-Fiori-Launchpad-Cross-Site-Scripting.html
|
||
|
CVE-2022-26101 - http://seclists.org/fulldisclosure/2022/Jun/39
|
||
|
CVE-2022-26105 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-26106 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-26107 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-26108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-26109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-26117 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-r259-5p5p-2q47
|
||
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html
|
||
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html
|
||
|
CVE-2022-26134 - http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
|
||
|
CVE-2022-26143 - https://team-cymru.com/blog/2022/03/08/record-breaking-ddos-potential-discovered-cve-2022-26143/
|
||
|
CVE-2022-26149 - http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html
|
||
|
CVE-2022-26159 - https://podalirius.net/en/cves/2022-26159/
|
||
|
CVE-2022-26169 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Air-Cargo-Management-System
|
||
|
CVE-2022-26170 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Simple-Mobile-Comparison-Website
|
||
|
CVE-2022-26171 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/campcodes.com/Bank-Management-System
|
||
|
CVE-2022-26173 - http://jforum.com
|
||
|
CVE-2022-26173 - https://github.com/WULINPIN/CVE/blob/main/JForum/poc.html
|
||
|
CVE-2022-26180 - http://packetstormsecurity.com/files/166630/qdPM-9.2-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-26180 - https://www.exploit-db.com/exploits/50854
|
||
|
CVE-2022-26181 - https://github.com/dropbox/lepton/issues/154
|
||
|
CVE-2022-26183 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
||
|
CVE-2022-26184 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
||
|
CVE-2022-26186 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
||
|
CVE-2022-26187 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
||
|
CVE-2022-26188 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
||
|
CVE-2022-26189 - https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/
|
||
|
CVE-2022-26197 - https://gist.github.com/CrimsonHamster/1aeec6db0d740de6ed4690f6a975f377
|
||
|
CVE-2022-26211 - https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_25/25.md
|
||
|
CVE-2022-26233 - http://packetstormsecurity.com/files/166577/Barco-Control-Room-Management-Suite-Directory-Traversal.html
|
||
|
CVE-2022-26233 - http://seclists.org/fulldisclosure/2022/Apr/0
|
||
|
CVE-2022-26235 - https://pastebin.com/amgw9pE7
|
||
|
CVE-2022-26236 - https://pastebin.com/hwrvFix5
|
||
|
CVE-2022-26237 - https://pastebin.com/DREqM7AT
|
||
|
CVE-2022-26238 - https://pastebin.com/23N5wcC7
|
||
|
CVE-2022-26239 - https://pastebin.com/1QEHrj01
|
||
|
CVE-2022-26240 - https://pastebin.com/Bsy6KTxJ
|
||
|
CVE-2022-26243 - https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-4-sscanf-buffer-overflow-75ae0e06abb6
|
||
|
CVE-2022-26244 - https://github.com/kishan0725/Hospital-Management-System/issues/23
|
||
|
CVE-2022-26250 - https://www.bencteux.fr/posts/synaman/
|
||
|
CVE-2022-26251 - https://www.bencteux.fr/posts/synaman/
|
||
|
CVE-2022-26252 - https://www.exploit-db.com/exploits/50780
|
||
|
CVE-2022-26254 - https://youtu.be/b665r1ZfCg4
|
||
|
CVE-2022-26255 - https://github.com/Fndroid/clash_for_windows_pkg/issues/2710
|
||
|
CVE-2022-26258 - https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md
|
||
|
CVE-2022-26258 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-2626 - https://huntr.dev/bounties/704aacc9-edff-4da5-90a6-4adf8dbf36fe
|
||
|
CVE-2022-26260 - https://github.com/wollardj/simple-plist/issues/60
|
||
|
CVE-2022-26269 - https://github.com/nsbogam/CVE-2022-26269/blob/main/README.md
|
||
|
CVE-2022-2627 - https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea
|
||
|
CVE-2022-26278 - https://github.com/pllrry/Tenda-AC9-V15.03.2.21_cn-Command-Execution-Vulnerability/tree/main/Tenda-AC9
|
||
|
CVE-2022-26279 - https://github.com/eyoucms/eyoucms/issues/22
|
||
|
CVE-2022-2628 - https://wpscan.com/vulnerability/e712f83e-b437-4bc6-9511-2b0290ed315d
|
||
|
CVE-2022-26281 - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-26281
|
||
|
CVE-2022-2629 - https://wpscan.com/vulnerability/25a0d41f-3b6f-4d18-b4d5-767ac60ee8a8
|
||
|
CVE-2022-26291 - https://github.com/ckolivas/lrzip/issues/206
|
||
|
CVE-2022-26293 - https://www.exploit-db.com/exploits/50682
|
||
|
CVE-2022-26295 - https://www.exploit-db.com/exploits/50683
|
||
|
CVE-2022-26296 - https://github.com/riscv-boom/riscv-boom/issues/577
|
||
|
CVE-2022-26301 - https://github.com/yeyinshi/tuzicms/issues/11
|
||
|
CVE-2022-26303 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1488
|
||
|
CVE-2022-2631 - https://huntr.dev/bounties/86881f9e-ca48-49b5-9782-3c406316930c
|
||
|
CVE-2022-26315 - https://github.com/claudiodangelis/qrcp/issues/223
|
||
|
CVE-2022-26332 - https://www.exploit-db.com/exploits/50788
|
||
|
CVE-2022-26342 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1484
|
||
|
CVE-2022-26346 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1507
|
||
|
CVE-2022-2635 - https://wpscan.com/vulnerability/219767a8-2427-42d5-8734-bd197d9ab46b
|
||
|
CVE-2022-26352 - http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html
|
||
|
CVE-2022-2636 - https://huntr.dev/bounties/357c0390-631c-4684-b6e1-a6d8b2453d66
|
||
|
CVE-2022-26362 - http://packetstormsecurity.com/files/167718/Xen-TLB-Flush-Bypass.html
|
||
|
CVE-2022-26364 - http://packetstormsecurity.com/files/167710/Xen-PV-Guest-Non-SELFSNOOP-CPU-Memory-Corruption.html
|
||
|
CVE-2022-26376 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1511
|
||
|
CVE-2022-2638 - https://wpscan.com/vulnerability/70840a72-ccdc-4eee-9ad2-874809e5de11
|
||
|
CVE-2022-26382 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741888
|
||
|
CVE-2022-26385 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747526
|
||
|
CVE-2022-26387 - https://bugzilla.mozilla.org/show_bug.cgi?id=1752979
|
||
|
CVE-2022-26420 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1499
|
||
|
CVE-2022-2643 - https://vuldb.com/?id.205564
|
||
|
CVE-2022-2645 - https://vuldb.com/?id.205573
|
||
|
CVE-2022-26479 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/
|
||
|
CVE-2022-26481 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-command-injection-in-poly-studio/
|
||
|
CVE-2022-26482 - https://sec-consult.com/vulnerability-lab/advisory/critical-vulnerabilities-poly-eagleeye-director-ii/
|
||
|
CVE-2022-26495 - https://lists.debian.org/nbd/2022/01/msg00037.html
|
||
|
CVE-2022-26496 - http://packetstormsecurity.com/files/172148/Shannon-Baseband-fmtp-SDP-Attribute-Memory-Corruption.html
|
||
|
CVE-2022-26496 - https://lists.debian.org/nbd/2022/01/msg00037.html
|
||
|
CVE-2022-26497 - http://packetstormsecurity.com/files/172143/Shannon-Baseband-acfg-pcfg-SDP-Attribute-Memory-Corruption.html
|
||
|
CVE-2022-26498 - http://packetstormsecurity.com/files/166744/Asterisk-Project-Security-Advisory-AST-2022-001.html
|
||
|
CVE-2022-26498 - http://packetstormsecurity.com/files/172139/Shannon-Baseband-chatroom-SDP-Attribute-Memory-Corruption.html
|
||
|
CVE-2022-26499 - http://packetstormsecurity.com/files/166745/Asterisk-Project-Security-Advisory-AST-2022-002.html
|
||
|
CVE-2022-2650 - https://huntr.dev/bounties/f0d85efa-4e78-4b1d-848f-edea115af64b
|
||
|
CVE-2022-26507 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-02
|
||
|
CVE-2022-2651 - http://packetstormsecurity.com/files/168423/Bookwyrm-0.4.3-Authentication-Bypass.html
|
||
|
CVE-2022-26510 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1495
|
||
|
CVE-2022-26518 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1501
|
||
|
CVE-2022-2652 - https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5
|
||
|
CVE-2022-26521 - http://packetstormsecurity.com/files/171487/Abantecart-1.3.2-Remote-Code-Execution.html
|
||
|
CVE-2022-2653 - https://huntr.dev/bounties/5dff7cf9-8bb2-4f67-a02d-b94db5009d70
|
||
|
CVE-2022-26531 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
|
||
|
CVE-2022-26531 - http://packetstormsecurity.com/files/177036/Zyxel-zysh-Format-String-Proof-Of-Concept.html
|
||
|
CVE-2022-26532 - http://packetstormsecurity.com/files/167464/Zyxel-Buffer-Overflow-Format-String-Command-Injection.html
|
||
|
CVE-2022-2654 - https://wpscan.com/vulnerability/845f44ca-f572-48d7-a19a-89cace0b8993
|
||
|
CVE-2022-2655 - https://wpscan.com/vulnerability/acc9675a-56f6-411a-9594-07144c2aad1b
|
||
|
CVE-2022-2656 - https://vuldb.com/?id.205596
|
||
|
CVE-2022-26562 - https://kopano.com/
|
||
|
CVE-2022-26565 - https://bug.pocas.kr/2022/03/01/2022-03-05-CVE-2022-26565/
|
||
|
CVE-2022-26565 - https://github.com/totaljs/cms/issues/35
|
||
|
CVE-2022-2657 - https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a
|
||
|
CVE-2022-26579 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
||
|
CVE-2022-2658 - https://wpscan.com/vulnerability/e72fa040-3ca5-4570-9a3c-c704574b1ca3
|
||
|
CVE-2022-26580 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
||
|
CVE-2022-26581 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
||
|
CVE-2022-26582 - https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/
|
||
|
CVE-2022-26588 - http://packetstormsecurity.com/files/166627/ICEHRM-31.0.0.0S-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-26588 - https://medium.com/@devansh3008/csrf-in-icehrm-31-0-0-0s-in-delete-user-endpoint-86a39ecf253f
|
||
|
CVE-2022-26589 - https://medium.com/@devansh3008/pluck-cms-v4-7-15-csrf-vulnerability-at-delete-page-9fff0309f9c
|
||
|
CVE-2022-26589 - https://owasp.org/www-community/attacks/csrf
|
||
|
CVE-2022-26592 - https://github.com/sass/libsass/issues/3174
|
||
|
CVE-2022-26607 - https://github.com/baigoStudio/baigoCMS/issues/9
|
||
|
CVE-2022-26613 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-26613
|
||
|
CVE-2022-26624 - https://drive.google.com/file/d/1Dp0dD9PNcwamjRi0ldD0hUOEivu48SR6/view?usp=sharing
|
||
|
CVE-2022-26628 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/vetbossel.in/2022/Matrimony
|
||
|
CVE-2022-26629 - https://github.com/sysenter-eip/CVE-2022-26629
|
||
|
CVE-2022-2663 - https://www.youtube.com/watch?v=WIq-YgQuYCA
|
||
|
CVE-2022-26632 - https://www.exploit-db.com/exploits/50739
|
||
|
CVE-2022-26633 - https://www.exploit-db.com/exploits/50740
|
||
|
CVE-2022-26634 - https://www.exploit-db.com/exploits/50765
|
||
|
CVE-2022-26635 - https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/
|
||
|
CVE-2022-26639 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_DNSServers%3D.pdf
|
||
|
CVE-2022-26640 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_minAddress%3D.pdf
|
||
|
CVE-2022-26641 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_httpRemotePort%3D.pdf
|
||
|
CVE-2022-26642 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/tp-link%20tl-wr840n_X_TP_ClonedMACAddress%3D.pdf
|
||
|
CVE-2022-2665 - https://vuldb.com/?id.205615
|
||
|
CVE-2022-26651 - http://packetstormsecurity.com/files/166746/Asterisk-Project-Security-Advisory-AST-2022-003.html
|
||
|
CVE-2022-26653 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777
|
||
|
CVE-2022-26659 - https://docs.docker.com/docker-for-windows/release-notes/
|
||
|
CVE-2022-2667 - https://vuldb.com/?id.205619
|
||
|
CVE-2022-2669 - https://wpscan.com/vulnerability/792d9f22-abf6-47b2-a247-d0cdb705cd81
|
||
|
CVE-2022-26702 - http://seclists.org/fulldisclosure/2023/Mar/21
|
||
|
CVE-2022-2671 - https://vuldb.com/?id.205655
|
||
|
CVE-2022-2672 - https://vuldb.com/?id.205656
|
||
|
CVE-2022-26744 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-2675 - https://fccid.io/2A5PE-YUSHU001/Users-Manual/User-Manual-5810729
|
||
|
CVE-2022-26757 - http://packetstormsecurity.com/files/167517/XNU-Flow-Divert-Race-Condition-Use-After-Free.html
|
||
|
CVE-2022-2676 - https://vuldb.com/?id.205664
|
||
|
CVE-2022-2677 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-SQL%20injections.md
|
||
|
CVE-2022-2677 - https://vuldb.com/?id.205665
|
||
|
CVE-2022-26777 - https://raxis.com/blog/cve-2022-26653-and-cve-2022-26777
|
||
|
CVE-2022-26779 - https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-vpcc-9rh2-8jfp
|
||
|
CVE-2022-26780 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
|
||
|
CVE-2022-26781 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
|
||
|
CVE-2022-26782 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1481
|
||
|
CVE-2022-2679 - https://vuldb.com/?id.205667
|
||
|
CVE-2022-2683 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Simple%20Food%20Ordering%20System-XSS.md
|
||
|
CVE-2022-2683 - https://vuldb.com/?id.205671
|
||
|
CVE-2022-26833 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513
|
||
|
CVE-2022-2684 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Apartment%20Visitor%20Management%20System-XSS.md
|
||
|
CVE-2022-26842 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1537
|
||
|
CVE-2022-2685 - https://vuldb.com/?id.205673
|
||
|
CVE-2022-26851 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
||
|
CVE-2022-26852 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
||
|
CVE-2022-26854 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
||
|
CVE-2022-26855 - https://www.dell.com/support/kbdoc/en-us/000197991/dell-emc-powerscale-onefs-security-update-for-multiple-component-vulnerabilities
|
||
|
CVE-2022-26873 - https://www.binarly.io/advisories/BRLY-2022-027
|
||
|
CVE-2022-26877 - https://asana.com
|
||
|
CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17
|
||
|
CVE-2022-26878 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
||
|
CVE-2022-26878 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d0688421449718c6c5f46e458a378c9b530ba18
|
||
|
CVE-2022-2690 - https://vuldb.com/?id.205813
|
||
|
CVE-2022-2691 - https://vuldb.com/?id.205814
|
||
|
CVE-2022-2692 - https://vuldb.com/?id.205815
|
||
|
CVE-2022-2694 - https://vuldb.com/?id.205817
|
||
|
CVE-2022-26941 - https://tetraburst.com/
|
||
|
CVE-2022-26942 - https://tetraburst.com/
|
||
|
CVE-2022-26943 - https://tetraburst.com/
|
||
|
CVE-2022-26947 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
||
|
CVE-2022-26948 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
||
|
CVE-2022-26949 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
||
|
CVE-2022-26950 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
||
|
CVE-2022-26951 - https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497
|
||
|
CVE-2022-26952 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md
|
||
|
CVE-2022-26953 - https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2022-26952%20%26%20CVE-2022-26953/readme.md
|
||
|
CVE-2022-26959 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1842675717/CVE-2022-26959+Northstar+Club+Management+software+version+6.3+-+Full+Blind+Time-based+SQL+Injection
|
||
|
CVE-2022-26965 - https://packetstormsecurity.com/files/166336/Pluck-CMS-4.7.16-Shell-Upload.html
|
||
|
CVE-2022-26965 - https://youtu.be/sN6J_X4mEbY
|
||
|
CVE-2022-26966 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10
|
||
|
CVE-2022-26966 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9da0b56fe27206b49f39805f7dcda8a89379062
|
||
|
CVE-2022-26967 - https://github.com/gpac/gpac/issues/2138
|
||
|
CVE-2022-26979 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-2698 - https://vuldb.com/?id.205819
|
||
|
CVE-2022-26980 - https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca
|
||
|
CVE-2022-26981 - https://github.com/liblouis/liblouis/issues/1171
|
||
|
CVE-2022-26982 - http://packetstormsecurity.com/files/171486/SimpleMachinesForum-2.1.1-Remote-Code-Execution.html
|
||
|
CVE-2022-26986 - http://packetstormsecurity.com/files/171485/ImpressCMS-1.4.3-SQL-Injection.html
|
||
|
CVE-2022-26990 - https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_2/2.md
|
||
|
CVE-2022-27003 - https://github.com/wudipjq/my_vuln/blob/main/totolink/vuln_32/32.md
|
||
|
CVE-2022-27007 - https://github.com/nginx/njs/issues/469
|
||
|
CVE-2022-27008 - https://github.com/nginx/njs/issues/471
|
||
|
CVE-2022-27016 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/10
|
||
|
CVE-2022-2702 - https://vuldb.com/?id.205826
|
||
|
CVE-2022-27022 - https://github.com/EPhaha/IOT_vuln/tree/main/Tenda/AC9/14
|
||
|
CVE-2022-2703 - https://vuldb.com/?id.205827
|
||
|
CVE-2022-2704 - https://vuldb.com/?id.205828
|
||
|
CVE-2022-27041 - https://github.com/OS4ED/openSIS-Classic/issues/248
|
||
|
CVE-2022-27044 - https://github.com/saitoha/libsixel/issues/156
|
||
|
CVE-2022-27046 - https://github.com/saitoha/libsixel/issues/157
|
||
|
CVE-2022-2705 - https://vuldb.com/?id.205829
|
||
|
CVE-2022-2706 - https://vuldb.com/?id.205830
|
||
|
CVE-2022-27061 - http://packetstormsecurity.com/files/166659/AeroCMS-0.0.1-Shell-Upload.html
|
||
|
CVE-2022-27061 - https://github.com/D4rkP0w4r/AeroCMS-Unrestricted-File-Upload-POC
|
||
|
CVE-2022-27062 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html
|
||
|
CVE-2022-27062 - https://github.com/D4rkP0w4r/AeroCMS-Add_Posts-Stored_XSS-Poc
|
||
|
CVE-2022-27063 - http://packetstormsecurity.com/files/166649/AeroCMS-0.0.1-Cross-Site-Scripting.html
|
||
|
CVE-2022-27063 - https://github.com/D4rkP0w4r/AeroCMS-Comment-Stored_XSS-Poc
|
||
|
CVE-2022-27064 - http://packetstormsecurity.com/files/166653/Musical-World-1-Shell-Upload.html
|
||
|
CVE-2022-27064 - https://github.com/D4rkP0w4r/Musical-World-Unrestricted-File-Upload-RCE-POC
|
||
|
CVE-2022-2707 - https://vuldb.com/?id.205831
|
||
|
CVE-2022-2708 - https://vuldb.com/?id.205833
|
||
|
CVE-2022-27083 - https://github.com/GD008/vuln/blob/main/tenda_M3_uploadAccessCodePic/M3_uploadAccessCodePic.md
|
||
|
CVE-2022-2709 - https://wpscan.com/vulnerability/1c551234-9c59-41a0-ab74-beea2d27df6b
|
||
|
CVE-2022-27092 - https://www.exploit-db.com/exploits/50804
|
||
|
CVE-2022-27094 - https://www.exploit-db.com/exploits/50817
|
||
|
CVE-2022-27095 - https://www.exploit-db.com/exploits/50815
|
||
|
CVE-2022-2710 - https://wpscan.com/vulnerability/f730f584-2370-49f9-a094-a5bc521671c1
|
||
|
CVE-2022-27104 - https://www.swascan.com/security-advisory-forma-lms/
|
||
|
CVE-2022-2711 - https://wpscan.com/vulnerability/11e73c23-ff5f-42e5-a4b0-0971652dcea1
|
||
|
CVE-2022-27114 - https://github.com/michaelrsweet/htmldoc/issues/471
|
||
|
CVE-2022-2713 - https://huntr.dev/bounties/3080fc96-75d7-4868-84de-9fc8c9b90290
|
||
|
CVE-2022-27134 - https://github.com/Kenun99/CVE-batdappboomx
|
||
|
CVE-2022-27135 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232
|
||
|
CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/pic_ppm.png
|
||
|
CVE-2022-27135 - https://github.com/verf1sh/Poc/blob/master/poc_ppm
|
||
|
CVE-2022-27139 - http://ghost.org/docs/security/#privilege-escalation-attacks
|
||
|
CVE-2022-27145 - https://github.com/gpac/gpac/issues/2108
|
||
|
CVE-2022-27146 - https://github.com/gpac/gpac/issues/2120
|
||
|
CVE-2022-27147 - https://github.com/gpac/gpac/issues/2109
|
||
|
CVE-2022-27148 - https://github.com/gpac/gpac/issues/2067
|
||
|
CVE-2022-27169 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1494
|
||
|
CVE-2022-27172 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1496
|
||
|
CVE-2022-27178 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1506
|
||
|
CVE-2022-27185 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1505
|
||
|
CVE-2022-27192 - https://github.com/transcendent-group/advisories/blob/main/CVE-2022-27192.md
|
||
|
CVE-2022-27193 - https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2
|
||
|
CVE-2022-27223 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
|
||
|
CVE-2022-27226 - http://packetstormsecurity.com/files/166396/iRZ-Mobile-Router-Cross-Site-Request-Forgery-Remote-Code-Execution.html
|
||
|
CVE-2022-27226 - https://github.com/SakuraSamuraii/ez-iRZ
|
||
|
CVE-2022-27226 - https://johnjhacking.com/blog/cve-2022-27226/
|
||
|
CVE-2022-2723 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20eprocess.php%20SQL%20Injection/
|
||
|
CVE-2022-2724 - https://bewhale.github.io/post/PHP%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E2%80%94Employee%20Management%20System%20aprocess.php%20SQL%20Injection/
|
||
|
CVE-2022-27248 - http://packetstormsecurity.com/files/166560/IdeaRE-RefTree-Path-Traversal.html
|
||
|
CVE-2022-27249 - http://packetstormsecurity.com/files/166559/IdeaRE-RefTree-Shell-Upload.html
|
||
|
CVE-2022-27254 - https://github.com/nonamecoder/CVE-2022-27254
|
||
|
CVE-2022-27254 - https://news.ycombinator.com/item?id=30804702
|
||
|
CVE-2022-27254 - https://www.bleepingcomputer.com/news/security/honda-bug-lets-a-hacker-unlock-and-start-your-car-via-replay-attack/
|
||
|
CVE-2022-27254 - https://www.theregister.com/2022/03/25/honda_civic_hack/
|
||
|
CVE-2022-27256 - https://volse.net/~haraldei/infosec/disclosures/hubzilla-before-7-2-multiple-vulnerabilities/
|
||
|
CVE-2022-2726 - https://vuldb.com/?id.205839
|
||
|
CVE-2022-27260 - http://buttercms.com
|
||
|
CVE-2022-27263 - https://github.com/strapi/strapi
|
||
|
CVE-2022-27268 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27269 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27270 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27271 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27272 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27273 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27274 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27275 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27276 - https://drive.google.com/drive/folders/1zJ2dGrKar-WTlYz13v1f0BIsoIm3aU0l?usp=sharing
|
||
|
CVE-2022-27286 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27287 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27288 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27289 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-2729 - https://huntr.dev/bounties/13b58e74-2dd0-4eec-9f3a-554485701540
|
||
|
CVE-2022-27290 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27291 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27292 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27293 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27294 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-27295 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-2730 - https://huntr.dev/bounties/a81f39ab-092b-4941-b9ca-c4c8f2191504
|
||
|
CVE-2022-27304 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Student-Grading-System
|
||
|
CVE-2022-27308 - http://packetstormsecurity.com/files/166966/PHProjekt-PhpSimplyGest-MyProjects-1.3.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-2731 - https://huntr.dev/bounties/20b8d5c5-0764-4f0b-8ab3-b9f6b857175e
|
||
|
CVE-2022-2732 - https://huntr.dev/bounties/8773e0d1-5f1a-4e87-8998-f5ec45f6d533
|
||
|
CVE-2022-2733 - https://huntr.dev/bounties/25b91301-dfb0-4353-a732-e051bbe8420c
|
||
|
CVE-2022-27330 - https://github.com/CP04042K/Full-Ecommece-Website-Add_Product-Stored_XSS-POC
|
||
|
CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230
|
||
|
CVE-2022-27337 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230#note_1372177
|
||
|
CVE-2022-2734 - https://huntr.dev/bounties/d8e4c70c-788b-47e9-8141-a08db751d4e6
|
||
|
CVE-2022-27346 - http://packetstormsecurity.com/files/166654/E-Commerce-Website-1.1.0-Shell-Upload.html
|
||
|
CVE-2022-27346 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Slides-Unrestricted-File-Upload-RCE-POC
|
||
|
CVE-2022-27348 - http://packetstormsecurity.com/files/166650/Social-Codia-SMS-1-Cross-Site-Scripting.html
|
||
|
CVE-2022-27348 - https://github.com/D4rkP0w4r/sms-Add_Student-Stored_XSS-POC
|
||
|
CVE-2022-27349 - http://packetstormsecurity.com/files/166655/Social-Codia-SMS-1-Shell-Upload.html
|
||
|
CVE-2022-27349 - https://github.com/D4rkP0w4r/sms-Unrestricted-File-Upload-RCE-POC
|
||
|
CVE-2022-2735 - https://www.openwall.com/lists/oss-security/2022/09/01/4
|
||
|
CVE-2022-27351 - http://packetstormsecurity.com/files/166651/PHPGurukul-Zoo-Management-System-1.0-Shell-Upload.html
|
||
|
CVE-2022-27351 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20Upload%20%2B%20RCE/POC.md
|
||
|
CVE-2022-27352 - http://packetstormsecurity.com/files/166656/Simple-House-Rental-System-1-Shell-Upload.html
|
||
|
CVE-2022-27352 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20House%20Rental%20System%20Upload%20%2B%20RCE/POC.md
|
||
|
CVE-2022-27357 - http://packetstormsecurity.com/files/166652/E-Commerce-Website-1.0-Shell-Upload.html
|
||
|
CVE-2022-27357 - https://github.com/D4rkP0w4r/CVEs/blob/main/Ecommerce%20Website%20Upload%20%2B%20RCE/POC.md
|
||
|
CVE-2022-27365 - https://github.com/chshcms/cscms/issues/12#issue-1170440183
|
||
|
CVE-2022-2737 - https://wpscan.com/vulnerability/91bbdeb0-f2df-4500-b856-af0ff68fbb12
|
||
|
CVE-2022-27374 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12.md
|
||
|
CVE-2022-27375 - https://github.com/tianhui999/myCVE/blob/main/AX12/AX12-2.md
|
||
|
CVE-2022-27378 - https://jira.mariadb.org/browse/MDEV-26423
|
||
|
CVE-2022-27382 - https://jira.mariadb.org/browse/MDEV-26402
|
||
|
CVE-2022-27385 - https://jira.mariadb.org/browse/MDEV-26415
|
||
|
CVE-2022-27386 - https://jira.mariadb.org/browse/MDEV-26406
|
||
|
CVE-2022-27387 - https://jira.mariadb.org/browse/MDEV-26422
|
||
|
CVE-2022-27411 - https://github.com/ejdhssh/IOT_Vul
|
||
|
CVE-2022-27412 - http://packetstormsecurity.com/files/166694/Explore-CMS-1.0-SQL-Injection.html
|
||
|
CVE-2022-27431 - https://github.com/wuzhicms/wuzhicms/issues/200
|
||
|
CVE-2022-27432 - https://owasp.org/www-community/attacks/csrf
|
||
|
CVE-2022-27432 - https://www.exploit-db.com/exploits/50831
|
||
|
CVE-2022-27435 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_Product-Unrestricted-File-Upload-RCE-POC
|
||
|
CVE-2022-27436 - https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC
|
||
|
CVE-2022-27438 - https://gerr.re/posts/cve-2022-27438/
|
||
|
CVE-2022-27444 - https://jira.mariadb.org/browse/MDEV-28080
|
||
|
CVE-2022-27445 - https://jira.mariadb.org/browse/MDEV-28081
|
||
|
CVE-2022-27446 - https://jira.mariadb.org/browse/MDEV-28082
|
||
|
CVE-2022-27447 - https://jira.mariadb.org/browse/MDEV-28099
|
||
|
CVE-2022-27448 - https://jira.mariadb.org/browse/MDEV-28095
|
||
|
CVE-2022-27449 - https://jira.mariadb.org/browse/MDEV-28089
|
||
|
CVE-2022-2745 - https://vuldb.com/?id.206013
|
||
|
CVE-2022-27451 - https://jira.mariadb.org/browse/MDEV-28094
|
||
|
CVE-2022-27452 - https://jira.mariadb.org/browse/MDEV-28090
|
||
|
CVE-2022-27455 - https://jira.mariadb.org/browse/MDEV-28097
|
||
|
CVE-2022-27456 - https://jira.mariadb.org/browse/MDEV-28093
|
||
|
CVE-2022-27457 - https://jira.mariadb.org/browse/MDEV-28098
|
||
|
CVE-2022-27458 - https://jira.mariadb.org/browse/MDEV-28099
|
||
|
CVE-2022-2747 - https://vuldb.com/?id.206015
|
||
|
CVE-2022-27474 - https://github.com/Mount4in/Mount4in.github.io/blob/master/poc.py
|
||
|
CVE-2022-27480 - http://packetstormsecurity.com/files/166743/Siemens-A8000-CP-8050-CP-8031-SICAM-WEB-Missing-File-Download-Missing-Authentication.html
|
||
|
CVE-2022-27480 - http://seclists.org/fulldisclosure/2022/Apr/20
|
||
|
CVE-2022-27481 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf
|
||
|
CVE-2022-27498 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1531
|
||
|
CVE-2022-2750 - https://vuldb.com/?id.206022
|
||
|
CVE-2022-2752 - https://www.secomea.com/support/cybersecurity-advisory
|
||
|
CVE-2022-2753 - https://wpscan.com/vulnerability/3c6cc46e-e18a-4f34-ac09-f30ca74a1182
|
||
|
CVE-2022-27531 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010
|
||
|
CVE-2022-27532 - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0010
|
||
|
CVE-2022-27534 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#310322_2
|
||
|
CVE-2022-27535 - https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822
|
||
|
CVE-2022-2754 - https://wpscan.com/vulnerability/e3c6d137-ff6e-432a-a21a-b36dc81f73c5
|
||
|
CVE-2022-2756 - https://huntr.dev/bounties/95e7c181-9d80-4428-aebf-687ac55a9216
|
||
|
CVE-2022-27567 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27568 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27569 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27570 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27571 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27572 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27573 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27574 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27575 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27576 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27607 - https://github.com/axiomatic-systems/Bento4/issues/677
|
||
|
CVE-2022-2762 - https://wpscan.com/vulnerability/cf0b3893-3283-46d6-a497-f3110a35d42a
|
||
|
CVE-2022-2763 - https://wpscan.com/vulnerability/36a7b872-31fa-4375-9be7-8f787e616ed5
|
||
|
CVE-2022-27630 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1504
|
||
|
CVE-2022-27631 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1510
|
||
|
CVE-2022-27633 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1503
|
||
|
CVE-2022-27642 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327
|
||
|
CVE-2022-27645 - https://kb.netgear.com/000064722/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-and-Fixed-Wireless-Products-PSV-2021-0325
|
||
|
CVE-2022-27647 - https://kb.netgear.com/000064723/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0327
|
||
|
CVE-2022-2765 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS--.md
|
||
|
CVE-2022-27654 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27655 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27656 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27657 - http://packetstormsecurity.com/files/167563/SAP-FRUN-Simple-Diagnostics-Agent-1.0-Directory-Traversal.html
|
||
|
CVE-2022-27657 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27658 - https://launchpad.support.sap.com/#/notes/3165856
|
||
|
CVE-2022-2766 - https://vuldb.com/?id.206162
|
||
|
CVE-2022-27660 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1502
|
||
|
CVE-2022-27666 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.15
|
||
|
CVE-2022-27667 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27668 - http://packetstormsecurity.com/files/168406/SAP-SAProuter-Improper-Access-Control.html
|
||
|
CVE-2022-27668 - http://seclists.org/fulldisclosure/2022/Sep/17
|
||
|
CVE-2022-27668 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27669 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27670 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-27671 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-2769 - https://github.com/ch0ing/vul/blob/main/WebRay.com.cn/Company%20Website%20CMS(XSS).md
|
||
|
CVE-2022-2770 - https://vuldb.com/?id.206166
|
||
|
CVE-2022-2772 - https://vuldb.com/?id.206168
|
||
|
CVE-2022-2774 - https://vuldb.com/?id.206170
|
||
|
CVE-2022-2775 - https://wpscan.com/vulnerability/7101ce04-670e-4ce0-9f60-e00494ff379d
|
||
|
CVE-2022-2776 - https://vuldb.com/?id.206172
|
||
|
CVE-2022-2777 - https://huntr.dev/bounties/13dd2f4d-0c7f-483e-a771-e1ed2ff1c36f
|
||
|
CVE-2022-27778 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-27782 - https://hackerone.com/reports/1555796
|
||
|
CVE-2022-27804 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1567
|
||
|
CVE-2022-27805 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1552
|
||
|
CVE-2022-27813 - https://tetraburst.com/
|
||
|
CVE-2022-27821 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27822 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27823 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27824 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27825 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27826 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27827 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27828 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27829 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27830 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27831 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27832 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27833 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27834 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27835 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27836 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=4
|
||
|
CVE-2022-27881 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html
|
||
|
CVE-2022-27882 - https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html
|
||
|
CVE-2022-27888 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-01.md
|
||
|
CVE-2022-27889 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-02.md
|
||
|
CVE-2022-27890 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md
|
||
|
CVE-2022-27895 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-06.md
|
||
|
CVE-2022-27896 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-08.md
|
||
|
CVE-2022-27907 - https://support.sonatype.com/hc/en-us/articles/5011047953555
|
||
|
CVE-2022-27925 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html
|
||
|
CVE-2022-27927 - http://packetstormsecurity.com/files/167017/Microfinance-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-27927 - https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
|
||
|
CVE-2022-27938 - https://github.com/saitoha/libsixel/issues/163
|
||
|
CVE-2022-27939 - https://github.com/appneta/tcpreplay/issues/717
|
||
|
CVE-2022-27940 - https://github.com/appneta/tcpreplay/issues/718
|
||
|
CVE-2022-27941 - https://github.com/appneta/tcpreplay/issues/716
|
||
|
CVE-2022-27942 - https://github.com/appneta/tcpreplay/issues/719
|
||
|
CVE-2022-27944 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-27946 - https://github.com/donothingme/VUL/blob/main/vul3/3.md
|
||
|
CVE-2022-27950 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11
|
||
|
CVE-2022-27958 - https://github.com/afeng2016-s/CVE-Request/blob/main/febs-security/febs.md
|
||
|
CVE-2022-2796 - https://huntr.dev/bounties/69d56ec3-8370-44cf-9732-4065e3076097
|
||
|
CVE-2022-27978 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220320-tooljet.md
|
||
|
CVE-2022-27979 - https://github.com/fourcube/security-advisories/blob/main/security-advisories/20220321-tooljet-xss.md
|
||
|
CVE-2022-2798 - https://wpscan.com/vulnerability/f169567d-c682-4abe-94df-a9d00be90edd
|
||
|
CVE-2022-27982 - https://www.adminxe.com/3651.html
|
||
|
CVE-2022-27983 - https://www.adminxe.com/3687.html
|
||
|
CVE-2022-27984 - https://github.com/CuppaCMS/CuppaCMS/issues/30
|
||
|
CVE-2022-27985 - https://github.com/CuppaCMS/CuppaCMS/issues/31
|
||
|
CVE-2022-2799 - https://wpscan.com/vulnerability/4385370e-cf99-4249-b2c1-90cbfa8378a4
|
||
|
CVE-2022-27991 - https://github.com/D4rkP0w4r/CVEs/blob/main/Online-Banking_SQLI/POC.md
|
||
|
CVE-2022-27992 - http://packetstormsecurity.com/files/166648/PHPGurukul-Zoo-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-27992 - https://github.com/D4rkP0w4r/CVEs/blob/main/Zoo%20Management%20System%20SQLI/POC.md
|
||
|
CVE-2022-28000 - http://packetstormsecurity.com/files/166657/Car-Rental-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-28000 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20SQLI/POC.md
|
||
|
CVE-2022-28001 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html
|
||
|
CVE-2022-28001 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20SQLI/POC.md
|
||
|
CVE-2022-28002 - http://packetstormsecurity.com/files/166658/Movie-Seat-Reservation-System-1.0-File-Disclosure-SQL-Injection.html
|
||
|
CVE-2022-28002 - https://github.com/D4rkP0w4r/CVEs/blob/main/Movie%20Seat%20Reservation%20System%20File%20Disclosure/POC.md
|
||
|
CVE-2022-28005 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
|
||
|
CVE-2022-28006 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/apsystem.zip
|
||
|
CVE-2022-2801 - https://vuldb.com/?id.206247
|
||
|
CVE-2022-28021 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/RCE-1.md
|
||
|
CVE-2022-28022 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-1.md
|
||
|
CVE-2022-28023 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/purchase-order-management-system/SQLi-2.md
|
||
|
CVE-2022-28024 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-1.md
|
||
|
CVE-2022-28025 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-2.md
|
||
|
CVE-2022-28026 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Student-Grading-System/SQLi-3.md
|
||
|
CVE-2022-28028 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-1.md
|
||
|
CVE-2022-28029 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-2.md
|
||
|
CVE-2022-28030 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-3.md
|
||
|
CVE-2022-2804 - https://vuldb.com/?id.206250
|
||
|
CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/blob/main/CVE-2022-28051/README.md
|
||
|
CVE-2022-28051 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28051
|
||
|
CVE-2022-28060 - https://github.com/JiuBanSec/CVE/blob/main/VictorCMS%20SQL.md
|
||
|
CVE-2022-28062 - https://github.com/D4rkP0w4r/CVEs/blob/main/Car%20Rental%20System%20Upload%20%2B%20RCE/POC.md
|
||
|
CVE-2022-28063 - https://github.com/D4rkP0w4r/CVEs/blob/main/Simple%20Bakery%20Shop%20Management%20System%20File%20Disclosure/POC.md
|
||
|
CVE-2022-28079 - http://packetstormsecurity.com/files/167131/College-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-28079 - https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated
|
||
|
CVE-2022-28080 - http://packetstormsecurity.com/files/167123/Royal-Event-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-28080 - https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated
|
||
|
CVE-2022-28080 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Royal%20Event.zip
|
||
|
CVE-2022-28085 - https://github.com/michaelrsweet/htmldoc/issues/480
|
||
|
CVE-2022-28099 - https://github.com/IbrahimEkimIsik/CVE-2022-28099/blob/main/SQL%20Injection%20For%20Poultry%20Farm%20Management%20system%201.0
|
||
|
CVE-2022-28099 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/Redcock-Farm.zip
|
||
|
CVE-2022-28102 - https://github.com/housamz/php-mysql-admin-panel-generator/issues/19
|
||
|
CVE-2022-28104 - https://packetstormsecurity.com/files/166430
|
||
|
CVE-2022-28108 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/
|
||
|
CVE-2022-28109 - https://www.gabriel.urdhr.fr/2022/02/07/selenium-standalone-server-csrf-dns-rebinding-rce/
|
||
|
CVE-2022-28110 - https://medium.com/@honeyakshat999/hotel-management-system-sql-injection-on-login-page-a1ca87a31176
|
||
|
CVE-2022-28117 - http://packetstormsecurity.com/files/167063/Navigate-CMS-2.9.4-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-28127 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1571
|
||
|
CVE-2022-28132 - https://www.exploit-db.com/exploits/50939
|
||
|
CVE-2022-2814 - https://vuldb.com/?id.206401
|
||
|
CVE-2022-2816 - https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58
|
||
|
CVE-2022-2817 - https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f
|
||
|
CVE-2022-28171 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html
|
||
|
CVE-2022-28171 - http://packetstormsecurity.com/files/173653/Hikvision-Hybrid-SAN-Ds-a71024-SQL-Injection.html
|
||
|
CVE-2022-28172 - http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html
|
||
|
CVE-2022-2818 - https://huntr.dev/bounties/ee27e5df-516b-4cf4-9f28-346d907b5491
|
||
|
CVE-2022-28181 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28182 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28183 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28184 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28185 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28186 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28187 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28188 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28189 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-2819 - https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59
|
||
|
CVE-2022-28190 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28191 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28192 - https://nvidia.custhelp.com/app/answers/detail/a_id/5353
|
||
|
CVE-2022-28193 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
||
|
CVE-2022-28194 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
||
|
CVE-2022-28195 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
||
|
CVE-2022-28196 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
||
|
CVE-2022-28197 - https://nvidia.custhelp.com/app/answers/detail/a_id/5343
|
||
|
CVE-2022-28199 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-mlx5-jbPCrqD8
|
||
|
CVE-2022-2820 - https://huntr.dev/bounties/df06b7d7-6077-43a5-bd81-3cc66f0d4d19
|
||
|
CVE-2022-2821 - https://huntr.dev/bounties/c216db15-fe2f-42a7-852a-6c47498cf069
|
||
|
CVE-2022-28213 - http://packetstormsecurity.com/files/167046/SAP-BusinessObjects-Intelligence-4.3-XML-Injection.html
|
||
|
CVE-2022-28213 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28216 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28217 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28219 - http://packetstormsecurity.com/files/167997/ManageEngine-ADAudit-Plus-Path-Traversal-XML-Injection.html
|
||
|
CVE-2022-28219 - https://www.horizon3.ai/red-team-blog-cve-2022-28219/
|
||
|
CVE-2022-28219 - https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html
|
||
|
CVE-2022-2823 - https://wpscan.com/vulnerability/c88c85b3-2830-4354-99fd-af6bce6bb4ef
|
||
|
CVE-2022-2824 - https://huntr.dev/bounties/1ccb2d1c-6881-4813-a5bc-1603d29b7141
|
||
|
CVE-2022-28282 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751609
|
||
|
CVE-2022-28286 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735265
|
||
|
CVE-2022-28287 - https://bugzilla.mozilla.org/show_bug.cgi?id=1741515
|
||
|
CVE-2022-2829 - https://huntr.dev/bounties/d6eaa453-9758-41b7-8c38-fd878d6aeab4
|
||
|
CVE-2022-28290 - https://cybersecurityworks.com/zerodays/cve-2022-28290-reflected-cross-site-scripting-in-welaunch.html
|
||
|
CVE-2022-28291 - https://cybersecurityworks.com/blog/zero-days/csw-expert-discovers-a-zero-day-vulnerability-in-tenables-nessus-scanner.html
|
||
|
CVE-2022-2831 - https://developer.blender.org/T99705
|
||
|
CVE-2022-2832 - https://developer.blender.org/D15463
|
||
|
CVE-2022-2832 - https://developer.blender.org/T99706
|
||
|
CVE-2022-28321 - http://download.opensuse.org/source/distribution/openSUSE-current/repo/oss/src/
|
||
|
CVE-2022-28328 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf
|
||
|
CVE-2022-28329 - https://cert-portal.siemens.com/productcert/pdf/ssa-392912.pdf
|
||
|
CVE-2022-2833 - https://developer.blender.org/T99711
|
||
|
CVE-2022-2834 - https://wpscan.com/vulnerability/468d5fc7-04c6-4354-b134-85ebb25b37ae
|
||
|
CVE-2022-28345 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-42.md
|
||
|
CVE-2022-28345 - https://github.com/zadewg/RIUS
|
||
|
CVE-2022-28345 - https://sick.codes/sick-2022-42
|
||
|
CVE-2022-28353 - http://packetstormsecurity.com/files/171403/MyBB-External-Redirect-Warning-1.3-Cross-Site-Scripting.html
|
||
|
CVE-2022-28354 - http://packetstormsecurity.com/files/171402/MyBB-Active-Threads-1.3.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-28356 - http://www.openwall.com/lists/oss-security/2022/04/06/1
|
||
|
CVE-2022-28356 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
|
||
|
CVE-2022-28363 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
|
||
|
CVE-2022-28363 - https://seclists.org/fulldisclosure/2022/Apr/1
|
||
|
CVE-2022-28364 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
|
||
|
CVE-2022-28364 - https://seclists.org/fulldisclosure/2022/Apr/1
|
||
|
CVE-2022-28365 - http://packetstormsecurity.com/files/166647/Reprise-License-Manager-14.2-Cross-Site-Scripting-Information-Disclosure.html
|
||
|
CVE-2022-28365 - https://seclists.org/fulldisclosure/2022/Apr/1
|
||
|
CVE-2022-28368 - http://packetstormsecurity.com/files/171738/Dompdf-1.2.1-Remote-Code-Execution.html
|
||
|
CVE-2022-28381 - http://packetstormsecurity.com/files/166573/ALLMediaServer-1.6-Buffer-Overflow.html
|
||
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167491/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-ECB-Issue.html
|
||
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html
|
||
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html
|
||
|
CVE-2022-28382 - http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html
|
||
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/18
|
||
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/22
|
||
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/24
|
||
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Jun/9
|
||
|
CVE-2022-28382 - http://seclists.org/fulldisclosure/2022/Oct/4
|
||
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt
|
||
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt
|
||
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt
|
||
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt
|
||
|
CVE-2022-28382 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt
|
||
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167482/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Missing-Control.html
|
||
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167508/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Missing-Trust.html
|
||
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167535/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Missing-Trust.html
|
||
|
CVE-2022-28383 - http://packetstormsecurity.com/files/167539/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Missing-Trust.html
|
||
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/10
|
||
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/12
|
||
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/19
|
||
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Jun/25
|
||
|
CVE-2022-28383 - http://seclists.org/fulldisclosure/2022/Oct/5
|
||
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-003.txt
|
||
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-007.txt
|
||
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-011.txt
|
||
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-016.txt
|
||
|
CVE-2022-28383 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-045.txt
|
||
|
CVE-2022-28384 - http://packetstormsecurity.com/files/167481/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Cryptography-Issue.html
|
||
|
CVE-2022-28384 - http://packetstormsecurity.com/files/167499/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html
|
||
|
CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/17
|
||
|
CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Jun/8
|
||
|
CVE-2022-28384 - http://seclists.org/fulldisclosure/2022/Oct/3
|
||
|
CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-001.txt
|
||
|
CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-005.txt
|
||
|
CVE-2022-28384 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-043.txt
|
||
|
CVE-2022-28385 - http://packetstormsecurity.com/files/167536/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Insufficient-Verification.html
|
||
|
CVE-2022-28385 - http://packetstormsecurity.com/files/167546/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Insufficient-Verification.html
|
||
|
CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/23
|
||
|
CVE-2022-28385 - http://seclists.org/fulldisclosure/2022/Jun/26
|
||
|
CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-013.txt
|
||
|
CVE-2022-28385 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-017.txt
|
||
|
CVE-2022-28386 - http://packetstormsecurity.com/files/167492/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-Passcode-Retry.html
|
||
|
CVE-2022-28386 - http://packetstormsecurity.com/files/167509/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Behavior-Violation.html
|
||
|
CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/11
|
||
|
CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Jun/20
|
||
|
CVE-2022-28386 - http://seclists.org/fulldisclosure/2022/Oct/6
|
||
|
CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-004.txt
|
||
|
CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-008.txt
|
||
|
CVE-2022-28386 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-046.txt
|
||
|
CVE-2022-28387 - http://packetstormsecurity.com/files/167527/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html
|
||
|
CVE-2022-28387 - http://packetstormsecurity.com/files/167531/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html
|
||
|
CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/13
|
||
|
CVE-2022-28387 - http://seclists.org/fulldisclosure/2022/Jun/21
|
||
|
CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-009.txt
|
||
|
CVE-2022-28387 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-014.txt
|
||
|
CVE-2022-2839 - https://wpscan.com/vulnerability/82e01f95-81c2-46d8-898e-07b3b8a3f8c9
|
||
|
CVE-2022-28397 - https://ghost.org/docs/security/#privilege-escalation-attacks
|
||
|
CVE-2022-2840 - http://packetstormsecurity.com/files/168652/WordPress-Zephyr-Project-Manager-3.2.42-SQL-Injection.html
|
||
|
CVE-2022-2840 - https://wpscan.com/vulnerability/13d8be88-c3b7-4d6e-9792-c98b801ba53c
|
||
|
CVE-2022-2841 - https://www.modzero.com/advisories/MZ-22-02-CrowdStrike-FalconSensor.txt
|
||
|
CVE-2022-2841 - https://www.modzero.com/modlog/archives/2022/08/22/ridiculous_vulnerability_disclosure_process_with_crowdstrike_falcon_sensor/index.html
|
||
|
CVE-2022-2841 - https://youtu.be/3If-Fqwx-4s
|
||
|
CVE-2022-28410 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-4.md
|
||
|
CVE-2022-28411 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/Simple-Real-Estate-Portal-System/SQLi-5.md
|
||
|
CVE-2022-28412 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-1.md
|
||
|
CVE-2022-28413 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/car-driving-school-management-system/SQLi-2.md
|
||
|
CVE-2022-2845 - https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445
|
||
|
CVE-2022-28452 - https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL
|
||
|
CVE-2022-28452 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-28452
|
||
|
CVE-2022-2846 - http://packetstormsecurity.com/files/171697/Calendar-Event-Multi-View-1.4.07-Cross-Site-Scripting.html
|
||
|
CVE-2022-2846 - https://wpscan.com/vulnerability/95f92062-08ce-478a-a2bc-6d026adf657c
|
||
|
CVE-2022-28463 - https://github.com/ImageMagick/ImageMagick/issues/4988
|
||
|
CVE-2022-28468 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Payroll-Management-System
|
||
|
CVE-2022-2847 - https://vuldb.com/?id.206489
|
||
|
CVE-2022-28471 - https://github.com/rockcarry/ffjpeg/issues/49
|
||
|
CVE-2022-28478 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28478
|
||
|
CVE-2022-28479 - https://github.com/looCiprian/Responsible-Vulnerability-Disclosure/tree/main/CVE-2022-28479
|
||
|
CVE-2022-28480 - https://packetstormsecurity.com/files/166465/ALLMediaServer-1.6-Remote-Buffer-Overflow.html
|
||
|
CVE-2022-28488 - https://github.com/marc-q/libwav/issues/29
|
||
|
CVE-2022-28488 - https://github.com/tin-z/Stuff_and_POCs/blob/main/poc_libwav/POC
|
||
|
CVE-2022-2849 - https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e
|
||
|
CVE-2022-28491 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md
|
||
|
CVE-2022-28492 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/8/8.md
|
||
|
CVE-2022-28494 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md
|
||
|
CVE-2022-28495 - https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md
|
||
|
CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png
|
||
|
CVE-2022-28506 - https://github.com/verf1sh/Poc/blob/master/giflib_poc
|
||
|
CVE-2022-28506 - https://sourceforge.net/p/giflib/bugs/159/
|
||
|
CVE-2022-28507 - https://youtu.be/Ra7tWMs5dkk
|
||
|
CVE-2022-2852 - http://packetstormsecurity.com/files/169457/Chrome-AccountSelectionBubbleView-OnAccountImageFetched-Heap-Use-After-Free.html
|
||
|
CVE-2022-28521 - https://github.com/zhendezuile/bug_report/blob/main/zcms%EF%BC%9Aphp%20file%20inclusion
|
||
|
CVE-2022-28522 - https://github.com/zhendezuile/bug_report/blob/main/zcms
|
||
|
CVE-2022-2853 - http://packetstormsecurity.com/files/169459/Chrome-offline_items_collection-OfflineContentAggregator-OnItemRemoved-Heap-Buffer-Overflow.html
|
||
|
CVE-2022-28530 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-28531 - https://packetstormsecurity.com/files/166481/Covid-19-Directory-On-Vaccination-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-28533 - https://packetstormsecurity.com/files/166539
|
||
|
CVE-2022-28560 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/Tenda%20AC9
|
||
|
CVE-2022-28561 - https://github.com/iot-firmeware/-Router-vulnerability/tree/main/AX12
|
||
|
CVE-2022-28571 - https://github.com/F0und-icu/TempName/tree/main/Dlink-882
|
||
|
CVE-2022-28571 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28572 - https://github.com/F0und-icu/TempName/tree/main/TendaAX18
|
||
|
CVE-2022-28573 - https://github.com/F0und-icu/TempName/tree/main/Dlink-823pro
|
||
|
CVE-2022-28573 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28575 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1
|
||
|
CVE-2022-28577 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/3
|
||
|
CVE-2022-28578 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2
|
||
|
CVE-2022-28579 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/4
|
||
|
CVE-2022-28580 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/5
|
||
|
CVE-2022-28581 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/9
|
||
|
CVE-2022-28582 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6
|
||
|
CVE-2022-28583 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7
|
||
|
CVE-2022-28584 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/8
|
||
|
CVE-2022-28586 - https://github.com/havok89/Hoosk/issues/63
|
||
|
CVE-2022-28589 - https://github.com/pixelimity/pixelimity/issues/23
|
||
|
CVE-2022-28598 - http://packetstormsecurity.com/files/171730/ERPNext-12.29-Cross-Site-Scripting.html
|
||
|
CVE-2022-28599 - https://github.com/daylightstudio/FUEL-CMS/issues/595
|
||
|
CVE-2022-28601 - https://github.com/FlaviuPopescu/CVE-2022-28601
|
||
|
CVE-2022-2862 - https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765
|
||
|
CVE-2022-2863 - http://packetstormsecurity.com/files/168616/WordPress-WPvivid-Backup-Path-Traversal.html
|
||
|
CVE-2022-2863 - https://wpscan.com/vulnerability/cb6a3304-2166-47a0-a011-4dcacaa133e5
|
||
|
CVE-2022-28637 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
||
|
CVE-2022-28638 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
||
|
CVE-2022-28639 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
||
|
CVE-2022-28640 - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04365en_us
|
||
|
CVE-2022-28664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509
|
||
|
CVE-2022-28665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1509
|
||
|
CVE-2022-28669 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28670 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28671 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28672 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28673 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28674 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28675 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28676 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28677 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28678 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28679 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28680 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28681 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28682 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28683 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-28689 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1521
|
||
|
CVE-2022-28703 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1532
|
||
|
CVE-2022-2871 - https://huntr.dev/bounties/61126c07-22ac-4961-a198-1aa33060b373
|
||
|
CVE-2022-28710 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1550
|
||
|
CVE-2022-28711 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1512
|
||
|
CVE-2022-28712 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1540
|
||
|
CVE-2022-2872 - https://huntr.dev/bounties/b966c74d-6f3f-49fe-b40a-eaf25e362c56
|
||
|
CVE-2022-2873 - https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/
|
||
|
CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/30
|
||
|
CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-28739 - http://seclists.org/fulldisclosure/2022/Oct/42
|
||
|
CVE-2022-2874 - https://huntr.dev/bounties/95f97dfe-247d-475d-9740-b7adc71f4c79
|
||
|
CVE-2022-2877 - https://wpscan.com/vulnerability/f1af4267-3a43-4b88-a8b9-c1d5b2aa9d68
|
||
|
CVE-2022-28770 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28771 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28772 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28773 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28774 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-28780 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28781 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28782 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28783 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28784 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28785 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28786 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28787 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28788 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=5
|
||
|
CVE-2022-28794 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-28795 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2022-28796 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
|
||
|
CVE-2022-28802 - https://www.zenity.io/blog/zapescape-vulnerability-disclosure/
|
||
|
CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00001.html
|
||
|
CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-02/msg00070.html
|
||
|
CVE-2022-28805 - https://lua-users.org/lists/lua-l/2022-04/msg00009.html
|
||
|
CVE-2022-28810 - http://packetstormsecurity.com/files/166816/ManageEngine-ADSelfService-Plus-Custom-Script-Execution.html
|
||
|
CVE-2022-28810 - https://www.rapid7.com/blog/post/2022/04/14/cve-2022-28810-manageengine-adselfservice-plus-authenticated-command-execution-fixed/
|
||
|
CVE-2022-2884 - http://packetstormsecurity.com/files/171628/GitLab-15.3-Remote-Code-Execution.html
|
||
|
CVE-2022-2884 - https://gitlab.com/gitlab-org/gitlab/-/issues/371098
|
||
|
CVE-2022-2885 - https://huntr.dev/bounties/edeed309-be07-4373-b15e-2d1eb415eb89
|
||
|
CVE-2022-2886 - https://vuldb.com/?id.206688
|
||
|
CVE-2022-28862 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-28862 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html
|
||
|
CVE-2022-28863 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-28864 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-28865 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-28866 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-28866 - https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html
|
||
|
CVE-2022-28867 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-2887 - https://wpscan.com/vulnerability/237541d5-c1a5-44f2-8e5f-82457b8f9497
|
||
|
CVE-2022-2888 - https://huntr.dev/bounties/d27d232b-2578-4b32-b3b4-74aabdadf629
|
||
|
CVE-2022-28888 - http://packetstormsecurity.com/files/167765/Spryker-Commerce-OS-Remote-Command-Execution.html
|
||
|
CVE-2022-28888 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html
|
||
|
CVE-2022-28888 - http://seclists.org/fulldisclosure/2022/Jul/4
|
||
|
CVE-2022-28888 - https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/
|
||
|
CVE-2022-2889 - https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa
|
||
|
CVE-2022-28893 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
|
||
|
CVE-2022-28895 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/1
|
||
|
CVE-2022-28895 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28896 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/2
|
||
|
CVE-2022-28896 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-2890 - https://huntr.dev/bounties/5d228a33-eda3-4cff-91da-7bc43e6636da
|
||
|
CVE-2022-28901 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-882/3
|
||
|
CVE-2022-28901 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28905 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/1
|
||
|
CVE-2022-28906 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/2
|
||
|
CVE-2022-28907 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/5
|
||
|
CVE-2022-28908 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/4
|
||
|
CVE-2022-28909 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/3
|
||
|
CVE-2022-28910 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/9
|
||
|
CVE-2022-28911 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/7
|
||
|
CVE-2022-28912 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/8
|
||
|
CVE-2022-28913 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/N600R/10
|
||
|
CVE-2022-28915 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/1
|
||
|
CVE-2022-28915 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28917 - https://github.com/NSSCYCTFER/SRC-CVE
|
||
|
CVE-2022-28921 - https://www.0xlanks.me/blog/cve-2022-28921-advisory/
|
||
|
CVE-2022-28924 - https://suumcuique.org/blog/posts/information-disclosure-vulnerability-universis
|
||
|
CVE-2022-28927 - https://gist.github.com/CwithW/01a726e5af709655d6ee0b2067cdae03
|
||
|
CVE-2022-28932 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28944 - https://github.com/gerr-re/cve-2022-28944/blob/main/cve-2022-28944_public-advisory.pdf
|
||
|
CVE-2022-28955 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28956 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-28958 - https://vulncheck.com/blog/moobot-uses-fake-vulnerability
|
||
|
CVE-2022-28959 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
|
||
|
CVE-2022-28960 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
|
||
|
CVE-2022-28961 - https://www.root-me.org/fr/Informations/Faiblesses-decouvertes/
|
||
|
CVE-2022-28962 - https://packetstormsecurity.com/files/166598/Online-Sports-Complex-Booking-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-28966 - https://github.com/wasm3/wasm3/issues/320
|
||
|
CVE-2022-28969 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetWifiGusetBasic
|
||
|
CVE-2022-28970 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/GetParentControlInfo/readme.md
|
||
|
CVE-2022-28971 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromSetIpMacBind/readme.md
|
||
|
CVE-2022-28972 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/form_fast_setting_wifi_set/readme.md
|
||
|
CVE-2022-28973 - https://github.com/d1tto/IoT-vuln/blob/main/Tenda/AX1806/fromAdvSetMacMtuWan/readme.md
|
||
|
CVE-2022-28975 - https://piotrryciak.com/posts/xss-infoblox/
|
||
|
CVE-2022-28979 - https://issues.liferay.com/browse/LPE-17381
|
||
|
CVE-2022-28986 - https://github.com/FlaviuPopescu/CVE-2022-28986
|
||
|
CVE-2022-28987 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/adselfservice-userenum.md
|
||
|
CVE-2022-28990 - https://github.com/wasm3/wasm3/issues/323
|
||
|
CVE-2022-28991 - https://packetstormsecurity.com/files/166590/Multi-Store-Inventory-Management-System-1.0-Information-Disclosure.html
|
||
|
CVE-2022-28992 - https://packetstormsecurity.com/files/166587/Online-Banquet-Booking-System-1.0-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-28993 - https://packetstormsecurity.com/files/166591/Multi-Store-Inventory-Management-System-1.0-Account-Takeover.html
|
||
|
CVE-2022-28994 - https://packetstormsecurity.com/files/166622/Small-HTTP-Server-3.06-Remote-Buffer-Overflow.html
|
||
|
CVE-2022-28997 - https://packetstormsecurity.com/files/166613/CSZCMS-1.3.0-SSRF-LFI-Remote-Code-Execution.html
|
||
|
CVE-2022-28998 - https://packetstormsecurity.com/files/166381/Xlight-FTP-3.9.3.2-Buffer-Overflow.html
|
||
|
CVE-2022-29002 - https://github.com/xuxueli/xxl-job/issues/2821
|
||
|
CVE-2022-29006 - https://www.exploit-db.com/exploits/50370
|
||
|
CVE-2022-29007 - https://www.exploit-db.com/exploits/50365
|
||
|
CVE-2022-29008 - https://www.exploit-db.com/exploits/50263
|
||
|
CVE-2022-29009 - https://www.exploit-db.com/exploits/50355
|
||
|
CVE-2022-2901 - https://huntr.dev/bounties/cf46e0a6-f1b5-4959-a952-be9e4bac03fe
|
||
|
CVE-2022-29013 - https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-Injection.html
|
||
|
CVE-2022-29013 - https://www.exploit-db.com/exploits/50865
|
||
|
CVE-2022-29014 - https://packetstormsecurity.com/files/166683/Razer-Sila-2.0.418-Local-File-Inclusion.html
|
||
|
CVE-2022-29014 - https://www.exploit-db.com/exploits/50864
|
||
|
CVE-2022-29017 - https://github.com/axiomatic-systems/Bento4/issues/691
|
||
|
CVE-2022-29021 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
|
||
|
CVE-2022-29022 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
|
||
|
CVE-2022-29023 - https://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities
|
||
|
CVE-2022-2903 - https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864
|
||
|
CVE-2022-29034 - http://packetstormsecurity.com/files/167554/SIEMENS-SINEMA-Remote-Connect-3.0.1.0-01.01.00.02-Cross-Site-Scripting.html
|
||
|
CVE-2022-29034 - http://seclists.org/fulldisclosure/2022/Jun/35
|
||
|
CVE-2022-29072 - http://packetstormsecurity.com/files/166763/7-Zip-21.07-Code-Execution-Privilege-Escalation.html
|
||
|
CVE-2022-29072 - https://github.com/kagancapar/CVE-2022-29072
|
||
|
CVE-2022-29072 - https://news.ycombinator.com/item?id=31070256
|
||
|
CVE-2022-29072 - https://www.youtube.com/watch?v=sT1cvbu7ZTA
|
||
|
CVE-2022-29078 - https://eslam.io/posts/ejs-server-side-template-injection-rce/
|
||
|
CVE-2022-29080 - https://github.com/barneycarroll/npm-dependency-versions/issues/6
|
||
|
CVE-2022-29081 - https://www.tenable.com/security/research/tra-2022-14
|
||
|
CVE-2022-2909 - https://vuldb.com/?id.206845
|
||
|
CVE-2022-2912 - https://wpscan.com/vulnerability/fd9853e8-b3ae-4a10-8389-8a4a11a8297c
|
||
|
CVE-2022-2913 - https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1
|
||
|
CVE-2022-29156 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.12
|
||
|
CVE-2022-29181 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-29181 - https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/
|
||
|
CVE-2022-2921 - https://huntr.dev/bounties/51b32a1c-946b-4390-a212-b6c4b6e4115c
|
||
|
CVE-2022-29217 - https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc
|
||
|
CVE-2022-29217 - https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24
|
||
|
CVE-2022-2922 - https://huntr.dev/bounties/74918f40-dc11-4218-abef-064eb71a0703
|
||
|
CVE-2022-29224 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-m4j9-86g3-8f49
|
||
|
CVE-2022-29225 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-75hv-2jjj-89hh
|
||
|
CVE-2022-29226 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh
|
||
|
CVE-2022-29227 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rm2p-qvf6-pvr6
|
||
|
CVE-2022-29228 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6
|
||
|
CVE-2022-2923 - https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2
|
||
|
CVE-2022-2924 - https://huntr.dev/bounties/f0f3aded-6e97-4cf2-980a-c90f2c6ca0e0
|
||
|
CVE-2022-2925 - https://huntr.dev/bounties/a3b4148f-165f-4583-abed-5568696d99dc
|
||
|
CVE-2022-2926 - https://wpscan.com/vulnerability/2a440e1a-a7e4-4106-839a-d93895e16785
|
||
|
CVE-2022-29269 - https://github.com/4LPH4-NL/CVEs
|
||
|
CVE-2022-29269 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
||
|
CVE-2022-2927 - https://huntr.dev/bounties/7fa956dd-f541-4dcd-987d-ba15caa6a886
|
||
|
CVE-2022-29270 - https://github.com/4LPH4-NL/CVEs
|
||
|
CVE-2022-29270 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
||
|
CVE-2022-29271 - https://github.com/4LPH4-NL/CVEs
|
||
|
CVE-2022-29271 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
||
|
CVE-2022-29272 - https://github.com/4LPH4-NL/CVEs
|
||
|
CVE-2022-29272 - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
|
||
|
CVE-2022-29287 - https://devnet.kentico.com/download/hotfixes
|
||
|
CVE-2022-29296 - http://packetstormsecurity.com/files/167341/Avantune-Genialcloud-ProJ-10-Cross-Site-Scripting.html
|
||
|
CVE-2022-29296 - https://dl.packetstormsecurity.net/2206-exploits/avantunegenialcloudproj10-xss.txt
|
||
|
CVE-2022-29298 - http://packetstormsecurity.com/files/167383/SolarView-Compact-6.00-Directory-Traversal.html
|
||
|
CVE-2022-2930 - https://huntr.dev/bounties/da6745e4-7bcc-4e9a-9e96-0709ec9f2477
|
||
|
CVE-2022-29303 - http://packetstormsecurity.com/files/167183/SolarView-Compact-6.0-Command-Injection.html
|
||
|
CVE-2022-29303 - https://drive.google.com/drive/folders/1tGr-WExbpfvhRg31XCoaZOFLWyt3r60g?usp=sharing
|
||
|
CVE-2022-29305 - https://github.com/helloxz/imgurl/issues/75
|
||
|
CVE-2022-29315 - https://the-it-wonders.blogspot.com/2022/04/csv-injection-in-acunetix-version.html
|
||
|
CVE-2022-2932 - https://huntr.dev/bounties/2-other-bustle/mobiledoc-kit
|
||
|
CVE-2022-29320 - https://www.exploit-db.com/exploits/50859
|
||
|
CVE-2022-29321 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/4
|
||
|
CVE-2022-29321 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29322 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/5
|
||
|
CVE-2022-29322 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29323 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/3
|
||
|
CVE-2022-29323 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29324 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/6
|
||
|
CVE-2022-29324 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29325 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/8
|
||
|
CVE-2022-29325 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29326 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/7
|
||
|
CVE-2022-29326 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29327 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dir-816/9
|
||
|
CVE-2022-29327 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29328 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/1
|
||
|
CVE-2022-29328 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29329 - https://github.com/EPhaha/IOT_vuln/tree/main/d-link/dap-1330/2
|
||
|
CVE-2022-29329 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29332 - https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf
|
||
|
CVE-2022-29333 - https://www.youtube.com/watch?v=r75k-ae3_ng
|
||
|
CVE-2022-29333 - https://youtu.be/B46wtd-ZNog
|
||
|
CVE-2022-29339 - https://github.com/gpac/gpac/issues/2165
|
||
|
CVE-2022-29340 - https://github.com/gpac/gpac/issues/2163
|
||
|
CVE-2022-29347 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2022-29347
|
||
|
CVE-2022-29349 - https://github.com/kekingcn/kkFileView/issues/347
|
||
|
CVE-2022-29351 - https://www.youtube.com/watch?v=F_DBx4psWns
|
||
|
CVE-2022-29358 - https://github.com/kevinboone/epub2txt2/issues/22
|
||
|
CVE-2022-29360 - https://blog.sonarsource.com/rainloop-emails-at-risk-due-to-code-flaw/
|
||
|
CVE-2022-29363 - https://github.com/qinggan/phpok/issues/12
|
||
|
CVE-2022-29368 - https://github.com/Moddable-OpenSource/moddable/issues/896
|
||
|
CVE-2022-29369 - https://github.com/nginx/njs/issues/467
|
||
|
CVE-2022-2938 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848
|
||
|
CVE-2022-29380 - https://www.exploit-db.com/exploits/49298
|
||
|
CVE-2022-29391 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/5.setStaticDhcpConfig
|
||
|
CVE-2022-29392 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/2.setPortForwardRules
|
||
|
CVE-2022-29393 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules
|
||
|
CVE-2022-29394 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/1.setWiFiAclAddConfig
|
||
|
CVE-2022-29395 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/6.setWiFiRepeaterConfig
|
||
|
CVE-2022-29396 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/8.setIpPortFilterRules
|
||
|
CVE-2022-29397 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/4.setMacFilterRules
|
||
|
CVE-2022-29398 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/7.UploadCustomModule
|
||
|
CVE-2022-29399 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/9.setUrlFilterRules
|
||
|
CVE-2022-2941 - http://packetstormsecurity.com/files/168479/WordPress-WP-UserOnline-2.88.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-2941 - https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt
|
||
|
CVE-2022-2943 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9
|
||
|
CVE-2022-2945 - https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9
|
||
|
CVE-2022-29455 - https://rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor
|
||
|
CVE-2022-29457 - http://packetstormsecurity.com/files/167051/ManageEngine-ADSelfService-Plus-Build-6118-NTLMv2-Hash-Exposure.html
|
||
|
CVE-2022-29458 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
|
||
|
CVE-2022-29458 - https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
|
||
|
CVE-2022-2946 - https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5
|
||
|
CVE-2022-29464 - http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html
|
||
|
CVE-2022-29464 - http://www.openwall.com/lists/oss-security/2022/04/22/7
|
||
|
CVE-2022-29464 - https://github.com/hakivvi/CVE-2022-29464
|
||
|
CVE-2022-29465 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1526
|
||
|
CVE-2022-29468 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1534
|
||
|
CVE-2022-2947 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
||
|
CVE-2022-29472 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1566
|
||
|
CVE-2022-29475 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1553
|
||
|
CVE-2022-29477 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1554
|
||
|
CVE-2022-29481 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1518
|
||
|
CVE-2022-2949 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
||
|
CVE-2022-29496 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1524
|
||
|
CVE-2022-2950 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
||
|
CVE-2022-29503 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1517
|
||
|
CVE-2022-2951 - https://www.cisa.gov/uscert/ics/advisories/icsa-22-284-01
|
||
|
CVE-2022-29511 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1530
|
||
|
CVE-2022-29517 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1529
|
||
|
CVE-2022-29520 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1561
|
||
|
CVE-2022-2953 - https://gitlab.com/libtiff/libtiff/-/issues/414
|
||
|
CVE-2022-29537 - https://github.com/gpac/gpac/issues/2173
|
||
|
CVE-2022-29538 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-29539 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-29540 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-29548 - http://packetstormsecurity.com/files/167587/WSO2-Management-Console-Cross-Site-Scripting.html
|
||
|
CVE-2022-29549 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html
|
||
|
CVE-2022-29549 - https://blog.qualys.com/vulnerabilities-threat-research
|
||
|
CVE-2022-29550 - http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html
|
||
|
CVE-2022-29550 - https://blog.qualys.com/vulnerabilities-threat-research
|
||
|
CVE-2022-29557 - https://github.com/Q2Flc2FySec/CVE-List/blob/main/CVE-2022-29557.txt
|
||
|
CVE-2022-29566 - https://blog.trailofbits.com/2022/04/13/part-1-coordinated-disclosure-of-vulnerabilities-affecting-girault-bulletproofs-and-plonk/
|
||
|
CVE-2022-29577 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-2958 - https://wpscan.com/vulnerability/8743534f-8ebd-496a-99bc-5052a8bac86a
|
||
|
CVE-2022-29581 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
||
|
CVE-2022-29581 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
|
||
|
CVE-2022-29581 - http://www.openwall.com/lists/oss-security/2022/05/18/2
|
||
|
CVE-2022-29581 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
|
||
|
CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/04/22/4
|
||
|
CVE-2022-29582 - http://www.openwall.com/lists/oss-security/2022/08/08/3
|
||
|
CVE-2022-29582 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.3
|
||
|
CVE-2022-29582 - https://www.openwall.com/lists/oss-security/2022/04/22/3
|
||
|
CVE-2022-29586 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/
|
||
|
CVE-2022-29587 - https://sec-consult.com/vulnerability-lab/advisory/sandbox-escape-with-root-access-clear-text-passwords-in-konica-minolta-bizhub-mfp-printer-terminals/
|
||
|
CVE-2022-29588 - http://packetstormsecurity.com/files/167166/Konica-Minolta-bizhub-MFP-Printer-Terminal-Sandbox-Escape.html
|
||
|
CVE-2022-2959 - https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a
|
||
|
CVE-2022-29592 - https://github.com/H4niz/Vulnerability/blob/main/Tenda-TX9-V22.03.02.10-19042022-3.md
|
||
|
CVE-2022-29593 - http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html
|
||
|
CVE-2022-29593 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/
|
||
|
CVE-2022-29593 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
||
|
CVE-2022-29596 - https://github.com/haxpunk1337/Microstrategy-Poc/blob/main/poc
|
||
|
CVE-2022-29597 - https://github.com/TheGetch/CVE-2022-29597
|
||
|
CVE-2022-29598 - https://github.com/TheGetch/CVE-2022-29598
|
||
|
CVE-2022-29603 - https://suumcuique.org/blog/posts/sql-injection-vulnerability-universis/
|
||
|
CVE-2022-29610 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29611 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29612 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29613 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29614 - http://packetstormsecurity.com/files/168409/SAP-SAPControl-Web-Service-Interface-Local-Privilege-Escalation.html
|
||
|
CVE-2022-29614 - http://seclists.org/fulldisclosure/2022/Sep/18
|
||
|
CVE-2022-29614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29619 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-29620 - https://whichbuffer.medium.com/filezilla-client-cleartext-storage-of-sensitive-information-in-memory-vulnerability-83958c1e1643
|
||
|
CVE-2022-29620 - https://youtu.be/ErZl1i7McHk
|
||
|
CVE-2022-29622 - https://medium.com/@zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022
|
||
|
CVE-2022-29622 - https://www.youtube.com/watch?v=C6QPKooxhAo
|
||
|
CVE-2022-29631 - https://github.com/oblac/jodd-http/issues/9
|
||
|
CVE-2022-29631 - https://github.com/oblac/jodd/issues/787
|
||
|
CVE-2022-29633 - https://github.com/awake1t/linglong
|
||
|
CVE-2022-29638 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/2.md
|
||
|
CVE-2022-29640 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/3.md
|
||
|
CVE-2022-29641 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/4.md
|
||
|
CVE-2022-29642 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/5.md
|
||
|
CVE-2022-29643 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/6.md
|
||
|
CVE-2022-29646 - https://github.com/shijin0925/IOT/blob/master/TOTOLINK%20A3100R/9.md
|
||
|
CVE-2022-2965 - https://huntr.dev/bounties/61e3bdf7-3548-45ea-b105-967abc0977f4
|
||
|
CVE-2022-29650 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Unauthenticated_Sql_Injection
|
||
|
CVE-2022-29651 - https://hackmd.io/@d4rkp0w4r/Online_Food_Ordering_System_Remote_Code_Execution
|
||
|
CVE-2022-29652 - https://packetstormsecurity.com/files/166641/Online-Sports-Complex-Booking-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-29654 - https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f
|
||
|
CVE-2022-29659 - https://packetstormsecurity.com/files/158391/responsiveonlineblog10poc-sql.txt
|
||
|
CVE-2022-29660 - https://github.com/chshcms/cscms/issues/25#issue-1207649017
|
||
|
CVE-2022-29661 - https://github.com/chshcms/cscms/issues/21#issue-1207638326
|
||
|
CVE-2022-29663 - https://github.com/chshcms/cscms/issues/22#issue-1207641519
|
||
|
CVE-2022-29664 - https://github.com/chshcms/cscms/issues/23#issue-1207644525
|
||
|
CVE-2022-29666 - https://github.com/chshcms/cscms/issues/24#issue-1207646618
|
||
|
CVE-2022-29667 - https://github.com/chshcms/cscms/issues/26#issue-1207651726
|
||
|
CVE-2022-29669 - https://github.com/chshcms/cscms/issues/20#issue-1207634969
|
||
|
CVE-2022-29670 - https://github.com/chshcms/cscms/issues/21#issue-1207638326
|
||
|
CVE-2022-29676 - https://github.com/chshcms/cscms/issues/24#issue-1207646618
|
||
|
CVE-2022-29680 - https://github.com/chshcms/cscms/issues/31#issue-1209052957
|
||
|
CVE-2022-29681 - https://github.com/chshcms/cscms/issues/35#issue-1209058818
|
||
|
CVE-2022-29682 - https://github.com/chshcms/cscms/issues/36#issue-1209060196
|
||
|
CVE-2022-29683 - https://github.com/chshcms/cscms/issues/34#issue-1209056912
|
||
|
CVE-2022-29684 - https://github.com/chshcms/cscms/issues/33#issue-1209055493
|
||
|
CVE-2022-29685 - https://github.com/chshcms/cscms/issues/32#issue-1209054307
|
||
|
CVE-2022-29686 - https://github.com/chshcms/cscms/issues/29#issue-1209046027
|
||
|
CVE-2022-29687 - https://github.com/chshcms/cscms/issues/30#issue-1209049714
|
||
|
CVE-2022-29688 - https://github.com/chshcms/cscms/issues/27#issue-1209040138
|
||
|
CVE-2022-29689 - https://github.com/chshcms/cscms/issues/28#issue-1209044410
|
||
|
CVE-2022-29692 - https://github.com/unicorn-engine/unicorn/issues/1578
|
||
|
CVE-2022-29693 - https://github.com/unicorn-engine/unicorn/issues/1586
|
||
|
CVE-2022-29694 - https://github.com/unicorn-engine/unicorn/issues/1588
|
||
|
CVE-2022-29695 - https://github.com/unicorn-engine/unicorn/issues/1595
|
||
|
CVE-2022-29704 - https://www.youtube.com/watch?v=ECTu2QVAl1c
|
||
|
CVE-2022-29709 - https://packetstormsecurity.com/files/167240/CLink-Office-2.0-SQL-Injection.html
|
||
|
CVE-2022-29721 - https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/2
|
||
|
CVE-2022-29727 - http://packetstormsecurity.com/files/167187/Survey-Sparrow-Enterprise-Survey-Software-2022-Cross-Site-Scripting.html
|
||
|
CVE-2022-29729 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php
|
||
|
CVE-2022-29730 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php
|
||
|
CVE-2022-29731 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5700.php
|
||
|
CVE-2022-29732 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5703.php
|
||
|
CVE-2022-29733 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5704.php
|
||
|
CVE-2022-29734 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5699.php
|
||
|
CVE-2022-29735 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5702.php
|
||
|
CVE-2022-2977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d8e7007dc7c4d7c8366739bbcd3f5e51dcd470f
|
||
|
CVE-2022-29770 - https://github.com/xuxueli/xxl-job/issues/2836
|
||
|
CVE-2022-29776 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29776
|
||
|
CVE-2022-29777 - https://github.com/moehw/poc_exploits/tree/master/CVE-2022-29777
|
||
|
CVE-2022-29778 - https://github.com/TyeYeah/DIR-890L-1.20-RCE
|
||
|
CVE-2022-29778 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-29779 - https://github.com/nginx/njs/issues/485
|
||
|
CVE-2022-29780 - https://github.com/nginx/njs/issues/486
|
||
|
CVE-2022-2980 - https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea
|
||
|
CVE-2022-29804 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
||
|
CVE-2022-29806 - http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html
|
||
|
CVE-2022-29806 - https://krastanoel.com/cve/2022-29806
|
||
|
CVE-2022-2981 - https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305
|
||
|
CVE-2022-2982 - https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be
|
||
|
CVE-2022-29824 - http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
|
||
|
CVE-2022-29824 - http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
|
||
|
CVE-2022-29824 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-29825 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29826 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29827 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29828 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29829 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-2983 - https://wpscan.com/vulnerability/e2af8c7f-9bd4-4902-8df8-72ffb414fdbf
|
||
|
CVE-2022-29830 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29831 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29832 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29833 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-015_en.pdf
|
||
|
CVE-2022-29835 - https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396
|
||
|
CVE-2022-29836 - https://www.westerndigital.com/support/product-security/wdc-22016-my-cloud-home-ibi-firmware-version-8-11-0-113
|
||
|
CVE-2022-29837 - https://www.westerndigital.com/support/product-security/wdc-22018-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-8-12-0-178
|
||
|
CVE-2022-29838 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124
|
||
|
CVE-2022-29839 - https://www.westerndigital.com/support/product-security/wdc-22019-my-cloud-firmware-version-5-25-124
|
||
|
CVE-2022-29840 - https://www.westerndigital.com/support/product-security
|
||
|
CVE-2022-29841 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119
|
||
|
CVE-2022-29842 - https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119
|
||
|
CVE-2022-29851 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html
|
||
|
CVE-2022-29854 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html
|
||
|
CVE-2022-29854 - http://seclists.org/fulldisclosure/2022/Jun/32
|
||
|
CVE-2022-29854 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021
|
||
|
CVE-2022-29855 - http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html
|
||
|
CVE-2022-29855 - http://seclists.org/fulldisclosure/2022/Jun/32
|
||
|
CVE-2022-29855 - https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021
|
||
|
CVE-2022-29856 - https://dolosgroup.io/blog
|
||
|
CVE-2022-29858 - https://huntr.dev/bounties/90e17d95-9f2f-44eb-9f26-49fa13a41d5a/
|
||
|
CVE-2022-29862 - https://opcfoundation.org/security/
|
||
|
CVE-2022-29863 - https://opcfoundation.org/security/
|
||
|
CVE-2022-29864 - https://opcfoundation.org/security/
|
||
|
CVE-2022-29865 - https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf
|
||
|
CVE-2022-29865 - https://opcfoundation.org/security/
|
||
|
CVE-2022-29866 - https://opcfoundation.org/security/
|
||
|
CVE-2022-2987 - https://wpscan.com/vulnerability/0d9638b9-bf8a-474f-992d-2618884d3f67
|
||
|
CVE-2022-29875 - https://www.siemens-healthineers.com/support-documentation/cybersecurity/shsa-455016
|
||
|
CVE-2022-29885 - http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
|
||
|
CVE-2022-29885 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-29886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1533
|
||
|
CVE-2022-29888 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1522
|
||
|
CVE-2022-29889 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1569
|
||
|
CVE-2022-2989 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
||
|
CVE-2022-29894 - https://github.com/strapi/strapi
|
||
|
CVE-2022-2990 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
||
|
CVE-2022-29909 - https://bugzilla.mozilla.org/show_bug.cgi?id=1755081
|
||
|
CVE-2022-29912 - https://bugzilla.mozilla.org/show_bug.cgi?id=1692655
|
||
|
CVE-2022-29914 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746448
|
||
|
CVE-2022-29915 - https://bugzilla.mozilla.org/show_bug.cgi?id=1751678
|
||
|
CVE-2022-29916 - https://bugzilla.mozilla.org/show_bug.cgi?id=1760674
|
||
|
CVE-2022-2992 - http://packetstormsecurity.com/files/171008/GitLab-GitHub-Repo-Import-Deserialization-Remote-Code-Execution.html
|
||
|
CVE-2022-29932 - https://github.com/Off3nS3c/CVE-2022-29932/blob/main/Proof-of-Concept.md
|
||
|
CVE-2022-29933 - http://packetstormsecurity.com/files/166989/Craft-CMS-3.7.36-Password-Reset-Poisoning-Attack.html
|
||
|
CVE-2022-29933 - https://sec-consult.com/vulnerability-lab/advisory/password-reset-poisoning-attack-craft-cms/
|
||
|
CVE-2022-29938 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r
|
||
|
CVE-2022-29939 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r
|
||
|
CVE-2022-29940 - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r
|
||
|
CVE-2022-29945 - https://www.theverge.com/2022/4/28/23046916/dji-aeroscope-signals-not-encrypted-drone-tracking
|
||
|
CVE-2022-29948 - http://packetstormsecurity.com/files/167550/Lepin-EP-KP001-KP001_V19-Authentication-Bypass.html
|
||
|
CVE-2022-29948 - http://seclists.org/fulldisclosure/2022/Jun/27
|
||
|
CVE-2022-29948 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-024.txt
|
||
|
CVE-2022-2995 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
||
|
CVE-2022-29950 - https://gist.github.com/Voidager88/73c2d512a72cceb0ef84dbf87a497d10
|
||
|
CVE-2022-29951 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29952 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29953 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29957 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29958 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29959 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29960 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29962 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29963 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29964 - https://www.forescout.com/blog/
|
||
|
CVE-2022-29965 - https://www.forescout.com/blog/
|
||
|
CVE-2022-2997 - https://huntr.dev/bounties/c09bf21b-50d2-49f0-8c92-49f6b3c358d8
|
||
|
CVE-2022-29971 - https://www.magnitude.com/products/data-connectivity
|
||
|
CVE-2022-29972 - https://www.magnitude.com/products/data-connectivity
|
||
|
CVE-2022-29975 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20CC%20endpoint
|
||
|
CVE-2022-29976 - https://github.com/haxpunk1337/MDaemon-/blob/main/MDaemon%20XSS%20at%20BCC%20endpoint
|
||
|
CVE-2022-29977 - https://github.com/saitoha/libsixel/issues/165
|
||
|
CVE-2022-29978 - https://github.com/saitoha/libsixel/issues/166
|
||
|
CVE-2022-3000 - https://huntr.dev/bounties/a060d3dd-6fdd-4958-82a9-364df1cb770c
|
||
|
CVE-2022-30003 - https://packetstormsecurity.com/files/168250/omps10-xss.txt
|
||
|
CVE-2022-30004 - https://packetstormsecurity.com/files/168249/Online-Market-Place-Site-1.0-SQL-Injection.html
|
||
|
CVE-2022-30014 - https://github.com/offsecin/bugsdisclose/blob/main/csrf
|
||
|
CVE-2022-3002 - https://huntr.dev/bounties/d213d7ea-fe92-40b2-a1f9-2ba32dec50f5
|
||
|
CVE-2022-30036 - https://parzival.sh/posts/Pwning-a-Lighting-Console-in-a-Few-Minutes/
|
||
|
CVE-2022-30037 - https://weltolk.github.io/p/xunruicms-v4.3.3-to-v4.5.1-backstage-code-injection-vulnerabilityfile-write-and-file-inclusion/
|
||
|
CVE-2022-3004 - https://huntr.dev/bounties/461e5f8f-17cf-4be4-9149-111d0bd92d14
|
||
|
CVE-2022-30040 - https://github.com/Le1a/CVE-2022-30040
|
||
|
CVE-2022-30040 - https://github.com/Le1a/Tenda-AX1803-Denial-of-service
|
||
|
CVE-2022-30045 - https://sourceforge.net/p/ezxml/bugs/29/
|
||
|
CVE-2022-3005 - https://huntr.dev/bounties/4b144433-a979-4c4e-a627-659838acc217
|
||
|
CVE-2022-30052 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/acetech/2022/Home-Clean-Service-System
|
||
|
CVE-2022-30053 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Toll-Tax-Management-System
|
||
|
CVE-2022-30054 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Covid-19-Travel-Pass-Management
|
||
|
CVE-2022-30055 - https://packetstormsecurity.com/files/166840/Prime95-30.7-Build-9-Buffer-Overflow.html
|
||
|
CVE-2022-30067 - https://gitlab.gnome.org/GNOME/gimp/-/issues/8120
|
||
|
CVE-2022-30075 - http://packetstormsecurity.com/files/167522/TP-Link-AX50-Remote-Code-Execution.html
|
||
|
CVE-2022-30075 - https://github.com/aaronsvk
|
||
|
CVE-2022-30075 - https://github.com/aaronsvk/CVE-2022-30075
|
||
|
CVE-2022-30075 - https://www.exploit-db.com/exploits/50962
|
||
|
CVE-2022-30076 - http://packetstormsecurity.com/files/171777/ENTAB-ERP-1.0-Information-Disclosure.html
|
||
|
CVE-2022-30078 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30078/CVE-2022-30078.md
|
||
|
CVE-2022-30079 - https://github.com/10TG/vulnerabilities/blob/main/Netgear/CVE-2022-30079/CVE-2022-30079.md
|
||
|
CVE-2022-3008 - https://github.com/syoyo/tinygltf/issues/368
|
||
|
CVE-2022-30105 - https://www.exploitee.rs/index.php/Belkin_N300#Remote_Root
|
||
|
CVE-2022-30111 - https://tiger-team-1337.blogspot.com/2022/05/rf-remote-mck-lock-predictable-rolling.html
|
||
|
CVE-2022-30111 - https://www.youtube.com/watch?v=EruaGuE-cWI
|
||
|
CVE-2022-30114 - https://str0ng4le.github.io/jekyll/update/2023/05/12/fastgate-bof-cve-2022-30114/
|
||
|
CVE-2022-3012 - https://vuldb.com/?id.207422
|
||
|
CVE-2022-30126 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-3013 - https://vuldb.com/?id.207423
|
||
|
CVE-2022-3014 - https://vuldb.com/?id.207424
|
||
|
CVE-2022-3015 - https://vuldb.com/?id.207425
|
||
|
CVE-2022-30150 - http://packetstormsecurity.com/files/167697/Windows-Defender-Remote-Credential-Guard-Authentication-Relay-Privilege-Escalation.html
|
||
|
CVE-2022-30155 - http://packetstormsecurity.com/files/167755/Windows-Kernel-nt-MiRelocateImage-Invalid-Read.html
|
||
|
CVE-2022-3016 - https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371
|
||
|
CVE-2022-30164 - http://packetstormsecurity.com/files/167716/Windows-Kerberos-KerbRetrieveEncodedTicketMessage-AppContainer-Privilege-Escalation.html
|
||
|
CVE-2022-30165 - http://packetstormsecurity.com/files/167711/Windows-Kerberos-Redirected-Logon-Buffer-Privilege-Escalation.html
|
||
|
CVE-2022-30166 - http://packetstormsecurity.com/files/167754/Windows-LSA-Service-LsapGetClientInfo-Impersonation-Level-Check-Privilege-Escalation.html
|
||
|
CVE-2022-30168 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30168
|
||
|
CVE-2022-3017 - https://huntr.dev/bounties/5250c4b1-132b-4da6-9bd6-db36cb56bea0
|
||
|
CVE-2022-30174 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-30174
|
||
|
CVE-2022-30190 - http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html
|
||
|
CVE-2022-3021 - https://wpscan.com/vulnerability/3c5ff229-85c2-49c2-8fb9-6419a8002a4e
|
||
|
CVE-2022-30239 - https://www.magnitude.com/products/data-connectivity
|
||
|
CVE-2022-3024 - https://wpscan.com/vulnerability/7f43cb8e-0c1b-4528-8c5c-b81ab42778dc
|
||
|
CVE-2022-30240 - https://www.magnitude.com/products/data-connectivity
|
||
|
CVE-2022-30242 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
||
|
CVE-2022-30242 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2022-30243 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
||
|
CVE-2022-30243 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2022-30244 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
||
|
CVE-2022-30244 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2022-30245 - https://github.com/scadafence/Honeywell-Alerton-Vulnerabilities
|
||
|
CVE-2022-30245 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2022-3025 - https://wpscan.com/vulnerability/66bc783b-67e1-4bd0-99c0-322873b3a22a
|
||
|
CVE-2022-30262 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30264 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30269 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30270 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30271 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30272 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30273 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30274 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30275 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30276 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30280 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-30284 - https://www.swascan.com/security-advisory-libnmap-2/
|
||
|
CVE-2022-30286 - http://packetstormsecurity.com/files/167069/PyScript-2022-05-04-Alpha-Source-Code-Disclosure.html
|
||
|
CVE-2022-30286 - https://cyber-guy.gitbook.io/cyber-guy/pocs/pyscript-file-read
|
||
|
CVE-2022-30286 - https://www.exploit-db.com/exploits/50918
|
||
|
CVE-2022-30292 - https://github.com/sprushed/CVE-2022-30292
|
||
|
CVE-2022-30293 - https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.36.0
|
||
|
CVE-2022-3030 - https://gitlab.com/gitlab-org/gitlab/-/issues/37959
|
||
|
CVE-2022-30312 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30313 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30314 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30315 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30316 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30317 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30318 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30319 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30320 - https://www.forescout.com/blog/
|
||
|
CVE-2022-30325 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
||
|
CVE-2022-30325 - https://research.nccgroup.com/?research=Technical+advisories
|
||
|
CVE-2022-30326 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
||
|
CVE-2022-30326 - https://research.nccgroup.com/?research=Technical+advisories
|
||
|
CVE-2022-30327 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
||
|
CVE-2022-30327 - https://research.nccgroup.com/?research=Technical+advisories
|
||
|
CVE-2022-30328 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
||
|
CVE-2022-30328 - https://research.nccgroup.com/?research=Technical+advisories
|
||
|
CVE-2022-30329 - https://research.nccgroup.com/2022/06/10/technical-advisory-multiple-vulnerabilities-in-trendnet-tew-831dr-wifi-router-cve-2022-30325-cve-2022-30326-cve-2022-30327-cve-2022-30328-cve-2022-30329/
|
||
|
CVE-2022-30329 - https://research.nccgroup.com/?research=Technical+advisories
|
||
|
CVE-2022-30330 - https://blog.inhq.net/posts/keepkey-CVE-2022-30330/
|
||
|
CVE-2022-30333 - http://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html
|
||
|
CVE-2022-30333 - https://blog.sonarsource.com/zimbra-pre-auth-rce-via-unrar-0day/
|
||
|
CVE-2022-30335 - https://gist.github.com/aliceicl/b2f25f3a0a3ba9973e4977f922d04008
|
||
|
CVE-2022-3035 - https://huntr.dev/bounties/0bbb1046-ea9e-4cb9-bc91-b294a72d1902
|
||
|
CVE-2022-30352 - https://www.exploit-db.com/exploits/50071
|
||
|
CVE-2022-3036 - https://wpscan.com/vulnerability/0dbc85dd-736c-492e-9db8-acb7195771aa
|
||
|
CVE-2022-3037 - https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5
|
||
|
CVE-2022-3038 - http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html
|
||
|
CVE-2022-30422 - https://www.swascan.com/it/security-advisory-proietti-planet-time-enterprise-cve-2022-30422/
|
||
|
CVE-2022-30425 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5706.php
|
||
|
CVE-2022-30426 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-30426/CVE-2022-30426.md
|
||
|
CVE-2022-30427 - https://github.com/gphper/ginadmin/issues/8
|
||
|
CVE-2022-30428 - https://github.com/gphper/ginadmin/issues/9
|
||
|
CVE-2022-30466 - https://github.com/nsbogam/ebike
|
||
|
CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer
|
||
|
CVE-2022-30467 - https://github.com/nsbogam/ebike-jammer/blob/main/README.md
|
||
|
CVE-2022-30469 - https://github.com/blockomat2100/PoCs/blob/main/filerun/CVE-2022-30469.md
|
||
|
CVE-2022-30472 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/1
|
||
|
CVE-2022-30473 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/2
|
||
|
CVE-2022-30474 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/5
|
||
|
CVE-2022-30475 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/3
|
||
|
CVE-2022-30476 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/6
|
||
|
CVE-2022-30477 - https://github.com/lcyfrank/VulnRepo/tree/master/IoT/Tenda/4
|
||
|
CVE-2022-30490 - https://github.com/yasinyildiz26/Badminton-Center-Management-System
|
||
|
CVE-2022-30503 - https://github.com/nginx/njs/issues/478
|
||
|
CVE-2022-30508 - https://github.com/1security/Vulnerability/blob/master/web/dedecms/1.md
|
||
|
CVE-2022-30515 - https://codingkoala.eu/posts/CVE202230515/
|
||
|
CVE-2022-30518 - https://packetstormsecurity.com/files/166984/ChatBot-Application-With-A-Suggestion-Feature-1.0-SQL-Injection.html
|
||
|
CVE-2022-30519 - http://packetstormsecurity.com/files/171627/Reprise-Software-RLM-14.2BL4-Cross-Site-Scripting.html
|
||
|
CVE-2022-30519 - https://github.com/earth2sky/Disclosed/blob/main/CVE-2022-30519
|
||
|
CVE-2022-30521 - https://github.com/winmt/CVE/blob/main/DIR-890L/README.md
|
||
|
CVE-2022-30521 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-30524 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42261
|
||
|
CVE-2022-30525 - http://packetstormsecurity.com/files/167176/Zyxel-Remote-Command-Execution.html
|
||
|
CVE-2022-30525 - http://packetstormsecurity.com/files/167182/Zyxel-Firewall-ZTP-Unauthenticated-Command-Injection.html
|
||
|
CVE-2022-30525 - http://packetstormsecurity.com/files/167372/Zyxel-USG-FLEX-5.21-Command-Injection.html
|
||
|
CVE-2022-30525 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html
|
||
|
CVE-2022-30526 - http://packetstormsecurity.com/files/168202/Zyxel-Firewall-SUID-Binary-Privilege-Escalation.html
|
||
|
CVE-2022-30534 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1546
|
||
|
CVE-2022-30541 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1557
|
||
|
CVE-2022-30543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1519
|
||
|
CVE-2022-30547 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1547
|
||
|
CVE-2022-30551 - https://opcfoundation.org
|
||
|
CVE-2022-30552 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
|
||
|
CVE-2022-30557 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-30580 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
||
|
CVE-2022-30584 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341
|
||
|
CVE-2022-30585 - https://www.archerirm.community/t5/security-advisories/archer-update-for-multiple-vulnerabilities/ta-p/677341
|
||
|
CVE-2022-30594 - http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
|
||
|
CVE-2022-30594 - http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html
|
||
|
CVE-2022-30594 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
|
||
|
CVE-2022-3060 - https://gitlab.com/gitlab-org/gitlab/-/issues/365427
|
||
|
CVE-2022-30603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1562
|
||
|
CVE-2022-30605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1535
|
||
|
CVE-2022-30607 - https://www.ibm.com/support/pages/node/6595759
|
||
|
CVE-2022-3062 - https://wpscan.com/vulnerability/2e829bbe-1843-496d-a852-4150fa6d1f7a
|
||
|
CVE-2022-30629 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
||
|
CVE-2022-30634 - https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
|
||
|
CVE-2022-3065 - https://huntr.dev/bounties/5f3bc4b6-1d53-46b7-a23d-70f5faaf0c76
|
||
|
CVE-2022-3068 - https://huntr.dev/bounties/f45c24cb-9104-4c6e-a9e1-5c7e75e83884
|
||
|
CVE-2022-30688 - https://github.com/liske/needrestart/releases/tag/v3.6
|
||
|
CVE-2022-3069 - https://wpscan.com/vulnerability/a9918dfd-389c-43eb-afcc-03d29b42b369
|
||
|
CVE-2022-30690 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1539
|
||
|
CVE-2022-3070 - https://wpscan.com/vulnerability/cd8d71d1-030e-4ad4-866e-75d242883c6c
|
||
|
CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin
|
||
|
CVE-2022-30708 - https://github.com/esp0xdeadbeef/rce_webmin/blob/main/exploit.py
|
||
|
CVE-2022-30708 - https://github.com/webmin/webmin/issues/1635
|
||
|
CVE-2022-30709 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30710 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30711 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30712 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30713 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30714 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30715 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30716 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30717 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30719 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-3072 - https://huntr.dev/bounties/9755ae6a-b08b-40a0-8089-c723b2d9ca52
|
||
|
CVE-2022-30720 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30721 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30722 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30723 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30724 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30725 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30726 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30727 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30728 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-30729 - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=6
|
||
|
CVE-2022-3074 - https://wpscan.com/vulnerability/90ebaedc-89df-413f-b22e-753d4dd5e1c3
|
||
|
CVE-2022-30759 - https://packetstormsecurity.com/files/171971/Nokia-OneNDS-20.9-Insecure-Permissions-Privilege-Escalation.html
|
||
|
CVE-2022-3076 - https://wpscan.com/vulnerability/d18e695b-4d6e-4ff6-a060-312594a0d2bd
|
||
|
CVE-2022-30763 - https://blog.convisoappsec.com/en/bug-hunting-in-the-janet-language-interpreter/
|
||
|
CVE-2022-30768 - https://medium.com/@dk50u1/stored-xss-in-zoneminder-up-to-v1-36-12-f26b4bb68c31
|
||
|
CVE-2022-30769 - https://medium.com/@dk50u1/session-fixation-in-zoneminder-up-to-v1-36-12-3c850b1fbbf3
|
||
|
CVE-2022-30775 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264
|
||
|
CVE-2022-30776 - https://medium.com/@bhattronit96/cve-2022-30776-cd34f977c2b9
|
||
|
CVE-2022-30777 - https://medium.com/@bhattronit96/cve-2022-30777-45725763ab59
|
||
|
CVE-2022-30778 - https://github.com/1nhann/vulns/issues/1
|
||
|
CVE-2022-30779 - https://github.com/1nhann/vulns/issues/2
|
||
|
CVE-2022-3078 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e6a21a14106d9718aa4f8e115b1e474888eeba44
|
||
|
CVE-2022-30780 - https://podalirius.net/en/cves/2022-30780/
|
||
|
CVE-2022-30781 - http://packetstormsecurity.com/files/168400/Gitea-1.16.6-Remote-Code-Execution.html
|
||
|
CVE-2022-30781 - http://packetstormsecurity.com/files/169928/Gitea-Git-Fetch-Remote-Code-Execution.html
|
||
|
CVE-2022-30783 - http://www.openwall.com/lists/oss-security/2022/06/07/4
|
||
|
CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30783 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
|
||
|
CVE-2022-30784 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30785 - http://www.openwall.com/lists/oss-security/2022/06/07/4
|
||
|
CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30785 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
|
||
|
CVE-2022-30786 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30787 - http://www.openwall.com/lists/oss-security/2022/06/07/4
|
||
|
CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30787 - https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
|
||
|
CVE-2022-30788 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30789 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-30790 - https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
|
||
|
CVE-2022-3082 - https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f
|
||
|
CVE-2022-30852 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
||
|
CVE-2022-30858 - https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md
|
||
|
CVE-2022-30858 - https://github.com/miniupnp/ngiflib/issues/22
|
||
|
CVE-2022-30860 - https://github.com/fudforum/FUDforum/issues/23
|
||
|
CVE-2022-30861 - https://github.com/fudforum/FUDforum/issues/24
|
||
|
CVE-2022-30863 - https://github.com/fudforum/FUDforum/issues/24
|
||
|
CVE-2022-30874 - https://blog.stmcyber.com/vulns/cve-2022-30874/
|
||
|
CVE-2022-30874 - https://whitehub.net/submissions/2968
|
||
|
CVE-2022-30886 - https://packetstormsecurity.com/files/167001/School-Dormitory-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-30887 - https://packetstormsecurity.com/files/166786/Pharmacy-Management-System-1.0-Shell-Upload.html
|
||
|
CVE-2022-30898 - https://github.com/chshcms/cscms/issues/37
|
||
|
CVE-2022-30903 - https://medium.com/@shubhamvpandey/xss-found-in-nokia-g-2425g-a-home-wifi-router-f4fae083ed97
|
||
|
CVE-2022-30903 - https://youtu.be/CxBo_gQffOY
|
||
|
CVE-2022-30909 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/3
|
||
|
CVE-2022-30910 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/1
|
||
|
CVE-2022-30912 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/4
|
||
|
CVE-2022-30913 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/7
|
||
|
CVE-2022-30914 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/5
|
||
|
CVE-2022-30915 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/6
|
||
|
CVE-2022-30916 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/9
|
||
|
CVE-2022-30917 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/10
|
||
|
CVE-2022-30918 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/8
|
||
|
CVE-2022-30919 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/13
|
||
|
CVE-2022-30920 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/12
|
||
|
CVE-2022-30921 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/14
|
||
|
CVE-2022-30922 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/11
|
||
|
CVE-2022-30923 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/16
|
||
|
CVE-2022-30924 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/15
|
||
|
CVE-2022-30925 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/17
|
||
|
CVE-2022-30926 - https://github.com/EPhaha/IOT_vuln/tree/main/H3C/magicR100/18
|
||
|
CVE-2022-30927 - https://github.com/ykosan1/Simple-Task-Scheduling-System-id-SQL-Injection-Unauthenticated
|
||
|
CVE-2022-30927 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tss.zip
|
||
|
CVE-2022-30929 - https://github.com/AgainstTheLight/CVE-2022-30929
|
||
|
CVE-2022-30930 - https://medium.com/@pmmali/my-second-cve-2022-30930-4f9aab047518
|
||
|
CVE-2022-30931 - https://medium.com/@niteshbiwal2011/my-first-cve-2022-30931-e70b9cbecbba
|
||
|
CVE-2022-3096 - https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d
|
||
|
CVE-2022-3097 - https://wpscan.com/vulnerability/9ebb8318-ebaf-4de7-b337-c91327685a43
|
||
|
CVE-2022-30974 - https://github.com/ccxvii/mujs/issues/162
|
||
|
CVE-2022-30975 - https://github.com/ccxvii/mujs/issues/161
|
||
|
CVE-2022-30976 - https://github.com/gpac/gpac/issues/2179
|
||
|
CVE-2022-3098 - https://wpscan.com/vulnerability/f4fcf41b-c05d-4236-8e67-a52d0f94c80a
|
||
|
CVE-2022-30981 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/
|
||
|
CVE-2022-30982 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilies-in-gentics-cms/
|
||
|
CVE-2022-3099 - https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e
|
||
|
CVE-2022-3104 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2
|
||
|
CVE-2022-3105 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531
|
||
|
CVE-2022-31056 - http://packetstormsecurity.com/files/171656/GLPI-10.0.2-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2022-3106 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9
|
||
|
CVE-2022-31062 - http://packetstormsecurity.com/files/171654/GLPI-Glpiinventory-1.0.1-Local-File-Inclusion.html
|
||
|
CVE-2022-31064 - http://packetstormsecurity.com/files/167682/BigBlueButton-2.3-2.4.7-Cross-Site-Scripting.html
|
||
|
CVE-2022-31064 - http://seclists.org/fulldisclosure/2022/Jun/52
|
||
|
CVE-2022-3107 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
|
||
|
CVE-2022-3108 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
|
||
|
CVE-2022-3110 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95
|
||
|
CVE-2022-31101 - http://packetstormsecurity.com/files/168003/Prestashop-Blockwishlist-2.1.0-SQL-Injection.html
|
||
|
CVE-2022-31108 - https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf
|
||
|
CVE-2022-3111 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078
|
||
|
CVE-2022-31110 - https://github.com/DIYgod/RSSHub/issues/10045
|
||
|
CVE-2022-3112 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99
|
||
|
CVE-2022-31125 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html
|
||
|
CVE-2022-31129 - https://huntr.dev/bounties/f0952b67-f2ff-44a9-a9cd-99e0a87cb633/
|
||
|
CVE-2022-3113 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0
|
||
|
CVE-2022-31133 - https://huntr.dev/bounties/89d996a2-de30-4261-8e3f-98e54cb25f76
|
||
|
CVE-2022-31137 - http://packetstormsecurity.com/files/167805/Roxy-WI-Remote-Command-Execution.html
|
||
|
CVE-2022-31137 - http://packetstormsecurity.com/files/171648/Roxy-WI-6.1.0.0-Improper-Authentication-Control.html
|
||
|
CVE-2022-31137 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html
|
||
|
CVE-2022-31137 - http://packetstormsecurity.com/files/172547/Roxy-WI-6.1.0.0-Remote-Command-Execution.html
|
||
|
CVE-2022-31138 - https://github.com/ly1g3/Mailcow-CVE-2022-31138
|
||
|
CVE-2022-3114 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037
|
||
|
CVE-2022-3115 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33
|
||
|
CVE-2022-31160 - https://www.drupal.org/sa-contrib-2022-052
|
||
|
CVE-2022-31161 - http://packetstormsecurity.com/files/171652/Roxy-WI-6.1.1.0-Remote-Code-Execution.html
|
||
|
CVE-2022-31173 - https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j
|
||
|
CVE-2022-3118 - https://vuldb.com/?id.207845
|
||
|
CVE-2022-31188 - http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-3119 - https://wpscan.com/vulnerability/55b83cee-a8a5-4f9d-a976-a3eed9a558e5
|
||
|
CVE-2022-3120 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpms.md
|
||
|
CVE-2022-3120 - https://vuldb.com/?id.207847
|
||
|
CVE-2022-31201 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/
|
||
|
CVE-2022-31202 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-softguard-network-management-extension-snmp/
|
||
|
CVE-2022-31204 - https://www.forescout.com/blog/
|
||
|
CVE-2022-31205 - https://www.forescout.com/blog/
|
||
|
CVE-2022-31206 - https://www.forescout.com/blog/
|
||
|
CVE-2022-31207 - https://www.forescout.com/blog/
|
||
|
CVE-2022-31208 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
||
|
CVE-2022-31209 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
||
|
CVE-2022-3121 - https://vuldb.com/?id.207853
|
||
|
CVE-2022-31210 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
||
|
CVE-2022-31211 - https://sec-consult.com/vulnerability-lab/advisory/infiray-iray-thermal-camera-multiple-vulnerabilities/
|
||
|
CVE-2022-31212 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
|
||
|
CVE-2022-31213 - https://sec-consult.com/vulnerability-lab/advisory/memory-corruption-vulnerabilities-dbus-broker/
|
||
|
CVE-2022-31214 - https://www.openwall.com/lists/oss-security/2022/06/08/10
|
||
|
CVE-2022-3122 - https://github.com/joinia/webray.com.cn/blob/main/Clinic's-Patient-Management-System/cpmssql.md
|
||
|
CVE-2022-3122 - https://vuldb.com/?id.207854
|
||
|
CVE-2022-3123 - https://huntr.dev/bounties/d72a979b-57db-4201-9500-66b49a5c1345
|
||
|
CVE-2022-31237 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
||
|
CVE-2022-31239 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
||
|
CVE-2022-3124 - https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608
|
||
|
CVE-2022-31244 - https://packetstormsecurity.com/files/171970/Nokia-OneNDS-17-Insecure-Permissions-Privilege-Escalation.html
|
||
|
CVE-2022-31245 - https://github.com/ly1g3/Mailcow-CVE-2022-31245
|
||
|
CVE-2022-3125 - https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e
|
||
|
CVE-2022-31250 - https://bugzilla.suse.com/show_bug.cgi?id=1200885
|
||
|
CVE-2022-31251 - https://bugzilla.suse.com/show_bug.cgi?id=1201674
|
||
|
CVE-2022-31254 - https://bugzilla.suse.com/show_bug.cgi?id=1204285
|
||
|
CVE-2022-3126 - https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8
|
||
|
CVE-2022-31262 - https://github.com/secure-77/CVE-2022-31262
|
||
|
CVE-2022-31262 - https://secure77.de/category/subjects/researches/
|
||
|
CVE-2022-31262 - https://secure77.de/gog-galaxy-cve-2022-31262/
|
||
|
CVE-2022-31262 - https://www.youtube.com/watch?v=Bgdbx5TJShI
|
||
|
CVE-2022-31264 - https://github.com/Ainevsia/CVE-Request/tree/main/Solana/1
|
||
|
CVE-2022-31266 - https://medium.com/@bcksec/in-ilias-through-7-10-620c0de685ee
|
||
|
CVE-2022-31268 - https://github.com/metaStor/Vuls/blob/main/gitblit/gitblit%20V1.9.3%20path%20traversal/gitblit%20V1.9.3%20path%20traversal.md
|
||
|
CVE-2022-31269 - http://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html
|
||
|
CVE-2022-31269 - https://eg.linkedin.com/in/omar-1-hashem
|
||
|
CVE-2022-31269 - https://gist.github.com/omarhashem123/71ec9223e90ea76a76096d777d9b945c
|
||
|
CVE-2022-3127 - https://huntr.dev/bounties/6cea89d1-39dc-4023-82fa-821f566b841a
|
||
|
CVE-2022-3128 - https://wpscan.com/vulnerability/97201998-1859-4428-9b81-9c2748806cf4
|
||
|
CVE-2022-31282 - https://github.com/axiomatic-systems/Bento4/issues/708
|
||
|
CVE-2022-31285 - https://github.com/axiomatic-systems/Bento4/issues/702
|
||
|
CVE-2022-31287 - https://github.com/axiomatic-systems/Bento4/issues/703
|
||
|
CVE-2022-3129 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/arbitrary_file_upload.md
|
||
|
CVE-2022-3129 - https://vuldb.com/?id.207872
|
||
|
CVE-2022-31290 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
||
|
CVE-2022-3130 - https://github.com/KingBridgeSS/Online_Driving_School_Project_In_PHP_With_Source_Code_Vulnerabilities/blob/main/sql_injection.md
|
||
|
CVE-2022-3130 - https://vuldb.com/?id.207873
|
||
|
CVE-2022-31306 - https://github.com/nginx/njs/issues/481
|
||
|
CVE-2022-31307 - https://github.com/nginx/njs/issues/482
|
||
|
CVE-2022-31308 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200.md
|
||
|
CVE-2022-31309 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md
|
||
|
CVE-2022-3131 - https://wpscan.com/vulnerability/b6c62e53-ae49-4fe0-aed9-0c493fc4442d
|
||
|
CVE-2022-31311 - https://github.com/pghuanghui/CVE_Request/blob/main/AERIAL%20X%201200_Command%20Execution%20Vulnerability.md
|
||
|
CVE-2022-3132 - https://wpscan.com/vulnerability/ed2dc1b9-f9f9-4e99-87b3-a614c223dd64
|
||
|
CVE-2022-31322 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
||
|
CVE-2022-31324 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
||
|
CVE-2022-31325 - http://packetstormsecurity.com/files/167483/ChurchCRM-4.4.5-SQL-Injection.html
|
||
|
CVE-2022-31325 - https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-31325
|
||
|
CVE-2022-31325 - https://www.nu11secur1ty.com/2022/06/cve-2022-31325.htm
|
||
|
CVE-2022-3133 - https://huntr.dev/bounties/2d93052f-efc6-4647-9a6d-8b08dc251223
|
||
|
CVE-2022-3134 - https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc
|
||
|
CVE-2022-3135 - https://wpscan.com/vulnerability/3505481d-141a-4516-bdbb-d4dad4e1eb01
|
||
|
CVE-2022-31358 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/
|
||
|
CVE-2022-3136 - https://wpscan.com/vulnerability/913d7e78-23f6-4b0d-aca3-17051a2dc649
|
||
|
CVE-2022-31361 - https://www.swascan.com/security-advisory-docebo-community-edition/
|
||
|
CVE-2022-31362 - https://www.swascan.com/security-advisory-docebo-community-edition/
|
||
|
CVE-2022-31366 - https://erpaciocco.github.io/2022/eve-ng-rce/
|
||
|
CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v3.6.10
|
||
|
CVE-2022-31367 - https://github.com/strapi/strapi/releases/tag/v4.1.10
|
||
|
CVE-2022-3137 - https://wpscan.com/vulnerability/524928d6-d4e9-4a2f-b410-46958da549d8
|
||
|
CVE-2022-31373 - https://github.com/badboycxcc/SolarView_Compact_6.0_xss
|
||
|
CVE-2022-3138 - https://huntr.dev/bounties/1816a207-6abf-408c-b19a-e497e24172b3
|
||
|
CVE-2022-31382 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31382.txt
|
||
|
CVE-2022-31383 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31383.txt
|
||
|
CVE-2022-31384 - https://github.com/laotun-s/POC/blob/main/CVE-2022-31384.txt
|
||
|
CVE-2022-31386 - https://github.com/Fanli2012/nbnbk/issues/5
|
||
|
CVE-2022-3139 - https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db
|
||
|
CVE-2022-31390 - https://github.com/Cherry-toto/jizhicms/issues/75
|
||
|
CVE-2022-31393 - https://github.com/Cherry-toto/jizhicms/issues/76
|
||
|
CVE-2022-31395 - https://n0ur5sec.medium.com/achievement-unlocked-cve-2022-31395-33299f32cc00
|
||
|
CVE-2022-31398 - https://youtu.be/OungdOub18c
|
||
|
CVE-2022-31400 - https://youtu.be/uqO6hluHDB4
|
||
|
CVE-2022-3141 - http://packetstormsecurity.com/files/171479/WordPress-Translatepress-Multilingual-SQL-Injection.html
|
||
|
CVE-2022-3141 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-translatepress-multilingual-wordpress-plugin-effc08eda514
|
||
|
CVE-2022-3141 - https://wpscan.com/vulnerability/1fa355d1-cca8-4b27-9d21-0b420a2e1bf3
|
||
|
CVE-2022-31414 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-31415 - https://researchinthebin.org/posts/ofrs-sql-injection/
|
||
|
CVE-2022-3142 - http://packetstormsecurity.com/files/171477/WordPress-NEX-Forms-SQL-Injection.html
|
||
|
CVE-2022-3142 - https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5
|
||
|
CVE-2022-3142 - https://wpscan.com/vulnerability/8acc0fc6-efe6-4662-b9ac-6342a7823328
|
||
|
CVE-2022-31446 - https://github.com/wshidamowang/Router/blob/main/Tenda/AC18/RCE_1.md
|
||
|
CVE-2022-31464 - https://r0h1rr1m.medium.com/adaware-protect-local-privilege-escalation-through-insecure-service-permissions-44d0eeb6c933
|
||
|
CVE-2022-31468 - https://packetstormsecurity.com/files/168242/OX-App-Suite-Cross-Site-Scripting-Command-Injection.html
|
||
|
CVE-2022-31469 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-3147 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-31470 - http://packetstormsecurity.com/files/174551/Axigen-10.5.0-4370c946-Cross-Site-Scripting.html
|
||
|
CVE-2022-31478 - https://medium.com/@bcksec/ilias-lms-usertakeover-4-0-1-vulnerability-b2824679403
|
||
|
CVE-2022-3148 - https://huntr.dev/bounties/1f730015-b4d0-4f84-8cac-9cf1e57a091a
|
||
|
CVE-2022-3149 - https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f
|
||
|
CVE-2022-31492 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31493 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31494 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31495 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31496 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31497 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31498 - https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
|
||
|
CVE-2022-31499 - http://packetstormsecurity.com/files/167991/Nortek-Linear-eMerge-E3-Series-Command-Injection.html
|
||
|
CVE-2022-31499 - https://eg.linkedin.com/in/omar-1-hashem
|
||
|
CVE-2022-31499 - https://gist.github.com/omarhashem123/5f0c6f1394099b555740fdc5c7651ee2
|
||
|
CVE-2022-3150 - https://wpscan.com/vulnerability/bb0806d7-21e3-4a65-910c-bf0625c338ec
|
||
|
CVE-2022-31501 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31502 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31503 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31504 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31505 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31506 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31507 - https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c
|
||
|
CVE-2022-31507 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31508 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31509 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-3151 - https://wpscan.com/vulnerability/27816c70-58ad-4ffb-adcc-69eb1b210744
|
||
|
CVE-2022-31510 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31510 - https://github.com/sergeKashkin/Simple-RAT/pull/11
|
||
|
CVE-2022-31511 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31512 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31513 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31514 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31515 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31516 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31517 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31518 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31519 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-3152 - https://huntr.dev/bounties/b3f888d2-5c71-4682-8287-42613401fd5a
|
||
|
CVE-2022-31520 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31521 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31522 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31523 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31524 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31525 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31526 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31527 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31528 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31529 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-3153 - https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a
|
||
|
CVE-2022-31530 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31531 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31532 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31533 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31534 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31535 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31536 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31537 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31538 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31539 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-3154 - https://wpscan.com/vulnerability/cda978b2-b31f-495d-8601-0aaa3e4b45cd
|
||
|
CVE-2022-31540 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31541 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31542 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31543 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31544 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31545 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31546 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31547 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31548 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31549 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31549 - https://github.com/olmax99/helm-flask-celery/commit/28c985d712d7ac26893433e8035e2e3678fcae9f
|
||
|
CVE-2022-3155 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789061
|
||
|
CVE-2022-31550 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31551 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31552 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31553 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31554 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31555 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31556 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31557 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31558 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31559 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31560 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31561 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31562 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31563 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31564 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31564 - https://github.com/woduq1414/munhak-moa/commit/e8f800373b20cb22de70c7a994325b8903877da0
|
||
|
CVE-2022-31565 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31566 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31567 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31568 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31570 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31571 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31572 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31573 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31574 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31575 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31576 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31577 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31578 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31579 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31580 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31581 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31581 - https://github.com/scorelab/OpenMF/issues/262
|
||
|
CVE-2022-31582 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31583 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31584 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31585 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31586 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31587 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31588 - https://github.com/github/securitylab/issues/669#issuecomment-1117265726
|
||
|
CVE-2022-31589 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31590 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31591 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31592 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31593 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31594 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31595 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31596 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31597 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31598 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-31620 - https://github.com/thorfdbg/libjpeg/issues/70
|
||
|
CVE-2022-31628 - https://bugs.php.net/bug.php?id=81726
|
||
|
CVE-2022-31629 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
||
|
CVE-2022-31647 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
||
|
CVE-2022-31650 - https://sourceforge.net/p/sox/bugs/360/
|
||
|
CVE-2022-31651 - https://sourceforge.net/p/sox/bugs/360/
|
||
|
CVE-2022-31656 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31657 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31658 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31659 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31660 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31661 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31662 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31663 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31664 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-31665 - https://www.vmware.com/security/advisories/VMSA-2022-0021.html
|
||
|
CVE-2022-3167 - https://huntr.dev/bounties/e5c2625b-34cc-4805-8223-80f2689e4e5c
|
||
|
CVE-2022-31678 - https://www.vmware.com/security/advisories/VMSA-2022-0027.html
|
||
|
CVE-2022-31680 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1587
|
||
|
CVE-2022-31704 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2022-31706 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2022-31711 - http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2022-3173 - https://huntr.dev/bounties/6d8ffcc6-c6e3-4385-8ead-bdbbbacf79e9
|
||
|
CVE-2022-31736 - https://bugzilla.mozilla.org/show_bug.cgi?id=1735923
|
||
|
CVE-2022-31739 - https://bugzilla.mozilla.org/show_bug.cgi?id=1765049
|
||
|
CVE-2022-3174 - https://huntr.dev/bounties/d8a32bd6-c76d-4140-a5ca-ef368a3058ce
|
||
|
CVE-2022-31741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767590
|
||
|
CVE-2022-31743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1747388
|
||
|
CVE-2022-3175 - https://huntr.dev/bounties/c40badc3-c9e7-4b69-9e2e-2b9f05865159
|
||
|
CVE-2022-3178 - https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
|
||
|
CVE-2022-31782 - https://gitlab.freedesktop.org/freetype/freetype-demos/-/issues/8
|
||
|
CVE-2022-31783 - https://github.com/liblouis/liblouis/issues/1214
|
||
|
CVE-2022-31786 - https://gist.github.com/RNPG/e10524f1781a9981b50fb27bb473b0fe
|
||
|
CVE-2022-31787 - https://gist.github.com/RNPG/ef10c0acceb650d43625a77d3472dd84
|
||
|
CVE-2022-31787 - https://gist.github.com/This-is-Neo/c91e1a0ed5d40fbcf0dada43ea1d7479
|
||
|
CVE-2022-31788 - https://gist.github.com/RNPG/b154f4b2e90340d2f39605989af06bee
|
||
|
CVE-2022-31788 - https://gist.github.com/This-is-Neo/cc5b08ad8a3a60cd81fd1b9c1cb573b4
|
||
|
CVE-2022-3179 - https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe
|
||
|
CVE-2022-31790 - https://www.ambionics.io/blog/hacking-watchguard-firewalls
|
||
|
CVE-2022-31793 - https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/
|
||
|
CVE-2022-31793 - https://derekabdine.com/blog/2022-arris-advisory
|
||
|
CVE-2022-31794 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/
|
||
|
CVE-2022-31795 - https://research.nccgroup.com/2022/05/27/technical-advisory-fujitsu-centricstor-control-center-v8-1-unauthenticated-command-injection/
|
||
|
CVE-2022-31796 - https://github.com/thorfdbg/libjpeg/issues/71
|
||
|
CVE-2022-31798 - http://packetstormsecurity.com/files/167992/Nortek-Linear-eMerge-E3-Series-Account-Takeover.html
|
||
|
CVE-2022-31798 - https://eg.linkedin.com/in/omar-1-hashem
|
||
|
CVE-2022-31798 - https://gist.github.com/omarhashem123/bccdcec70ab7e8f00519d56ea2e3fd79
|
||
|
CVE-2022-31814 - http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html
|
||
|
CVE-2022-31814 - http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution.html
|
||
|
CVE-2022-31814 - https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/
|
||
|
CVE-2022-31827 - https://github.com/zer0yu/CVE_Request/blob/master/MonstaFTP/MonstaFTP_v2_10_3_SSRF.md
|
||
|
CVE-2022-31830 - https://github.com/fex-team/kityminder/issues/345
|
||
|
CVE-2022-31845 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_live.md
|
||
|
CVE-2022-31846 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__live_mfg.md
|
||
|
CVE-2022-31847 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__Sensitive%20information%20leakage.md
|
||
|
CVE-2022-31854 - http://packetstormsecurity.com/files/167782/CodoForum-5.1-Remote-Code-Execution.html
|
||
|
CVE-2022-31856 - https://www.exploit-db.com/exploits/50942
|
||
|
CVE-2022-31860 - https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html
|
||
|
CVE-2022-31861 - https://securityblog101.blogspot.com/2022/09/cve-2022-31861.html
|
||
|
CVE-2022-31873 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss2.md
|
||
|
CVE-2022-31874 - https://github.com/jayus0821/uai-poc/blob/main/ASUS/RT-N53/command%20injection.md
|
||
|
CVE-2022-31875 - https://github.com/jayus0821/uai-poc/blob/main/Trendnet/IP-110wn/xss1.md
|
||
|
CVE-2022-31876 - https://github.com/jayus0821/uai-poc/blob/main/Netgear/WNAP320/unauth.md
|
||
|
CVE-2022-31877 - https://patsch.dev/2022/07/08/cve-2022-31877-privilege-escalation-in-msi-centers-msi-terminalserver-exe/
|
||
|
CVE-2022-31879 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Online-Fire-Reporting
|
||
|
CVE-2022-31884 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/unauthorized-delete-add-api-users-api-keys
|
||
|
CVE-2022-31885 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/os-command-injection
|
||
|
CVE-2022-31886 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/2fa-bypass-via-x-csrf
|
||
|
CVE-2022-31887 - https://cyber-guy.gitbook.io/cyber-guy/pocs/marval-msm/0-click-account-takeover
|
||
|
CVE-2022-31888 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/
|
||
|
CVE-2022-31889 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/
|
||
|
CVE-2022-31890 - https://checkmarx.com/blog/securing-open-source-solutions-a-study-of-osticket-vulnerabilities/
|
||
|
CVE-2022-31897 - https://packetstormsecurity.com/files/167572/Zoo-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-31898 - https://boschko.ca/glinet-router
|
||
|
CVE-2022-31901 - https://github.com/CDACesec/CVE-2022-31901
|
||
|
CVE-2022-31902 - https://github.com/CDACesec/CVE-2022-31902
|
||
|
CVE-2022-3194 - https://wpscan.com/vulnerability/85e32913-dc2a-44c9-addd-7abde618e995/
|
||
|
CVE-2022-3199 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
|
||
|
CVE-2022-32030 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetQosBand
|
||
|
CVE-2022-32031 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/fromSetRouteStatic
|
||
|
CVE-2022-32032 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/A18/formAddMacfilterRule
|
||
|
CVE-2022-32033 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/AX1806/formSetVirtualSer
|
||
|
CVE-2022-32034 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formdelMasteraclist
|
||
|
CVE-2022-32035 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formMasterMng
|
||
|
CVE-2022-32036 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetStoreWeb
|
||
|
CVE-2022-32037 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAPCfg
|
||
|
CVE-2022-32039 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/fromDhcpListClient
|
||
|
CVE-2022-32040 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetCfm
|
||
|
CVE-2022-32041 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formGetPassengerAnalyseData
|
||
|
CVE-2022-32043 - https://github.com/d1tto/IoT-vuln/tree/main/Tenda/M3/formSetAccessCodeInfo
|
||
|
CVE-2022-32044 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/5.setWiFiRepeaterCfg
|
||
|
CVE-2022-32045 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/4.setWiFiScheduleCfg
|
||
|
CVE-2022-32046 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/8.setMacFilterRules
|
||
|
CVE-2022-32047 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/1.setIpPortFilterRules
|
||
|
CVE-2022-32048 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/10.setTracerouteCfg
|
||
|
CVE-2022-32049 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/7.setUrlFilterRules
|
||
|
CVE-2022-3205 - https://bugzilla.redhat.com/show_bug.cgi?id=2120597
|
||
|
CVE-2022-32050 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/9.setWanCfg
|
||
|
CVE-2022-32051 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/2.setParentalRules
|
||
|
CVE-2022-32052 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/3.setWiFiAclRules
|
||
|
CVE-2022-32053 - https://github.com/d1tto/IoT-vuln/tree/main/Totolink/T6-v2/6.setWizardCfg
|
||
|
CVE-2022-32055 - https://github.com/bigb0x/CVEs/blob/main/Inout-Homestay-2-2-sqli.md
|
||
|
CVE-2022-32056 - https://github.com/JackyG0/Online-Accreditation-Management-System-v1.0-SQLi
|
||
|
CVE-2022-32060 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-b15becc1a5ea
|
||
|
CVE-2022-32061 - https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab
|
||
|
CVE-2022-32065 - https://gitee.com/y_project/RuoYi/issues/I57IME
|
||
|
CVE-2022-32065 - https://github.com/yangzongzhuan/RuoYi/issues/118
|
||
|
CVE-2022-3207 - https://wpscan.com/vulnerability/b57272ea-9a8a-482a-bbaa-5f202ca5b9aa
|
||
|
CVE-2022-3208 - https://wpscan.com/vulnerability/80d475ca-b475-4789-8eef-9c4d880853b7
|
||
|
CVE-2022-32081 - https://jira.mariadb.org/browse/MDEV-26420
|
||
|
CVE-2022-32085 - https://jira.mariadb.org/browse/MDEV-26407
|
||
|
CVE-2022-32086 - https://jira.mariadb.org/browse/MDEV-26412
|
||
|
CVE-2022-32088 - https://jira.mariadb.org/browse/MDEV-26419
|
||
|
CVE-2022-32089 - https://jira.mariadb.org/browse/MDEV-26410
|
||
|
CVE-2022-3209 - https://wpscan.com/vulnerability/7a244fb1-fa0b-4294-9b51-588bf5d673a2
|
||
|
CVE-2022-32092 - https://github.com/fxc233/iot-vul/tree/main/D-Link/DIR-645
|
||
|
CVE-2022-32092 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-3211 - https://huntr.dev/bounties/31ac0506-ae38-4128-a46d-71d5d079f8b7
|
||
|
CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/content-type-builder/admin/src/components/AllowedTypesSelect/index.js#L14
|
||
|
CVE-2022-32114 - https://github.com/strapi/strapi/blob/d9277d616b4478a3839e79e47330a4aaf167a2f1/packages/core/upload/admin/src/components/MediaLibraryInput/index.js#L33
|
||
|
CVE-2022-32114 - https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e
|
||
|
CVE-2022-32115 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
||
|
CVE-2022-3212 - https://research.jfrog.com/vulnerabilities/axum-core-dos/
|
||
|
CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2
|
||
|
CVE-2022-3213 - https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750
|
||
|
CVE-2022-32159 - https://www.mend.io/vulnerability-database/CVE-2022-32159
|
||
|
CVE-2022-3216 - https://vuldb.com/?id.208606
|
||
|
CVE-2022-32167 - https://www.mend.io/vulnerability-database/CVE-2022-32167
|
||
|
CVE-2022-32168 - https://www.mend.io/vulnerability-database/CVE-2022-32168
|
||
|
CVE-2022-32169 - https://www.mend.io/vulnerability-database/CVE-2022-32169
|
||
|
CVE-2022-3217 - https://www.tenable.com/security/research/tra-2022-31
|
||
|
CVE-2022-32170 - https://www.mend.io/vulnerability-database/CVE-2022-32170
|
||
|
CVE-2022-32171 - https://www.mend.io/vulnerability-database/CVE-2022-32171
|
||
|
CVE-2022-32172 - https://www.mend.io/vulnerability-database/CVE-2022-32172
|
||
|
CVE-2022-32173 - https://www.mend.io/vulnerability-database/CVE-2022-32173
|
||
|
CVE-2022-32174 - https://www.mend.io/vulnerability-database/CVE-2022-32174
|
||
|
CVE-2022-32175 - https://www.mend.io/vulnerability-database/CVE-2022-32175
|
||
|
CVE-2022-32176 - https://www.mend.io/vulnerability-database/CVE-2022-32176
|
||
|
CVE-2022-32177 - https://www.mend.io/vulnerability-database/CVE-2022-32177
|
||
|
CVE-2022-3218 - http://packetstormsecurity.com/files/168509/WiFi-Mouse-1.8.3.4-Remote-Code-Execution.html
|
||
|
CVE-2022-3218 - https://www.exploit-db.com/exploits/49601
|
||
|
CVE-2022-3218 - https://www.exploit-db.com/exploits/50972
|
||
|
CVE-2022-32199 - https://github.com/Toxich4/CVE-2022-32199
|
||
|
CVE-2022-3220 - https://wpscan.com/vulnerability/cb6f4953-e68b-48f3-a821-a1d77e5476ef
|
||
|
CVE-2022-32200 - https://github.com/davea42/libdwarf-code/issues/116
|
||
|
CVE-2022-32200 - https://www.prevanders.net/dwarfbug.html
|
||
|
CVE-2022-32201 - https://github.com/thorfdbg/libjpeg/issues/73
|
||
|
CVE-2022-32202 - https://github.com/thorfdbg/libjpeg/issues/74
|
||
|
CVE-2022-32205 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32206 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32207 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32208 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-3221 - https://huntr.dev/bounties/1fa1aac9-b16a-4a70-a7da-960b3908ae1d
|
||
|
CVE-2022-3222 - https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235
|
||
|
CVE-2022-32221 - http://seclists.org/fulldisclosure/2023/Jan/19
|
||
|
CVE-2022-3223 - https://huntr.dev/bounties/125791b6-3a68-4235-8866-6bc3a52332ba
|
||
|
CVE-2022-32230 - https://www.rapid7.com/blog/post/2022/06/14/cve-2022-32230-windows-smb-denial-of-service-vulnerability-fixed/
|
||
|
CVE-2022-32235 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32236 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32237 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32238 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32239 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-3224 - https://huntr.dev/bounties/3587a567-7fcd-4702-b7c9-d9ca565e3c62
|
||
|
CVE-2022-32240 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32241 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32242 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32243 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32244 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32245 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32246 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32247 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32248 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32249 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/06/03/1
|
||
|
CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/08/25/1
|
||
|
CVE-2022-32250 - http://www.openwall.com/lists/oss-security/2022/09/02/9
|
||
|
CVE-2022-32250 - https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
|
||
|
CVE-2022-32250 - https://bugzilla.redhat.com/show_bug.cgi?id=2092427
|
||
|
CVE-2022-32250 - https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd
|
||
|
CVE-2022-32250 - https://www.openwall.com/lists/oss-security/2022/05/31/1
|
||
|
CVE-2022-32269 - https://github.com/Edubr2020/RealPlayer_G2_RCE
|
||
|
CVE-2022-32269 - https://www.youtube.com/watch?v=9c9Q4VZQOUk
|
||
|
CVE-2022-32270 - https://github.com/Edubr2020/RP_Import_RCE
|
||
|
CVE-2022-32270 - https://youtu.be/CONlijEgDLc
|
||
|
CVE-2022-32271 - https://github.com/Edubr2020/RP_DCP_Code_Exec
|
||
|
CVE-2022-32271 - https://youtu.be/AMODp3iTnqY
|
||
|
CVE-2022-32272 - http://packetstormsecurity.com/files/171549/OPSWAT-Metadefender-Core-4.21.1-Privilege-Escalation.html
|
||
|
CVE-2022-32274 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-040.txt
|
||
|
CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana
|
||
|
CVE-2022-32275 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md
|
||
|
CVE-2022-32276 - https://github.com/BrotherOfJhonny/grafana/blob/main/README.md
|
||
|
CVE-2022-32277 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/squiz-matrix-cms-authenticated-privilege-escalation-through-idor/
|
||
|
CVE-2022-32282 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1545
|
||
|
CVE-2022-3229 - https://github.com/rapid7/metasploit-framework/pull/16989
|
||
|
CVE-2022-32294 - https://medium.com/@soheil.samanabadi/zimbra-8-8-15-zmprove-ca-command-incorrect-access-control-8088032638e
|
||
|
CVE-2022-32296 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9
|
||
|
CVE-2022-32298 - https://github.com/landley/toybox/issues/346
|
||
|
CVE-2022-32308 - https://github.com/uBlockOrigin/uBlock-issues/issues/1992
|
||
|
CVE-2022-3231 - https://huntr.dev/bounties/bcb6ee68-1452-4fdb-932a-f1031d10984f
|
||
|
CVE-2022-32310 - https://packetstormsecurity.com/files/167291/Ingredient-Stock-Management-System-1.0-Account-Takeover.html
|
||
|
CVE-2022-32311 - https://packetstormsecurity.com/files/167290/Ingredient-Stock-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-32317 - https://bugs.gentoo.org/show_bug.cgi?id=858107
|
||
|
CVE-2022-32317 - https://github.com/b17fr13nds/MPlayer_cve_poc
|
||
|
CVE-2022-32318 - https://packetstormsecurity.com/files/167309/Fast-Food-Ordering-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-3232 - https://huntr.dev/bounties/15c8fd98-7f50-4d46-b013-42710af1f99c
|
||
|
CVE-2022-3233 - https://huntr.dev/bounties/5ec206e0-eca0-4957-9af4-fdd9185d1db3
|
||
|
CVE-2022-3234 - https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da
|
||
|
CVE-2022-3235 - https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af
|
||
|
CVE-2022-32353 - https://github.com/k0xx11/bug_report/blob/main/vendors/oretnom23/product-show-room-site/SQLi-1.md
|
||
|
CVE-2022-3237 - https://wpscan.com/vulnerability/cd2fd6cd-a839-4de8-af28-b5134873c40e
|
||
|
CVE-2022-32387 - https://devnet.kentico.com/download/hotfixes
|
||
|
CVE-2022-3239 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c08eadca1bdfa099e20a32f8fa4b52b2f672236d
|
||
|
CVE-2022-32391 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32391.md
|
||
|
CVE-2022-32392 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32392.md
|
||
|
CVE-2022-32393 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32393.md
|
||
|
CVE-2022-32394 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32394.md
|
||
|
CVE-2022-32395 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32395.md
|
||
|
CVE-2022-32396 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32396.md
|
||
|
CVE-2022-32397 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32397.md
|
||
|
CVE-2022-32398 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32398.md
|
||
|
CVE-2022-32399 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32399.md
|
||
|
CVE-2022-32400 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32400.md
|
||
|
CVE-2022-32401 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32401.md
|
||
|
CVE-2022-32402 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32402.md
|
||
|
CVE-2022-32403 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32403.md
|
||
|
CVE-2022-32404 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32404.md
|
||
|
CVE-2022-32405 - https://github.com/Dyrandy/BugBounty/blob/main/pms/cve-2022-32405.md
|
||
|
CVE-2022-32407 - https://riteshgohil-25.medium.com/softr-version-2-0-33463a6bf766
|
||
|
CVE-2022-32409 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt
|
||
|
CVE-2022-32409 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
|
||
|
CVE-2022-3241 - https://wpscan.com/vulnerability/a995dd67-43fc-4087-a7f1-5db57f4c828c
|
||
|
CVE-2022-32414 - https://github.com/nginx/njs/issues/483
|
||
|
CVE-2022-3242 - https://huntr.dev/bounties/3e6b218a-a5a6-40d9-9f7e-5ab0c6214faf
|
||
|
CVE-2022-32429 - http://packetstormsecurity.com/files/169819/MSNSwitch-Firmware-MNT.2408-Remote-Code-Execution.html
|
||
|
CVE-2022-32429 - https://elifulkerson.com/CVE-2022-32429/
|
||
|
CVE-2022-3243 - https://wpscan.com/vulnerability/9f03bc1a-214f-451a-89fd-2cd3517e8f8a
|
||
|
CVE-2022-32434 - https://github.com/EIPStackGroup/OpENer/issues/374
|
||
|
CVE-2022-32441 - https://code610.blogspot.com/2022/06/night-fuzzing-session-idapro-66-part-2.html
|
||
|
CVE-2022-32449 - https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md
|
||
|
CVE-2022-3245 - https://huntr.dev/bounties/747c2924-95ca-4311-9e69-58ee0fb440a0
|
||
|
CVE-2022-32450 - http://packetstormsecurity.com/files/167608/AnyDesk-7.0.9-Arbitrary-File-Write-Denial-Of-Service.html
|
||
|
CVE-2022-32450 - http://seclists.org/fulldisclosure/2022/Jul/9
|
||
|
CVE-2022-32450 - https://seclists.org/fulldisclosure/2022/Jun/44
|
||
|
CVE-2022-32454 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560
|
||
|
CVE-2022-3246 - https://wpscan.com/vulnerability/ece049b2-9a21-463d-9e8b-b4ce61919f0c
|
||
|
CVE-2022-3247 - https://wpscan.com/vulnerability/ee312f22-ca58-451d-a1cb-3f78a6e5ecaf
|
||
|
CVE-2022-32480 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
||
|
CVE-2022-3249 - https://wpscan.com/vulnerability/6503da78-a2bf-4b4c-b56d-21c8c55b076e
|
||
|
CVE-2022-3250 - https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23
|
||
|
CVE-2022-32502 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32503 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32504 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32505 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32506 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32507 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32508 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-32509 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-3251 - https://huntr.dev/bounties/b9a1b411-060b-4235-9426-e39bd0a1d6d9
|
||
|
CVE-2022-32510 - https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/
|
||
|
CVE-2022-3254 - https://wpscan.com/vulnerability/546c47c2-5b4b-46db-b754-c6b43aef2660
|
||
|
CVE-2022-32543 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1527
|
||
|
CVE-2022-32548 - https://www.securityweek.com/smbs-exposed-attacks-critical-vulnerability-draytek-vigor-routers
|
||
|
CVE-2022-3255 - https://huntr.dev/bounties/0ea45cf9-b256-454c-9031-2435294c0902
|
||
|
CVE-2022-3256 - https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3
|
||
|
CVE-2022-32567 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-039.txt
|
||
|
CVE-2022-3257 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-32572 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1548
|
||
|
CVE-2022-32573 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1528
|
||
|
CVE-2022-32574 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1565
|
||
|
CVE-2022-32585 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1570
|
||
|
CVE-2022-32586 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1563
|
||
|
CVE-2022-32588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1544
|
||
|
CVE-2022-3267 - https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2
|
||
|
CVE-2022-3268 - https://huntr.dev/bounties/00e464ce-53b9-485d-ac62-6467881654c2
|
||
|
CVE-2022-3269 - https://huntr.dev/bounties/67c25969-5e7a-4424-817e-e1a918f63cc6
|
||
|
CVE-2022-3272 - https://huntr.dev/bounties/733678b9-daa1-4d6a-875a-382fa09a6e38
|
||
|
CVE-2022-3273 - https://huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6
|
||
|
CVE-2022-3274 - https://huntr.dev/bounties/8834c356-4ddb-4be7-898b-d76f480e9c3f
|
||
|
CVE-2022-32760 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1555
|
||
|
CVE-2022-32761 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1549
|
||
|
CVE-2022-32763 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1541
|
||
|
CVE-2022-32765 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1576
|
||
|
CVE-2022-32768 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536
|
||
|
CVE-2022-32769 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1536
|
||
|
CVE-2022-32770 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
|
||
|
CVE-2022-32771 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
|
||
|
CVE-2022-32772 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1538
|
||
|
CVE-2022-32773 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1556
|
||
|
CVE-2022-32774 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1600
|
||
|
CVE-2022-32775 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1564
|
||
|
CVE-2022-32777 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542
|
||
|
CVE-2022-32778 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1542
|
||
|
CVE-2022-3278 - https://huntr.dev/bounties/a9fad77e-f245-4ce9-ba15-c7d4c86c4612
|
||
|
CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32795 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-3282 - https://wpscan.com/vulnerability/035dffef-4b4b-4afb-9776-7f6c5e56452c
|
||
|
CVE-2022-32827 - http://packetstormsecurity.com/files/169929/AppleAVD-deallocateKernelMemoryInternal-Missing-Surface-Lock.html
|
||
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-32854 - http://seclists.org/fulldisclosure/2022/Oct/49
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/47
|
||
|
CVE-2022-32864 - http://seclists.org/fulldisclosure/2022/Oct/49
|
||
|
CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-32868 - http://seclists.org/fulldisclosure/2022/Oct/50
|
||
|
CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32872 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-3288 - https://gitlab.com/gitlab-org/gitlab/-/issues/354948
|
||
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-32883 - http://seclists.org/fulldisclosure/2022/Oct/49
|
||
|
CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32886 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32893 - http://seclists.org/fulldisclosure/2022/Oct/49
|
||
|
CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/1
|
||
|
CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/08/29/2
|
||
|
CVE-2022-32893 - http://www.openwall.com/lists/oss-security/2022/09/13/1
|
||
|
CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-32894 - http://seclists.org/fulldisclosure/2022/Oct/49
|
||
|
CVE-2022-3290 - https://huntr.dev/bounties/d8b8519d-96a5-484c-8141-624c54290bf5
|
||
|
CVE-2022-32907 - http://packetstormsecurity.com/files/169930/AppleAVD-AppleAVDUserClient-decodeFrameFig-Memory-Corruption.html
|
||
|
CVE-2022-32908 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32911 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/47
|
||
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/49
|
||
|
CVE-2022-32912 - http://seclists.org/fulldisclosure/2022/Oct/50
|
||
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/39
|
||
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/40
|
||
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/43
|
||
|
CVE-2022-32917 - http://seclists.org/fulldisclosure/2022/Oct/45
|
||
|
CVE-2022-3292 - https://huntr.dev/bounties/e9309018-e94f-4e15-b7d1-5d38b6021c5d
|
||
|
CVE-2022-32924 - http://packetstormsecurity.com/files/170010/XNU-Dangling-PTE-Entry.html
|
||
|
CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-32942 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-32943 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-3295 - https://huntr.dev/bounties/202dd03a-3d97-4c64-bc73-1a0f36614233
|
||
|
CVE-2022-3296 - https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077
|
||
|
CVE-2022-3297 - https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c
|
||
|
CVE-2022-32978 - https://github.com/thorfdbg/libjpeg/issues/75
|
||
|
CVE-2022-3298 - https://huntr.dev/bounties/f9fedf94-41c9-49c4-8552-e407123a44e7
|
||
|
CVE-2022-32985 - https://sec-consult.com/vulnerability-lab/advisory/hardcoded-backdoor-user-outdated-software-components-nexans-ftto-gigaswitch/
|
||
|
CVE-2022-32988 - https://github.com/FedericoHeichou/CVE-2022-32988
|
||
|
CVE-2022-32988 - https://github.com/FedericoHeichou/DSL-N14U-XSS
|
||
|
CVE-2022-32993 - https://github.com/laotun-s/POC/blob/main/CVE-2022-32993.txt
|
||
|
CVE-2022-32994 - https://github.com/zongdeiqianxing/cve-reports/issues/1
|
||
|
CVE-2022-32995 - https://github.com/zongdeiqianxing/cve-reports/issues/2
|
||
|
CVE-2022-3300 - https://wpscan.com/vulnerability/ddc9ed69-d942-4fad-bbf4-1be3b86460d9
|
||
|
CVE-2022-3301 - https://huntr.dev/bounties/d3bf1e5d-055a-44b8-8d60-54ab966ed63a
|
||
|
CVE-2022-33011 - https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/
|
||
|
CVE-2022-33012 - https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/
|
||
|
CVE-2022-3302 - https://wpscan.com/vulnerability/1b5a018d-f2d4-4373-be1e-5162cc5c928b
|
||
|
CVE-2022-33024 - https://github.com/LibreDWG/libredwg/issues/492
|
||
|
CVE-2022-33025 - https://github.com/LibreDWG/libredwg/issues/487
|
||
|
CVE-2022-33026 - https://github.com/LibreDWG/libredwg/issues/484
|
||
|
CVE-2022-33027 - https://github.com/LibreDWG/libredwg/issues/490
|
||
|
CVE-2022-33028 - https://github.com/LibreDWG/libredwg/issues/489
|
||
|
CVE-2022-3303 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
|
||
|
CVE-2022-33032 - https://github.com/LibreDWG/libredwg/issues/488
|
||
|
CVE-2022-33033 - https://github.com/LibreDWG/libredwg/issues/493
|
||
|
CVE-2022-33034 - https://github.com/LibreDWG/libredwg/issues/494
|
||
|
CVE-2022-33043 - https://github.com/chen-jerry-php/vim/blob/main/core_tmp.md
|
||
|
CVE-2022-33047 - https://drive.google.com/file/d/1g3MQajVLZAaZMRfIQHSLT6XRw-B4Dmz8/view?usp=sharing
|
||
|
CVE-2022-33065 - https://github.com/libsndfile/libsndfile/issues/789
|
||
|
CVE-2022-33075 - https://packetstormsecurity.com/files/167603/Zoo-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-33077 - https://medium.com/@rohan_pagey/cve-2022-33077-idor-to-change-address-of-any-customer-via-parameter-pollution-in-nopcommerce-4-5-2fa4bc763cc6
|
||
|
CVE-2022-33087 - https://github.com/cilan2/iot/blob/main/4.md
|
||
|
CVE-2022-33099 - https://github.com/lua/lua/commit/42d40581dd919fb134c07027ca1ce0844c670daf
|
||
|
CVE-2022-33099 - https://lua-users.org/lists/lua-l/2022-05/msg00035.html
|
||
|
CVE-2022-33103 - https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/
|
||
|
CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284
|
||
|
CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286
|
||
|
CVE-2022-33108 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287
|
||
|
CVE-2022-33116 - https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/
|
||
|
CVE-2022-33119 - https://github.com/badboycxcc/nuuo-xss/blob/main/README.md
|
||
|
CVE-2022-33121 - https://github.com/bg5sbk/MiniCMS/issues/45
|
||
|
CVE-2022-33122 - https://github.com/eyoucms/eyoucms/issues/24
|
||
|
CVE-2022-33124 - https://github.com/aio-libs/aiohttp/issues/6772
|
||
|
CVE-2022-33147 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
||
|
CVE-2022-33148 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
||
|
CVE-2022-33149 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
||
|
CVE-2022-33150 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1577
|
||
|
CVE-2022-33171 - http://packetstormsecurity.com/files/168096/TypeORM-0.3.7-Information-Disclosure.html
|
||
|
CVE-2022-33174 - https://gynvael.coldwind.pl/?lang=en&id=748
|
||
|
CVE-2022-33175 - https://gynvael.coldwind.pl/?lang=en&id=748
|
||
|
CVE-2022-33189 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1558
|
||
|
CVE-2022-33192 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
||
|
CVE-2022-33193 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
||
|
CVE-2022-33194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
||
|
CVE-2022-33195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559
|
||
|
CVE-2022-33204 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
||
|
CVE-2022-33205 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
||
|
CVE-2022-33206 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
||
|
CVE-2022-33207 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1568
|
||
|
CVE-2022-3323 - https://www.tenable.com/security/research/tra-2022-32
|
||
|
CVE-2022-3324 - https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c
|
||
|
CVE-2022-3326 - https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97
|
||
|
CVE-2022-3327 - https://huntr.dev/bounties/02207c8f-2b15-4a31-a86a-74fd2fca0ed1
|
||
|
CVE-2022-33312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
|
||
|
CVE-2022-33313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
|
||
|
CVE-2022-33314 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1572
|
||
|
CVE-2022-33321 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-010.pdf
|
||
|
CVE-2022-33322 - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-011.pdf
|
||
|
CVE-2022-33325 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
||
|
CVE-2022-33326 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
||
|
CVE-2022-33327 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
||
|
CVE-2022-33328 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
||
|
CVE-2022-33329 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1573
|
||
|
CVE-2022-3333 - https://wpscan.com/vulnerability/bfd8a7aa-5977-4fe5-b2fc-12bf93caf3ed
|
||
|
CVE-2022-3334 - https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9
|
||
|
CVE-2022-3335 - https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d
|
||
|
CVE-2022-3336 - https://wpscan.com/vulnerability/57bc6633-1aeb-4c20-a2a5-9b3fa10ba95d
|
||
|
CVE-2022-3338 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387
|
||
|
CVE-2022-3339 - https://kcm.trellix.com/corporate/index?page=content&id=SB10387
|
||
|
CVE-2022-3343 - https://wpscan.com/vulnerability/e507b1b5-1a56-4b2f-b7e7-e22f6da1e32a
|
||
|
CVE-2022-3350 - https://wpscan.com/vulnerability/6d796b83-03c0-49f8-8d07-5c63ce8a32b9
|
||
|
CVE-2022-3352 - https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60
|
||
|
CVE-2022-3354 - https://vuldb.com/?id.209686
|
||
|
CVE-2022-3355 - https://huntr.dev/bounties/4b7fb92c-f06b-4bbf-82dc-9f013b30b6a6
|
||
|
CVE-2022-3357 - https://wpscan.com/vulnerability/2e28a4e7-e7d3-485c-949c-e300e5b66cbd
|
||
|
CVE-2022-3359 - https://wpscan.com/vulnerability/08f3ce22-94a0-496a-aaf9-d35b6b0f5bb6
|
||
|
CVE-2022-3360 - https://wpscan.com/vulnerability/acea7a54-a964-4127-a93f-f38f883074e3
|
||
|
CVE-2022-3362 - https://huntr.dev/bounties/ca428c31-858d-47fa-adc9-2a59f8e8b2b1
|
||
|
CVE-2022-3363 - https://huntr.dev/bounties/b8a40ba6-2452-4abe-a80a-2d065ee8891e
|
||
|
CVE-2022-3364 - https://huntr.dev/bounties/e70ad507-1424-463b-bdf1-c4a6fbe6e720
|
||
|
CVE-2022-3366 - https://wpscan.com/vulnerability/72639924-e7a7-4f7d-bd50-015d05ffd4fb
|
||
|
CVE-2022-3368 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2022-3371 - https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce
|
||
|
CVE-2022-3374 - https://wpscan.com/vulnerability/22fd3f28-9036-4bd5-ad98-ff78bd1b51bc
|
||
|
CVE-2022-3376 - https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed
|
||
|
CVE-2022-3380 - https://wpscan.com/vulnerability/a42272a2-f9ce-4aab-9a94-8a4d85008746
|
||
|
CVE-2022-3389 - https://huntr.dev/bounties/f7d2a6ab-2faf-4719-bdb6-e4e5d6065752
|
||
|
CVE-2022-33891 - http://packetstormsecurity.com/files/168309/Apache-Spark-Unauthenticated-Command-Injection.html
|
||
|
CVE-2022-33896 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1574
|
||
|
CVE-2022-33897 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1579
|
||
|
CVE-2022-3391 - https://wpscan.com/vulnerability/ecc51420-ee50-4e39-a38d-09686f1996f2
|
||
|
CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=29135
|
||
|
CVE-2022-33910 - https://mantisbt.org/bugs/view.php?id=30384
|
||
|
CVE-2022-33916 - https://opcfoundation.org
|
||
|
CVE-2022-33917 - http://packetstormsecurity.com/files/168147/Arm-Mali-CSF-VMA-Split-Mishandling.html
|
||
|
CVE-2022-3392 - https://wpscan.com/vulnerability/2296156e-b177-478e-a01c-b1ea4fee0aca
|
||
|
CVE-2022-3393 - https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e
|
||
|
CVE-2022-33932 - https://www.dell.com/support/kbdoc/en-us/000201094/dsa-2022-149-dell-emc-powerscale-onefs-security-update?lang=en
|
||
|
CVE-2022-33938 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1584
|
||
|
CVE-2022-3394 - https://wpscan.com/vulnerability/3266eb59-a8b2-4a5a-ab48-01a9af631b2c
|
||
|
CVE-2022-3395 - https://wpscan.com/vulnerability/10742154-368a-40be-a67d-80ea848493a0
|
||
|
CVE-2022-33981 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6
|
||
|
CVE-2022-33981 - https://seclists.org/oss-sec/2022/q2/66
|
||
|
CVE-2022-34000 - https://github.com/libjxl/libjxl/issues/1477
|
||
|
CVE-2022-34001 - https://prisminfosec.com/cve-2022-34001/
|
||
|
CVE-2022-34002 - https://assura.atlassian.net/wiki/spaces/VULNS/pages/1843134469/CVE-2022-34002+Personnel+Data+Systems+PDS+Vista+7+-+Local+File+Inclusion
|
||
|
CVE-2022-34005 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||
|
CVE-2022-34006 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||
|
CVE-2022-34007 - https://packetstormsecurity.com/files/167706/EQS-Integrity-Line-Cross-Site-Scripting-Information-Disclosure.html
|
||
|
CVE-2022-34008 - https://r0h1rr1m.medium.com/comodo-antivirus-local-privilege-escalation-through-insecure-file-move-476a4601d9b8
|
||
|
CVE-2022-34020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
|
||
|
CVE-2022-34020 - https://securityblog101.blogspot.com/2022/09/cve-2022-34020.html
|
||
|
CVE-2022-34021 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34021.html
|
||
|
CVE-2022-34022 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-34022.html
|
||
|
CVE-2022-34027 - https://github.com/nginx/njs/issues/504
|
||
|
CVE-2022-34028 - https://github.com/nginx/njs/issues/522
|
||
|
CVE-2022-34029 - https://github.com/nginx/njs/issues/506
|
||
|
CVE-2022-34030 - https://github.com/nginx/njs/issues/540
|
||
|
CVE-2022-34031 - https://github.com/nginx/njs/issues/523
|
||
|
CVE-2022-34032 - https://github.com/nginx/njs/issues/524
|
||
|
CVE-2022-34033 - https://github.com/michaelrsweet/htmldoc/issues/425
|
||
|
CVE-2022-34035 - https://github.com/michaelrsweet/htmldoc/issues/426
|
||
|
CVE-2022-34046 - http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html
|
||
|
CVE-2022-34047 - http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html
|
||
|
CVE-2022-3405 - https://herolab.usd.de/security-advisories/usd-2022-0008/
|
||
|
CVE-2022-34067 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2022/Warehouse-Management-System
|
||
|
CVE-2022-3408 - https://wpscan.com/vulnerability/395bc893-2067-4f76-b49f-9ed8e1e8f330
|
||
|
CVE-2022-34092 - https://github.com/edmarmoretti/i3geo/issues/3
|
||
|
CVE-2022-34092 - https://github.com/saladesituacao/i3geo/issues/3
|
||
|
CVE-2022-34092 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L23
|
||
|
CVE-2022-34093 - https://github.com/edmarmoretti/i3geo/issues/4
|
||
|
CVE-2022-34093 - https://github.com/saladesituacao/i3geo/issues/4
|
||
|
CVE-2022-34093 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L44
|
||
|
CVE-2022-34094 - https://github.com/edmarmoretti/i3geo/issues/5
|
||
|
CVE-2022-34094 - https://github.com/saladesituacao/i3geo/issues/5
|
||
|
CVE-2022-34094 - https://github.com/wagnerdracha/ProofOfConcept/blob/main/i3geo_proof_of_concept.txt#L65
|
||
|
CVE-2022-34100 - https://www.crestron.com/Security/Security_Advisories
|
||
|
CVE-2022-34101 - https://www.crestron.com/Security/Security_Advisories
|
||
|
CVE-2022-34102 - https://www.crestron.com/Security/Security_Advisories
|
||
|
CVE-2022-34113 - https://github.com/dataease/dataease/issues/2431
|
||
|
CVE-2022-34121 - https://github.com/CuppaCMS/CuppaCMS/issues/18
|
||
|
CVE-2022-34121 - https://github.com/hansmach1ne/MyExploits/tree/main/LFI_in_CuppaCMS_templates
|
||
|
CVE-2022-34125 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
||
|
CVE-2022-34126 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
||
|
CVE-2022-34127 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
||
|
CVE-2022-34128 - https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/
|
||
|
CVE-2022-3414 - https://vuldb.com/?id.210246
|
||
|
CVE-2022-34140 - http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html
|
||
|
CVE-2022-34140 - http://packetstormsecurity.com/files/168476/Feehi-CMS-2.1.1-Remote-Code-Execution.html
|
||
|
CVE-2022-3415 - https://wpscan.com/vulnerability/012c5b64-ef76-4539-afd8-40f6c329ae88
|
||
|
CVE-2022-3416 - https://wpscan.com/vulnerability/f927dbe0-3939-4882-a469-1309ac737ee6
|
||
|
CVE-2022-34169 - http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
|
||
|
CVE-2022-34169 - https://www.oracle.com/security-alerts/cpujul2022.html
|
||
|
CVE-2022-3418 - https://wpscan.com/vulnerability/ccbb74f5-1b8f-4ea6-96bc-ddf62af7f94d
|
||
|
CVE-2022-3419 - https://wpscan.com/vulnerability/5909a423-9841-449c-a569-f687c609817b
|
||
|
CVE-2022-3420 - https://wpscan.com/vulnerability/ce5fac6e-8da1-4042-9cf8-7988613f92a5
|
||
|
CVE-2022-3422 - https://huntr.dev/bounties/02da53ab-f613-4171-8766-96b31c671551
|
||
|
CVE-2022-3423 - https://huntr.dev/bounties/94639d8e-8301-4432-ab80-e76e1346e631
|
||
|
CVE-2022-3425 - https://wpscan.com/vulnerability/df1c36bb-9861-4272-89c9-ae76e62f687c
|
||
|
CVE-2022-3426 - https://wpscan.com/vulnerability/bc90594e-1018-494a-b473-6416e274c59f
|
||
|
CVE-2022-34267 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
||
|
CVE-2022-34268 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
||
|
CVE-2022-34269 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
||
|
CVE-2022-34270 - https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver
|
||
|
CVE-2022-34292 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
||
|
CVE-2022-34296 - https://github.com/zalando/skipper/releases/tag/v0.13.218
|
||
|
CVE-2022-34299 - https://github.com/davea42/libdwarf-code/issues/119
|
||
|
CVE-2022-34300 - https://github.com/syoyo/tinyexr/issues/167
|
||
|
CVE-2022-34328 - https://github.com/jenaye/PMB
|
||
|
CVE-2022-3434 - https://vuldb.com/?id.210356
|
||
|
CVE-2022-3436 - http://packetstormsecurity.com/files/176007/Online-Student-Clearance-System-1.0-Shell-Upload.html
|
||
|
CVE-2022-3438 - https://huntr.dev/bounties/bc5689e4-221a-4200-a8ab-42c659f89f67
|
||
|
CVE-2022-3439 - https://huntr.dev/bounties/37b86c45-b240-4626-bd53-b6f02d10e0d7
|
||
|
CVE-2022-34393 - https://www.dell.com/support/kbdoc/000204686
|
||
|
CVE-2022-3440 - https://wpscan.com/vulnerability/e39fcf30-1e69-4399-854c-4c5b6ccc22a2
|
||
|
CVE-2022-3441 - https://wpscan.com/vulnerability/7b51b1f0-17ca-46b7-ada1-20bd926f3023
|
||
|
CVE-2022-3442 - https://vuldb.com/?id.210374
|
||
|
CVE-2022-3442 - https://www.pentagrid.ch/en/blog/reflected-xss-vulnerability-in-crealogix-ebics-implementation/
|
||
|
CVE-2022-34446 - https://www.dell.com/support/kbdoc/000205404
|
||
|
CVE-2022-34447 - https://www.dell.com/support/kbdoc/000205404
|
||
|
CVE-2022-34448 - https://www.dell.com/support/kbdoc/000205404
|
||
|
CVE-2022-34449 - https://www.dell.com/support/kbdoc/000205404
|
||
|
CVE-2022-34450 - https://www.dell.com/support/kbdoc/000205404
|
||
|
CVE-2022-34451 - https://www.dell.com/support/kbdoc/000205404
|
||
|
CVE-2022-34460 - https://www.dell.com/support/kbdoc/000204686
|
||
|
CVE-2022-34468 - https://bugzilla.mozilla.org/show_bug.cgi?id=1768537
|
||
|
CVE-2022-34474 - https://bugzilla.mozilla.org/show_bug.cgi?id=1677138
|
||
|
CVE-2022-34482 - https://bugzilla.mozilla.org/show_bug.cgi?id=845880
|
||
|
CVE-2022-34494 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4
|
||
|
CVE-2022-34495 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.4
|
||
|
CVE-2022-34496 - https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading
|
||
|
CVE-2022-34502 - https://github.com/radareorg/radare2/issues/20336
|
||
|
CVE-2022-3451 - https://wpscan.com/vulnerability/d8005cd0-8232-4d43-a4e4-14728eaf1300
|
||
|
CVE-2022-3452 - https://vuldb.com/?id.210436
|
||
|
CVE-2022-34520 - https://github.com/radareorg/radare2/issues/20354
|
||
|
CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/433
|
||
|
CVE-2022-34526 - https://gitlab.com/libtiff/libtiff/-/issues/486
|
||
|
CVE-2022-34527 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-34528 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-34529 - https://github.com/wasm3/wasm3/issues/337
|
||
|
CVE-2022-3453 - https://vuldb.com/?id.210437
|
||
|
CVE-2022-34549 - https://github.com/rawchen/sims/issues/6
|
||
|
CVE-2022-34550 - https://github.com/rawchen/sims/issues/8
|
||
|
CVE-2022-34551 - https://github.com/rawchen/sims/issues/7
|
||
|
CVE-2022-3456 - https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce
|
||
|
CVE-2022-34567 - https://www.redteam.tips/mango-vulnerability-disclosure-report/
|
||
|
CVE-2022-34570 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN579%20X3__messages.md
|
||
|
CVE-2022-34571 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_syslog.shtml.md
|
||
|
CVE-2022-34572 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md
|
||
|
CVE-2022-34573 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_mb_wifibasic.assets/WiFi-Repeater_mb_wifibasic.md
|
||
|
CVE-2022-34574 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_Tftpd32.assets/WiFi-Repeater_Tftpd32.md
|
||
|
CVE-2022-34575 - https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_fctest.assets/WiFi-Repeater_fctest.md
|
||
|
CVE-2022-34576 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Sensitive%20information%20leakage.md
|
||
|
CVE-2022-34577 - https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3_Command%20Execution%20Vulnerability.md
|
||
|
CVE-2022-34578 - https://grimthereaperteam.medium.com/open-source-point-of-sale-v3-3-7-file-upload-cross-site-scripting-4900d717b2c3
|
||
|
CVE-2022-34592 - https://github.com/winmt/CVE/blob/main/WAVLINK%20WL-WN575A3/README.md
|
||
|
CVE-2022-34592 - https://github.com/winmt/my-vuls/tree/main/WAVLINK%20WL-WN575A3
|
||
|
CVE-2022-34593 - https://github.com/Liyou-ZY/POC/issues/1
|
||
|
CVE-2022-34595 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/readme_en.md
|
||
|
CVE-2022-34596 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/tendaAX1803/2/readme_en.md
|
||
|
CVE-2022-34597 - https://github.com/zhefox/IOT_Vul/blob/main/Tenda/TendaAX1806/readme_en.md
|
||
|
CVE-2022-34599 - https://github.com/Darry-lang1/vuln/tree/main/H3C/1
|
||
|
CVE-2022-34600 - https://github.com/Darry-lang1/vuln/tree/main/H3C/3
|
||
|
CVE-2022-34601 - https://github.com/Darry-lang1/vuln/tree/main/H3C/2
|
||
|
CVE-2022-34602 - https://github.com/Darry-lang1/vuln/tree/main/H3C/4
|
||
|
CVE-2022-34603 - https://github.com/Darry-lang1/vuln/tree/main/H3C/5
|
||
|
CVE-2022-34604 - https://github.com/Darry-lang1/vuln/tree/main/H3C/11
|
||
|
CVE-2022-34605 - https://github.com/Darry-lang1/vuln/tree/main/H3C/10
|
||
|
CVE-2022-34606 - https://github.com/Darry-lang1/vuln/tree/main/H3C/6
|
||
|
CVE-2022-34607 - https://github.com/Darry-lang1/vuln/tree/main/H3C/8
|
||
|
CVE-2022-34608 - https://github.com/Darry-lang1/vuln/tree/main/H3C/7
|
||
|
CVE-2022-34609 - https://github.com/Darry-lang1/vuln/tree/main/H3C/9
|
||
|
CVE-2022-34610 - https://github.com/Darry-lang1/vuln/tree/main/H3C/12
|
||
|
CVE-2022-34618 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/
|
||
|
CVE-2022-34619 - https://huntr.dev/bounties/aa610613-6ebb-4544-9aa6-046dc28fe4ff/
|
||
|
CVE-2022-3462 - https://wpscan.com/vulnerability/b583de48-1332-4984-8c0c-a7ed4a2397cd
|
||
|
CVE-2022-3463 - https://wpscan.com/vulnerability/e2a59481-db45-4b8e-b17a-447303469364
|
||
|
CVE-2022-3464 - https://vuldb.com/?id.210699
|
||
|
CVE-2022-34652 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1551
|
||
|
CVE-2022-34668 - http://packetstormsecurity.com/files/171483/NVFLARE-Unsafe-Deserialization.html
|
||
|
CVE-2022-34669 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34670 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34671 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1719
|
||
|
CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1720
|
||
|
CVE-2022-34671 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1721
|
||
|
CVE-2022-34672 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34673 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34674 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34675 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34676 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34677 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34678 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34679 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34680 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34681 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34682 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34683 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-34684 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-3469 - https://wpscan.com/vulnerability/017ca231-e019-4694-afa2-ab7f8481ae63
|
||
|
CVE-2022-3470 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20sc%20parameter%20is%20injected.pdf
|
||
|
CVE-2022-34704 - http://packetstormsecurity.com/files/168329/Windows-Credential-Guard-Non-Constant-Time-Comparison-Information-Disclosure.html
|
||
|
CVE-2022-34705 - http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html
|
||
|
CVE-2022-34707 - http://packetstormsecurity.com/files/168311/Windows-Kernel-Refcount-Overflow-Use-After-Free.html
|
||
|
CVE-2022-34708 - http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html
|
||
|
CVE-2022-34709 - http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html
|
||
|
CVE-2022-3471 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20searccity%20parameter%20is%20injected.pdf
|
||
|
CVE-2022-3471 - https://vuldb.com/?id.210715
|
||
|
CVE-2022-34710 - http://packetstormsecurity.com/files/168318/Windows-Credential-Guard-Insufficient-Checks-On-Kerberos-Encryption-Type-Use.html
|
||
|
CVE-2022-34711 - http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html
|
||
|
CVE-2022-34712 - http://packetstormsecurity.com/files/168326/Windows-Credential-Guard-KerbIumGetNtlmSupplementalCredential-Information-Disclosure.html
|
||
|
CVE-2022-34716 - http://packetstormsecurity.com/files/168332/.NET-XML-Signature-Verification-External-Entity-Injection.html
|
||
|
CVE-2022-3472 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20cityedit%20parameter%20is%20injected.pdf
|
||
|
CVE-2022-3472 - https://vuldb.com/?id.210716
|
||
|
CVE-2022-3473 - https://github.com/Hanfu-l/POC-Exp/blob/main/The%20Human%20Resource%20Management%20System%20ci%20parameter%20is%20injected.pdf
|
||
|
CVE-2022-3473 - https://vuldb.com/?id.210717
|
||
|
CVE-2022-34753 - http://packetstormsecurity.com/files/167783/Schneider-Electric-SpaceLogic-C-Bus-Home-Controller-5200WHC2-Remote-Root.html
|
||
|
CVE-2022-34756 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
|
||
|
CVE-2022-34757 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
|
||
|
CVE-2022-34758 - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
|
||
|
CVE-2022-3477 - https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef
|
||
|
CVE-2022-3481 - https://wpscan.com/vulnerability/c5e395f8-257e-49eb-afbd-9c1e26045373
|
||
|
CVE-2022-3484 - https://wpscan.com/vulnerability/3afaed61-6187-4915-acf0-16e79d5c2464
|
||
|
CVE-2022-34845 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1580
|
||
|
CVE-2022-34850 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1578
|
||
|
CVE-2022-3486 - https://gitlab.com/gitlab-org/gitlab/-/issues/377810
|
||
|
CVE-2022-34873 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-34874 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-34875 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-3489 - https://wpscan.com/vulnerability/36d78b6c-0da5-44f8-b7b3-eae78edac505
|
||
|
CVE-2022-3490 - https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136
|
||
|
CVE-2022-34903 - http://www.openwall.com/lists/oss-security/2022/07/02/1
|
||
|
CVE-2022-34903 - https://www.openwall.com/lists/oss-security/2022/06/30/1
|
||
|
CVE-2022-34906 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/
|
||
|
CVE-2022-34906 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244
|
||
|
CVE-2022-34907 - https://claroty.com/2022/07/25/blog-research-with-management-comes-risk-finding-flaws-in-filewave-mdm/
|
||
|
CVE-2022-34907 - https://kb.filewave.com/pages/viewpage.action?pageId=55544244
|
||
|
CVE-2022-3491 - https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb
|
||
|
CVE-2022-34914 - https://www.webswing.org/blog/header-injection-vulnerability-cve-2022-34914
|
||
|
CVE-2022-34918 - http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
|
||
|
CVE-2022-34918 - http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html
|
||
|
CVE-2022-34918 - http://www.openwall.com/lists/oss-security/2022/07/05/1
|
||
|
CVE-2022-34918 - https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u
|
||
|
CVE-2022-34918 - https://www.openwall.com/lists/oss-security/2022/07/02/3
|
||
|
CVE-2022-34918 - https://www.randorisec.fr/crack-linux-firewall/
|
||
|
CVE-2022-34937 - https://github.com/u5cms/u5cms/issues/51
|
||
|
CVE-2022-3494 - https://wpscan.com/vulnerability/71db75c0-5907-4237-884f-8db88b1a9b34
|
||
|
CVE-2022-3495 - https://github.com/Hakcoder/Simple-Online-Public-Access-Catalog-OPAC---SQL-injection/blob/main/POC
|
||
|
CVE-2022-3495 - https://vuldb.com/?id.210784
|
||
|
CVE-2022-34955 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261
|
||
|
CVE-2022-34956 - https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261
|
||
|
CVE-2022-34961 - https://grimthereaperteam.medium.com/cve-2022-34961-ossn-6-3-lts-stored-xss-vulnerability-at-users-timeline-819a9d4e5e6c
|
||
|
CVE-2022-34962 - https://grimthereaperteam.medium.com/cve-2022-34962-ossn-6-3-lts-stored-xss-vulnerability-at-group-timeline-6ebe28dd6034
|
||
|
CVE-2022-34963 - https://grimthereaperteam.medium.com/cve-2022-34963-ossn-6-3-lts-stored-xss-vulnerability-at-news-feed-b8ae8f2fa5f3
|
||
|
CVE-2022-34964 - https://grimthereaperteam.medium.com/ossn-6-3-lts-stored-xss-vulnerability-at-sitepages-ba91bbeccf1c
|
||
|
CVE-2022-34965 - https://grimthereaperteam.medium.com/cve-2022-34965-open-source-social-network-6-3-3f61db82880
|
||
|
CVE-2022-34966 - https://grimthereaperteam.medium.com/cve-2022-34966-ossn-6-3-lts-html-injection-vulnerability-at-location-parameter-3fe791dd22c6
|
||
|
CVE-2022-34968 - https://jira.percona.com/browse/PS-8294
|
||
|
CVE-2022-34970 - https://github.com/0xhebi/CVE-2022-34970/blob/master/report.md
|
||
|
CVE-2022-34972 - https://packetstormsecurity.com/files/167605/OpenCart-3.x-So-Filter-Shop-By-SQL-Injection.html
|
||
|
CVE-2022-34973 - https://github.com/1759134370/iot/blob/main/DIR-820L.md
|
||
|
CVE-2022-34973 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-34974 - https://github.com/1759134370/iot/blob/main/DIR-810L.md
|
||
|
CVE-2022-34974 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-34988 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Inout-Blockchain-AltExchanger/2022/Cross-site-scripting-DOM-based-IG-js
|
||
|
CVE-2022-34989 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Md-Saiful-Islam-creativesaiful/2021/Ecommerce-project-with-php-and-mysqli-Fruits-Bazar
|
||
|
CVE-2022-35014 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md
|
||
|
CVE-2022-35015 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md
|
||
|
CVE-2022-35016 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md
|
||
|
CVE-2022-35017 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md
|
||
|
CVE-2022-35018 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md
|
||
|
CVE-2022-35019 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md
|
||
|
CVE-2022-3502 - https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss
|
||
|
CVE-2022-35020 - https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md
|
||
|
CVE-2022-35021 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35021.md
|
||
|
CVE-2022-35022 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35022.md
|
||
|
CVE-2022-35023 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35023.md
|
||
|
CVE-2022-35024 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35024.md
|
||
|
CVE-2022-35025 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35025.md
|
||
|
CVE-2022-35026 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35026.md
|
||
|
CVE-2022-35027 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35027.md
|
||
|
CVE-2022-35028 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35028.md
|
||
|
CVE-2022-35029 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35029.md
|
||
|
CVE-2022-3503 - https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC
|
||
|
CVE-2022-35030 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35030.md
|
||
|
CVE-2022-35031 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35031.md
|
||
|
CVE-2022-35032 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35032.md
|
||
|
CVE-2022-35034 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35034.md
|
||
|
CVE-2022-35035 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35035.md
|
||
|
CVE-2022-35036 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35036.md
|
||
|
CVE-2022-35037 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35037.md
|
||
|
CVE-2022-35038 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35038.md
|
||
|
CVE-2022-35039 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35039.md
|
||
|
CVE-2022-35040 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35040.md
|
||
|
CVE-2022-35041 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35041.md
|
||
|
CVE-2022-35042 - https://drive.google.com/file/d/1Gj8rA1kD89lxUZVb_t-s3-18-ospJRJC/view?usp=sharing
|
||
|
CVE-2022-35042 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35042.md
|
||
|
CVE-2022-35043 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35043.md
|
||
|
CVE-2022-35044 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35044.md
|
||
|
CVE-2022-35045 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35045.md
|
||
|
CVE-2022-35046 - https://drive.google.com/file/d/1M8imA5zUlsMA6lgUbvLQ6rbEn6CO6QKq/view?usp=sharing
|
||
|
CVE-2022-35046 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35046.md
|
||
|
CVE-2022-35047 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35047.md
|
||
|
CVE-2022-35048 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35048.md
|
||
|
CVE-2022-35049 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35049.md
|
||
|
CVE-2022-35050 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35050.md
|
||
|
CVE-2022-35051 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35051.md
|
||
|
CVE-2022-35052 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35052.md
|
||
|
CVE-2022-35053 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35053.md
|
||
|
CVE-2022-35054 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35054.md
|
||
|
CVE-2022-35055 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35055.md
|
||
|
CVE-2022-35056 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35056.md
|
||
|
CVE-2022-35058 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35058.md
|
||
|
CVE-2022-35059 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35059.md
|
||
|
CVE-2022-3506 - https://huntr.dev/bounties/08251542-88f6-4264-9074-a89984034828
|
||
|
CVE-2022-35060 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35060.md
|
||
|
CVE-2022-35061 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35061.md
|
||
|
CVE-2022-35062 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35062.md
|
||
|
CVE-2022-35063 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35063.md
|
||
|
CVE-2022-35064 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35064.md
|
||
|
CVE-2022-35065 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35065.md
|
||
|
CVE-2022-35066 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35066.md
|
||
|
CVE-2022-35067 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35067.md
|
||
|
CVE-2022-35068 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35068.md
|
||
|
CVE-2022-35069 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35069.md
|
||
|
CVE-2022-35070 - https://github.com/Cvjark/Poc/blob/main/otfcc/CVE-2022-35070.md
|
||
|
CVE-2022-35080 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35080.md
|
||
|
CVE-2022-35081 - https://github.com/Cvjark/Poc/blob/main/swftools/png2swf/CVE-2022-35081.md
|
||
|
CVE-2022-35085 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35085.md
|
||
|
CVE-2022-35086 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35086.md
|
||
|
CVE-2022-35087 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35087.md
|
||
|
CVE-2022-35088 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35088.md
|
||
|
CVE-2022-35089 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35089.md
|
||
|
CVE-2022-35090 - https://github.com/Cvjark/Poc/blob/main/swftools/gif2swf/CVE-2022-35090.md
|
||
|
CVE-2022-35091 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35091.md
|
||
|
CVE-2022-35092 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35092.md
|
||
|
CVE-2022-35093 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35093.md
|
||
|
CVE-2022-35094 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35094.md
|
||
|
CVE-2022-35095 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35095.md
|
||
|
CVE-2022-35096 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35096.md
|
||
|
CVE-2022-35097 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35097.md
|
||
|
CVE-2022-35098 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35098.md
|
||
|
CVE-2022-35099 - https://github.com/Cvjark/Poc/blob/main/swftools/pdf2swf/CVE-2022-35099.md
|
||
|
CVE-2022-35107 - https://github.com/matthiaskramm/swftools/issues/184
|
||
|
CVE-2022-35108 - https://github.com/matthiaskramm/swftools/issues/184
|
||
|
CVE-2022-35109 - https://github.com/matthiaskramm/swftools/issues/184
|
||
|
CVE-2022-3511 - https://wpscan.com/vulnerability/9e57285a-0023-4711-874c-6e7b3c2673d1
|
||
|
CVE-2022-35110 - https://github.com/matthiaskramm/swftools/issues/184
|
||
|
CVE-2022-35111 - https://github.com/matthiaskramm/swftools/issues/184
|
||
|
CVE-2022-35122 - https://www.pizzapower.me/2022/06/30/the-incredibly-insecure-weather-station/
|
||
|
CVE-2022-35131 - https://github.com/laurent22/joplin/releases/tag/v2.9.1
|
||
|
CVE-2022-35131 - https://github.com/ly1g3/Joplin-CVE-2022-35131
|
||
|
CVE-2022-35134 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35134.html
|
||
|
CVE-2022-35135 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html
|
||
|
CVE-2022-35136 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35135-cve-2022-35136.html
|
||
|
CVE-2022-35137 - https://securityblog101.blogspot.com/2022/09/cve-id-cve-2022-35137.html
|
||
|
CVE-2022-3514 - https://gitlab.com/gitlab-org/gitlab/-/issues/377978
|
||
|
CVE-2022-35147 - https://github.com/doramart/DoraCMS/issues/256
|
||
|
CVE-2022-35150 - https://github.com/To-LingJing/CVE-Issues/blob/main/baijiacms/upload_file.md
|
||
|
CVE-2022-35151 - https://github.com/kekingcn/kkFileView/issues/366
|
||
|
CVE-2022-35154 - https://github.com/secf0ra11/secf0ra11.github.io/blob/main/Shopro_SQL_injection.md
|
||
|
CVE-2022-35155 - https://github.com/shellshok3/Cross-Site-Scripting-XSS/blob/main/Bus%20Pass%20Management%20System%201.0.md
|
||
|
CVE-2022-35156 - https://packetstormsecurity.com/files/168555/Bus-Pass-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-3516 - https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748
|
||
|
CVE-2022-35164 - https://github.com/LibreDWG/libredwg/issues/497
|
||
|
CVE-2022-35165 - https://github.com/axiomatic-systems/Bento4/issues/712
|
||
|
CVE-2022-35166 - https://github.com/thorfdbg/libjpeg/issues/76
|
||
|
CVE-2022-35168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35173 - https://github.com/nginx/njs/issues/553
|
||
|
CVE-2022-35174 - https://www.youtube.com/watch?v=0lngc_zPTSg
|
||
|
CVE-2022-3518 - https://github.com/lohith19/CVE-2022-3518/blob/main/POC
|
||
|
CVE-2022-35191 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-35192 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-35193 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35193
|
||
|
CVE-2022-35194 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35194
|
||
|
CVE-2022-35195 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35195
|
||
|
CVE-2022-35196 - https://github.com/HuangYuHsiangPhone/CVEs/tree/main/TestLink/CVE-2022-35196
|
||
|
CVE-2022-3520 - https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
|
||
|
CVE-2022-35203 - https://medium.com/@shrutukapoor25/cve-2022-35203-2372a0728279
|
||
|
CVE-2022-35204 - https://github.com/vitejs/vite/issues/8498
|
||
|
CVE-2022-35206 - https://sourceware.org/bugzilla/show_bug.cgi?id=29290
|
||
|
CVE-2022-3521 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec7eede369fe5b0d085ac51fdbb95184f87bfc6c
|
||
|
CVE-2022-35224 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35225 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35226 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35227 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35228 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-3523 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16ce101db85db694a91380aa4c89b25530871d33
|
||
|
CVE-2022-3524 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
|
||
|
CVE-2022-35244 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1582
|
||
|
CVE-2022-3525 - https://huntr.dev/bounties/ed048e8d-87af-440a-a91f-be1e65a40330
|
||
|
CVE-2022-35260 - http://seclists.org/fulldisclosure/2023/Jan/19
|
||
|
CVE-2022-35261 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35262 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35263 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35264 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35265 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35266 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35267 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35268 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35269 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35270 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35271 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1575
|
||
|
CVE-2022-35290 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35291 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35292 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35293 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35294 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35295 - http://packetstormsecurity.com/files/170233/SAP-Host-Agent-Privilege-Escalation.html
|
||
|
CVE-2022-35295 - http://seclists.org/fulldisclosure/2022/Dec/12
|
||
|
CVE-2022-35295 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35296 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35297 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35298 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-35299 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-3536 - https://wpscan.com/vulnerability/6af63aab-b7a6-4ef6-8604-4b4b99467a34
|
||
|
CVE-2022-3537 - https://wpscan.com/vulnerability/696868f7-409d-422d-87f4-92fc6bf6e74e
|
||
|
CVE-2022-3538 - https://wpscan.com/vulnerability/337ee7ed-9ade-4567-b976-88386cbcf036
|
||
|
CVE-2022-3539 - https://wpscan.com/vulnerability/ab3b0052-1a74-4ba3-b6d2-78cfe56029db
|
||
|
CVE-2022-35401 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1586
|
||
|
CVE-2022-35405 - http://packetstormsecurity.com/files/167918/Zoho-Password-Manager-Pro-XML-RPC-Java-Deserialization.html
|
||
|
CVE-2022-35405 - https://www.manageengine.com/products/passwordmanagerpro/advisory/cve-2022-35405.html
|
||
|
CVE-2022-35411 - http://packetstormsecurity.com/files/167872/rpc.py-0.6.0-Remote-Code-Execution.html
|
||
|
CVE-2022-35411 - https://medium.com/@elias.hohl/remote-code-execution-0-day-in-rpc-py-709c76690c30
|
||
|
CVE-2022-35413 - https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview
|
||
|
CVE-2022-35413 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
||
|
CVE-2022-35414 - https://sick.codes/sick-2022-113
|
||
|
CVE-2022-3546 - https://github.com/thehackingverse/Stored-xss-/blob/main/Poc
|
||
|
CVE-2022-3547 - https://github.com/lakshaya0557/POCs/blob/main/POC
|
||
|
CVE-2022-3548 - https://github.com/Ramansh123454/POCs/blob/main/POC
|
||
|
CVE-2022-3548 - https://vuldb.com/?id.211048
|
||
|
CVE-2022-3549 - https://github.com/Ramansh123454/POCs/blob/main/CSMS_RCE
|
||
|
CVE-2022-35493 - https://github.com/Keyvanhardani/Exploit-eShop-Multipurpose-Ecommerce-Store-Website-3.0.4-Cross-Site-Scripting-XSS/blob/main/README.md
|
||
|
CVE-2022-35503 - https://osm.etsi.org/
|
||
|
CVE-2022-35503 - https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure
|
||
|
CVE-2022-35505 - https://github.com/h3xduck/TripleCross/issues/40
|
||
|
CVE-2022-35506 - https://github.com/h3xduck/TripleCross/issues/40
|
||
|
CVE-2022-35507 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/
|
||
|
CVE-2022-35508 - https://starlabs.sg/blog/2022/12-multiple-vulnerabilites-in-proxmox-ve--proxmox-mail-gateway/
|
||
|
CVE-2022-35513 - http://packetstormsecurity.com/files/168428/Blink1Control2-2.2.7-Weak-Password-Encryption.html
|
||
|
CVE-2022-35513 - https://github.com/p1ckzi/CVE-2022-35513
|
||
|
CVE-2022-35516 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.93/Login.poc.md
|
||
|
CVE-2022-35517 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi
|
||
|
CVE-2022-35518 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-nas_diskshtml-command-injection-in-nascgi
|
||
|
CVE-2022-35519 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-deleting-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi
|
||
|
CVE-2022-3552 - http://packetstormsecurity.com/files/171542/BoxBilling-4.22.1.5-Remote-Code-Execution.html
|
||
|
CVE-2022-3552 - https://huntr.dev/bounties/c6e2973d-386d-4667-9426-10d10828539b
|
||
|
CVE-2022-35520 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-hidden-parameter-ufconf-command-injection-in-apicgi
|
||
|
CVE-2022-35521 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-man_securityshtml-command-injection-in-firewallcgi
|
||
|
CVE-2022-35522 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wanshtml-command-injection-in-admcgi
|
||
|
CVE-2022-35523 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi
|
||
|
CVE-2022-35524 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi
|
||
|
CVE-2022-35525 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-ledonoffshtml-command-injection-in-admcgi
|
||
|
CVE-2022-35526 - https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-loginshtml-command-injection-in-logincgi
|
||
|
CVE-2022-35533 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-hidden-parameters-command-injection-in-qoscgi
|
||
|
CVE-2022-35534 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_multi_ssidshtml-command-injection-in-wirelesscgi
|
||
|
CVE-2022-35535 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-adding-extender-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi
|
||
|
CVE-2022-35536 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-qosshtml-command-injection-in-qoscgi
|
||
|
CVE-2022-35537 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#wavlink-router-ac1200-page-wifi_meshshtml-hidden-parameter-command-injection-in-wirelesscgi
|
||
|
CVE-2022-35538 - https://github.com/TyeYeah/othercveinfo/tree/main/wavlink#command-injection-occurs-when-clicking-the-button-in-wavlink-router-ac1200-page-wifi_meshshtml-in-wirelesscgi
|
||
|
CVE-2022-35540 - https://github.com/dotnetcore/AgileConfig/issues/91
|
||
|
CVE-2022-3558 - https://wpscan.com/vulnerability/e3d72e04-9cdf-4b7d-953e-876e26abdfc6
|
||
|
CVE-2022-35582 - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb
|
||
|
CVE-2022-35583 - http://packetstormsecurity.com/files/171446/wkhtmltopdf-0.12.6-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-35583 - https://drive.google.com/file/d/1LAmf_6CJLk5qDp0an2s_gVQ0TN2wmht5/view?usp=sharing
|
||
|
CVE-2022-35585 - https://huntr.dev/bounties/5-other-forkcms/
|
||
|
CVE-2022-35587 - https://huntr.dev/bounties/6-other-forkcms/
|
||
|
CVE-2022-35589 - https://huntr.dev/bounties/7-other-forkcms/
|
||
|
CVE-2022-35590 - https://huntr.dev/bounties/4-other-forkcms/
|
||
|
CVE-2022-35598 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35599 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35601 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35602 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35603 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35604 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35605 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35606 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-35611 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35611.html
|
||
|
CVE-2022-35612 - https://securityblog101.blogspot.com/2022/10/cve-id-cve-2022-35612.html
|
||
|
CVE-2022-35619 - https://github.com/1759134370/iot/blob/main/DIR-818L.md
|
||
|
CVE-2022-35619 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-3562 - https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657
|
||
|
CVE-2022-35620 - https://github.com/1759134370/iot/blob/main/DIR-818L.md
|
||
|
CVE-2022-35620 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-35621 - https://github.com/MacherCS/CVE_Evoh_Contract
|
||
|
CVE-2022-3569 - http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html
|
||
|
CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/381
|
||
|
CVE-2022-3570 - https://gitlab.com/libtiff/libtiff/-/issues/386
|
||
|
CVE-2022-35737 - https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
|
||
|
CVE-2022-35739 - https://raxis.com/blog/cve-2022-35739
|
||
|
CVE-2022-3574 - https://wpscan.com/vulnerability/0eae5189-81af-4344-9e96-dd1f4e223d41
|
||
|
CVE-2022-35768 - http://packetstormsecurity.com/files/168313/Windows-Kernel-Registry-Hive-Memory-Problems.html
|
||
|
CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=945a9a8e448b65bec055d37eba58f711b39f66f0
|
||
|
CVE-2022-3577 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc4ef9d5724973193bfa5ebed181dba6de3a56db
|
||
|
CVE-2022-35771 - http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html
|
||
|
CVE-2022-3578 - https://wpscan.com/vulnerability/17596b0e-ff45-4d0c-8e57-a31101e30345
|
||
|
CVE-2022-3579 - https://github.com/DisguisedRoot/Exploit/blob/main/SQLInj/POC
|
||
|
CVE-2022-3579 - https://vuldb.com/?id.211186
|
||
|
CVE-2022-3582 - https://github.com/jusstSahil/CSRF-/blob/main/POC
|
||
|
CVE-2022-35822 - http://packetstormsecurity.com/files/168331/Windows-Credential-Guard-TGT-Renewal-Information-Disclosure.html
|
||
|
CVE-2022-3583 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql1.md
|
||
|
CVE-2022-3583 - https://vuldb.com/?id.211192
|
||
|
CVE-2022-3584 - https://github.com/joinia/webray.com.cn/blob/main/Canteen-Management-System/Canteensql2.md
|
||
|
CVE-2022-3585 - https://github.com/souravkr529/CSRF-in-Cold-Storage-Management-System/blob/main/PoC
|
||
|
CVE-2022-35866 - http://packetstormsecurity.com/files/176794/Vinchin-Backup-And-Recovery-7.2-Default-MySQL-Credentials.html
|
||
|
CVE-2022-3587 - https://github.com/rsrahulsingh05/POC/blob/main/Stored%20XSS
|
||
|
CVE-2022-35874 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
||
|
CVE-2022-35875 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
||
|
CVE-2022-35876 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
||
|
CVE-2022-35877 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581
|
||
|
CVE-2022-35878 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
||
|
CVE-2022-35879 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
||
|
CVE-2022-35880 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
||
|
CVE-2022-35881 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1583
|
||
|
CVE-2022-35884 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
||
|
CVE-2022-35885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
||
|
CVE-2022-35886 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
||
|
CVE-2022-35887 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585
|
||
|
CVE-2022-35890 - https://github.com/sourceincite/randy
|
||
|
CVE-2022-35899 - https://github.com/AngeloPioAmirante/CVE-2022-35899
|
||
|
CVE-2022-35899 - https://packetstormsecurity.com/files/167763/Asus-GameSDK-1.0.0.4-Unquoted-Service-Path.html
|
||
|
CVE-2022-35899 - https://www.exploit-db.com/exploits/50985
|
||
|
CVE-2022-3590 - https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11
|
||
|
CVE-2022-3591 - https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
|
||
|
CVE-2022-35911 - https://packetstormsecurity.com/files/167797/Patlite-1.46-Buffer-Overflow.html
|
||
|
CVE-2022-35913 - https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-July/020737.html
|
||
|
CVE-2022-35914 - http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html
|
||
|
CVE-2022-35919 - http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html
|
||
|
CVE-2022-35923 - https://huntr.dev/bounties/2d92f644-593b-43b4-bfd1-c8042ac60609/
|
||
|
CVE-2022-35925 - https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/
|
||
|
CVE-2022-35953 - https://huntr.dev/bounties/67ca22bd-19c6-466b-955a-b1ee2da0c575/
|
||
|
CVE-2022-3597 - https://gitlab.com/libtiff/libtiff/-/issues/413
|
||
|
CVE-2022-3598 - https://gitlab.com/libtiff/libtiff/-/issues/435
|
||
|
CVE-2022-3599 - https://gitlab.com/libtiff/libtiff/-/issues/398
|
||
|
CVE-2022-3600 - https://wpscan.com/vulnerability/16e2d970-19d0-42d1-8fb1-e7cb14ace1d0
|
||
|
CVE-2022-3601 - https://wpscan.com/vulnerability/28b7ee77-5826-4c98-b09a-8f197e1a6d18
|
||
|
CVE-2022-3602 - http://packetstormsecurity.com/files/169687/OpenSSL-Security-Advisory-20221101.html
|
||
|
CVE-2022-3603 - https://wpscan.com/vulnerability/376e2bc7-2eb9-4e0a-809c-1582940ebdc7
|
||
|
CVE-2022-3604 - https://wpscan.com/vulnerability/300ebfcd-c500-464e-b919-acfeb72593de/
|
||
|
CVE-2022-3605 - https://wpscan.com/vulnerability/28ecdf61-e478-42c3-87c0-80a9912eadb2
|
||
|
CVE-2022-36067 - https://github.com/patriksimek/vm2/issues/467
|
||
|
CVE-2022-36067 - https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067
|
||
|
CVE-2022-36069 - https://www.sonarsource.com/blog/securing-developer-tools-package-managers/
|
||
|
CVE-2022-3608 - https://huntr.dev/bounties/8f0f3635-9d81-4c55-9826-2ba955c3a850
|
||
|
CVE-2022-36082 - https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw
|
||
|
CVE-2022-36087 - https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
|
||
|
CVE-2022-3609 - https://wpscan.com/vulnerability/b893cac2-6511-4e2a-9eff-baf0f3cc9d7e
|
||
|
CVE-2022-3610 - https://wpscan.com/vulnerability/33b52dd7-613f-46e4-b8ee-beddd31689eb
|
||
|
CVE-2022-36111 - https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake
|
||
|
CVE-2022-36115 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36116 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36117 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36118 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36119 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36120 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36121 - https://community.blueprism.com/discussion/security-vulnerability-notification-ssc-blue-prism-enterprise
|
||
|
CVE-2022-36123 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.13
|
||
|
CVE-2022-36123 - https://github.com/sickcodes/security/blob/master/advisories/SICK-2022-128.md
|
||
|
CVE-2022-36123 - https://sick.codes/sick-2022-128
|
||
|
CVE-2022-36126 - https://github.com/sourceincite/randy
|
||
|
CVE-2022-36126 - https://srcincite.io/advisories/src-2022-0014/
|
||
|
CVE-2022-36131 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-038.txt
|
||
|
CVE-2022-36136 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-deposit-commend-839d2c587d6e
|
||
|
CVE-2022-36137 - https://grimthereaperteam.medium.com/churchcrm-version-4-4-5-stored-xss-vulnerability-at-sheader-2ed4184030f7
|
||
|
CVE-2022-36139 - https://github.com/djcsdy/swfmill/issues/56
|
||
|
CVE-2022-36140 - https://github.com/djcsdy/swfmill/issues/57
|
||
|
CVE-2022-36141 - https://github.com/djcsdy/swfmill/issues/58
|
||
|
CVE-2022-36142 - https://github.com/djcsdy/swfmill/issues/61
|
||
|
CVE-2022-36143 - https://github.com/djcsdy/swfmill/issues/62
|
||
|
CVE-2022-36144 - https://github.com/djcsdy/swfmill/issues/63
|
||
|
CVE-2022-36145 - https://github.com/djcsdy/swfmill/issues/64
|
||
|
CVE-2022-36146 - https://github.com/djcsdy/swfmill/issues/65
|
||
|
CVE-2022-36148 - https://github.com/nu774/fdkaac/issues/52
|
||
|
CVE-2022-36161 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Orange-Station-1.0
|
||
|
CVE-2022-36170 - https://github.com/prismbreak/vulnerabilities/issues/2
|
||
|
CVE-2022-36171 - https://github.com/prismbreak/vulnerabilities/issues/2
|
||
|
CVE-2022-36173 - https://public-exposure.inform.social/post/integrity-checking/
|
||
|
CVE-2022-36174 - https://public-exposure.inform.social/post/integrity-checking/
|
||
|
CVE-2022-36179 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
|
||
|
CVE-2022-3618 - https://wpscan.com/vulnerability/2011dc7b-8e8c-4190-ab34-de288e14685b
|
||
|
CVE-2022-36180 - https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
|
||
|
CVE-2022-36182 - https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Clickjacking.html
|
||
|
CVE-2022-36186 - https://github.com/gpac/gpac/issues/2223
|
||
|
CVE-2022-36190 - https://github.com/gpac/gpac/issues/2220
|
||
|
CVE-2022-36191 - https://github.com/gpac/gpac/issues/2218
|
||
|
CVE-2022-36193 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-36193/POC.md
|
||
|
CVE-2022-36194 - http://packetstormsecurity.com/files/168149/Centreon-22.04.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-36194 - https://github.com/amdsyad/poc-dump/blob/main/Stored%20XSS%20in%20name%20parameter%20in%20Centreon%20version%2022.04.0
|
||
|
CVE-2022-36197 - https://github.com/bigtreecms/BigTree-CMS/issues/392
|
||
|
CVE-2022-36198 - https://github.com/jcarabantes/Bus-Vulnerabilities
|
||
|
CVE-2022-36200 - https://github.com/afaq1337/CVE-2022-36200
|
||
|
CVE-2022-36201 - http://packetstormsecurity.com/files/168212/Doctors-Appointment-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-36203 - http://packetstormsecurity.com/files/168211/Doctors-Appointment-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-36215 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedebiz/6.0.0/sys_info.poc.md
|
||
|
CVE-2022-36216 - https://github.com/whitehatl/Vulnerability/blob/main/web/dedecms/5.7.94/member_toadmin.poc.md
|
||
|
CVE-2022-36223 - https://medium.com/@cupc4k3/administrator-account-takeover-in-emby-media-server-616fc2a6704f
|
||
|
CVE-2022-36224 - https://github.com/dayrui/xunruicms/issues/1
|
||
|
CVE-2022-36225 - https://github.com/weng-xianhu/eyoucms/issues/26
|
||
|
CVE-2022-36226 - https://github.com/we1h0/SiteServer-CMS-Remote-download-Getshell
|
||
|
CVE-2022-36227 - https://github.com/libarchive/libarchive/issues/1754
|
||
|
CVE-2022-36231 - https://github.com/affix/CVE-2022-36231
|
||
|
CVE-2022-36234 - https://github.com/kashimAstro/SimpleNetwork/issues/22
|
||
|
CVE-2022-36251 - https://github.com/ZhenKaiHe/bug_report/blob/main/vendors/onetnom23/clinics-patient-management-system/XSS-1.md
|
||
|
CVE-2022-36254 - https://gist.github.com/ziyishen97/c464b459df73c4cef241e7ec774b7cf6
|
||
|
CVE-2022-36255 - https://gist.github.com/ziyishen97/268678bca3034c64861b135946ee9fc3
|
||
|
CVE-2022-36255 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-36256 - https://gist.github.com/ziyishen97/0fd90a5939ffb401e8a74f4a415e1610
|
||
|
CVE-2022-36256 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-36257 - https://gist.github.com/ziyishen97/ff3816032a76796f45368ed243ab3343
|
||
|
CVE-2022-36257 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-36258 - https://gist.github.com/ziyishen97/3553468b534c250f7b0d47e8a4c5fa52
|
||
|
CVE-2022-36258 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-36259 - https://gist.github.com/ziyishen97/47666f584cd4cdad1d0f6af5f33a56db
|
||
|
CVE-2022-36259 - https://github.com/sazanrjb/InventoryManagementSystem/issues/14
|
||
|
CVE-2022-3626 - https://gitlab.com/libtiff/libtiff/-/issues/426
|
||
|
CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34
|
||
|
CVE-2022-36262 - https://github.com/taogogo/taocms/issues/34?by=xboy(topsec)
|
||
|
CVE-2022-36266 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html
|
||
|
CVE-2022-36267 - http://packetstormsecurity.com/files/168047/AirSpot-5410-0.3.4.1-4-Remote-Command-Injection.html
|
||
|
CVE-2022-36271 - https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
|
||
|
CVE-2022-36273 - https://github.com/F0und-icu/CVEIDs/tree/main/TendaAC9
|
||
|
CVE-2022-36279 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1605
|
||
|
CVE-2022-36280 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2071
|
||
|
CVE-2022-36306 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-9v93-3qpc-hxj9
|
||
|
CVE-2022-36309 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-p295-2jh6-g6g4
|
||
|
CVE-2022-3631 - https://wpscan.com/vulnerability/13966b61-7e65-4493-8bd8-828d6d4441d5
|
||
|
CVE-2022-36310 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-whc6-2989-42xm
|
||
|
CVE-2022-36314 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-36315 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-36316 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-36317 - https://bugzilla.mozilla.org/show_bug.cgi?id=1759951
|
||
|
CVE-2022-36317 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-36318 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-36319 - https://bugzilla.mozilla.org/show_bug.cgi?id=1737722
|
||
|
CVE-2022-36319 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-3632 - https://wpscan.com/vulnerability/4c1b0e5e-245a-4d1f-a561-e91af906e62d
|
||
|
CVE-2022-36320 - https://www.mozilla.org/security/advisories/mfsa2022-28/
|
||
|
CVE-2022-36329 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191
|
||
|
CVE-2022-36330 - https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191
|
||
|
CVE-2022-3634 - https://wpscan.com/vulnerability/b5eeefb0-fb5e-4ca6-a6f0-67f4be4a2b10
|
||
|
CVE-2022-36354 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1629
|
||
|
CVE-2022-36402 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2072
|
||
|
CVE-2022-36429 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1597
|
||
|
CVE-2022-3643 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2022-36436 - https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-bypass/
|
||
|
CVE-2022-36440 - https://github.com/spwpun/pocs
|
||
|
CVE-2022-36440 - https://github.com/spwpun/pocs/blob/main/frr-bgpd.md
|
||
|
CVE-2022-36442 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html
|
||
|
CVE-2022-36443 - https://www.zebra.com/us/en/products/software/mobile-computers/mobile-app-utilities/enterprise-home-screen.html
|
||
|
CVE-2022-36446 - http://packetstormsecurity.com/files/167894/Webmin-1.996-Remote-Code-Execution.html
|
||
|
CVE-2022-36446 - http://packetstormsecurity.com/files/168049/Webmin-Package-Updates-Command-Injection.html
|
||
|
CVE-2022-36446 - https://www.exploit-db.com/exploits/50998
|
||
|
CVE-2022-36447 - https://www.chia.net/2022/07/25/upgrading-the-cat-standard.en.html
|
||
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168431/Arm-Mali-Released-Buffer-Use-After-Free.html
|
||
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168432/Arm-Mali-Physical-Address-Exposure.html
|
||
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168433/Arm-Mali-Race-Condition.html
|
||
|
CVE-2022-36449 - http://packetstormsecurity.com/files/168434/Arm-Mali-CSF-Missing-Buffer-Size-Check.html
|
||
|
CVE-2022-36455 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3600R/1/readme.md
|
||
|
CVE-2022-36456 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A720R/1
|
||
|
CVE-2022-36458 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/2/readme.md
|
||
|
CVE-2022-36459 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/3/readme.md
|
||
|
CVE-2022-36460 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/4/readme.md
|
||
|
CVE-2022-36461 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/5/readme.md
|
||
|
CVE-2022-36462 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/6/readme.md
|
||
|
CVE-2022-36463 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/8/readme.md
|
||
|
CVE-2022-36464 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/10/readme.md
|
||
|
CVE-2022-36465 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/9/readme.md
|
||
|
CVE-2022-36466 - https://github.com/Darry-lang1/vuln/blob/main/TOTOLINK/A3700R/7/readme.md
|
||
|
CVE-2022-36467 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/4/readme.md
|
||
|
CVE-2022-36468 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/5/readme.md
|
||
|
CVE-2022-36469 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/7/readme.md
|
||
|
CVE-2022-36470 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/6/readme.md
|
||
|
CVE-2022-36471 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/2/readme.md
|
||
|
CVE-2022-36472 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/8/readme.md
|
||
|
CVE-2022-36473 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/10/readme.md
|
||
|
CVE-2022-36474 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/9/readme.md
|
||
|
CVE-2022-36475 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20B5Mini/3/readme.md
|
||
|
CVE-2022-36477 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/12/readme.md
|
||
|
CVE-2022-36478 - https://github.com/Darry-lang1/vuln/blob/main/H3C/H3C%20B5Mini/11/readme.md
|
||
|
CVE-2022-36479 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/3
|
||
|
CVE-2022-36480 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/8
|
||
|
CVE-2022-36481 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/1
|
||
|
CVE-2022-36482 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/6
|
||
|
CVE-2022-36483 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/9
|
||
|
CVE-2022-36484 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/7
|
||
|
CVE-2022-36485 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/5
|
||
|
CVE-2022-36486 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/4
|
||
|
CVE-2022-36487 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/2
|
||
|
CVE-2022-36488 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/N350RT/10
|
||
|
CVE-2022-36489 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/1
|
||
|
CVE-2022-36490 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/5
|
||
|
CVE-2022-36491 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/2
|
||
|
CVE-2022-36492 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/4
|
||
|
CVE-2022-36493 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/8
|
||
|
CVE-2022-36494 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/7
|
||
|
CVE-2022-36495 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/6
|
||
|
CVE-2022-36496 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/9
|
||
|
CVE-2022-36497 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/10
|
||
|
CVE-2022-36498 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/3
|
||
|
CVE-2022-36499 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/19
|
||
|
CVE-2022-3650 - https://seclists.org/oss-sec/2022/q4/41
|
||
|
CVE-2022-36500 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/13
|
||
|
CVE-2022-36501 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/16
|
||
|
CVE-2022-36502 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/18
|
||
|
CVE-2022-36503 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/17
|
||
|
CVE-2022-36504 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/11
|
||
|
CVE-2022-36505 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/20
|
||
|
CVE-2022-36506 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/14
|
||
|
CVE-2022-36507 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/12
|
||
|
CVE-2022-36508 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H3C%20NX18%20Plus/15
|
||
|
CVE-2022-36509 - https://github.com/Darry-lang1/vuln/blob/main/H3C/GR3200/1/readme.md
|
||
|
CVE-2022-36510 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR2200/1
|
||
|
CVE-2022-36511 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/2
|
||
|
CVE-2022-36513 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/5
|
||
|
CVE-2022-36514 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/1
|
||
|
CVE-2022-36515 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/4
|
||
|
CVE-2022-36516 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/3
|
||
|
CVE-2022-36517 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/7
|
||
|
CVE-2022-36518 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8
|
||
|
CVE-2022-36519 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/9
|
||
|
CVE-2022-36520 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/10
|
||
|
CVE-2022-36522 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-36522/README.md
|
||
|
CVE-2022-36522 - https://seclists.org/fulldisclosure/2021/Jul/0
|
||
|
CVE-2022-36523 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36524 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36525 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36526 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36532 - https://lutrasecurity.com/en/articles/cve-2022-36532/
|
||
|
CVE-2022-36534 - http://packetstormsecurity.com/files/170245/Syncovery-For-Linux-Web-GUI-Authenticated-Remote-Command-Execution.html
|
||
|
CVE-2022-36537 - https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/
|
||
|
CVE-2022-3654 - http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
|
||
|
CVE-2022-36543 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
||
|
CVE-2022-36544 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
||
|
CVE-2022-36545 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
||
|
CVE-2022-36546 - https://github.com/onEpAth936/cve/blob/master/bug_e/edoc-doctor-appointment-system/Multiple%20SQL%20injection.md
|
||
|
CVE-2022-36551 - http://packetstormsecurity.com/files/171548/Label-Studio-1.5.0-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-36561 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308
|
||
|
CVE-2022-36568 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/3/tenda_ac9_setPptpUserList.md
|
||
|
CVE-2022-36569 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/4/tenda_ac9_setMacFilterCfg.md
|
||
|
CVE-2022-36570 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/1/tenda_ac9_SetLEDCfg.md
|
||
|
CVE-2022-36571 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/Tenda_ac9/2/tenda_ac9_WanParameterSetting.md
|
||
|
CVE-2022-36572 - https://github.com/BreakALegCml/try/blob/main/SinSiuEnterpriseWebsiteSystem
|
||
|
CVE-2022-36577 - https://github.com/Cherry-toto/jizhicms/issues/77
|
||
|
CVE-2022-36579 - https://github.com/wellcms/wellcms/issues/11
|
||
|
CVE-2022-36580 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/Arbitrary-File-Upload-Vulnerability.md
|
||
|
CVE-2022-36581 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Online-Ordering-System/SQL-Injection-Vulnerability.md
|
||
|
CVE-2022-36582 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Garage-Management-System/Arbitrary-File-Upload-Vulnerability.md
|
||
|
CVE-2022-36588 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36593 - https://github.com/kekingcn/kkFileView/issues/370
|
||
|
CVE-2022-36606 - https://github.com/cloudwebsoft/ywoa/issues/25
|
||
|
CVE-2022-36617 - https://startrekdude.github.io/arqbackup.html
|
||
|
CVE-2022-36619 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/setmac/readme.md
|
||
|
CVE-2022-36619 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-3662 - https://github.com/axiomatic-systems/Bento4/issues/802
|
||
|
CVE-2022-36620 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/addRouting
|
||
|
CVE-2022-36620 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/addRouting/readme.md
|
||
|
CVE-2022-36620 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-3663 - https://github.com/axiomatic-systems/Bento4/issues/800
|
||
|
CVE-2022-3663 - https://vuldb.com/?id.212003
|
||
|
CVE-2022-36633 - http://packetstormsecurity.com/files/168477/Teleport-10.1.1-Remote-Code-Execution.html
|
||
|
CVE-2022-36633 - https://github.com/gravitational/teleport
|
||
|
CVE-2022-36633 - https://packetstormsecurity.com/files/168137/Teleport-9.3.6-Command-Injection.html
|
||
|
CVE-2022-36634 - https://seclists.org/fulldisclosure/2022/Sep/29
|
||
|
CVE-2022-36636 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
||
|
CVE-2022-36637 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
||
|
CVE-2022-36638 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
||
|
CVE-2022-36639 - https://senzee.net/index.php/2022/07/21/vulnerability-of-garage-management-system-1-0/
|
||
|
CVE-2022-3664 - https://github.com/axiomatic-systems/Bento4/issues/794
|
||
|
CVE-2022-36640 - http://influxdata.com
|
||
|
CVE-2022-36640 - http://influxdb.com
|
||
|
CVE-2022-36640 - https://www.influxdata.com/
|
||
|
CVE-2022-36642 - https://cyber-guy.gitbook.io/cyber-guy/pocs/omnia-node-mpx-auth-bypass-via-lfd
|
||
|
CVE-2022-36642 - https://www.exploit-db.com/exploits/50996
|
||
|
CVE-2022-36647 - https://github.com/pkuvcl/davs2/issues/29
|
||
|
CVE-2022-3665 - https://github.com/axiomatic-systems/Bento4/issues/794
|
||
|
CVE-2022-36657 - https://github.com/z1pwn/bug_report/blob/main/vendors/kingbhob02/library-management-system/XSS-1.md
|
||
|
CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip
|
||
|
CVE-2022-3666 - https://github.com/axiomatic-systems/Bento4/issues/793
|
||
|
CVE-2022-36664 - https://packetstormsecurity.com/files/168599/Password-Manager-For-IIS-2.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-36667 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md
|
||
|
CVE-2022-36668 - https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md
|
||
|
CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/blob/main/Hospital%20Information%20System/README.md
|
||
|
CVE-2022-36669 - https://github.com/saitamang/POC-DUMP/tree/main/Hospital%20Information%20System
|
||
|
CVE-2022-36669 - https://packetstormsecurity.com/files/167803/Hospital-Information-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip
|
||
|
CVE-2022-3668 - https://github.com/axiomatic-systems/Bento4/issues/776
|
||
|
CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip
|
||
|
CVE-2022-3669 - https://github.com/axiomatic-systems/Bento4/issues/776
|
||
|
CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
|
||
|
CVE-2022-3670 - https://github.com/axiomatic-systems/Bento4/issues/776
|
||
|
CVE-2022-36736 - https://github.com/UditChavda/Udit-Chavda-CVE/blob/main/CVE-2022-36736
|
||
|
CVE-2022-36755 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36756 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-36759 - https://hackmd.io/@hieuleuxuan/OFOS_Sql_Injection
|
||
|
CVE-2022-3677 - https://wpscan.com/vulnerability/5a7c6367-a3e6-4411-8865-2a9dbc9f1450
|
||
|
CVE-2022-36788 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1593
|
||
|
CVE-2022-3679 - https://wpscan.com/vulnerability/ec4b9bf7-71d6-4528-9dd1-cc7779624760
|
||
|
CVE-2022-36804 - http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html
|
||
|
CVE-2022-36804 - http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html
|
||
|
CVE-2022-36879 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
|
||
|
CVE-2022-3688 - https://wpscan.com/vulnerability/03b2c6e6-b86e-4143-a84a-7a99060c4848
|
||
|
CVE-2022-3689 - https://wpscan.com/vulnerability/e9c551a3-7482-4421-8197-5886d028776c
|
||
|
CVE-2022-3690 - https://wpscan.com/vulnerability/725f6ae4-7ec5-4d7c-9533-c9b61b59cc2b
|
||
|
CVE-2022-3691 - https://wpscan.com/vulnerability/4248a0af-1b7e-4e29-8129-3f40c1d0c560
|
||
|
CVE-2022-3694 - https://wpscan.com/vulnerability/ad12bab7-9baf-4646-a93a-0d3286407c1e
|
||
|
CVE-2022-36943 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-vgvw-6xcf-qqfc
|
||
|
CVE-2022-37030 - http://www.openwall.com/lists/oss-security/2022/08/04/1
|
||
|
CVE-2022-37030 - https://bugzilla.suse.com/show_bug.cgi?id=1201949
|
||
|
CVE-2022-37035 - https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing
|
||
|
CVE-2022-37035 - https://github.com/FRRouting/frr/issues/11698
|
||
|
CVE-2022-3704 - https://github.com/rails/rails/issues/46244
|
||
|
CVE-2022-37042 - http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html
|
||
|
CVE-2022-37047 - https://github.com/appneta/tcpreplay/issues/734
|
||
|
CVE-2022-37048 - https://github.com/appneta/tcpreplay/issues/735
|
||
|
CVE-2022-37049 - https://github.com/appneta/tcpreplay/issues/736
|
||
|
CVE-2022-3705 - http://seclists.org/fulldisclosure/2023/Jan/19
|
||
|
CVE-2022-37050 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274
|
||
|
CVE-2022-37051 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276
|
||
|
CVE-2022-37052 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278
|
||
|
CVE-2022-37055 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37056 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37057 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37060 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
||
|
CVE-2022-37060 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php
|
||
|
CVE-2022-37061 - http://packetstormsecurity.com/files/168114/FLIX-AX8-1.46.16-Remote-Command-Execution.html
|
||
|
CVE-2022-37061 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
||
|
CVE-2022-37061 - http://packetstormsecurity.com/files/169701/FLIR-AX8-1.46.16-Remote-Command-Injection.html
|
||
|
CVE-2022-37061 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5491.php
|
||
|
CVE-2022-37062 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
||
|
CVE-2022-37063 - http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html
|
||
|
CVE-2022-37066 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/15
|
||
|
CVE-2022-37067 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/17
|
||
|
CVE-2022-37068 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/14
|
||
|
CVE-2022-37069 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/12
|
||
|
CVE-2022-37070 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/19
|
||
|
CVE-2022-37071 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/18
|
||
|
CVE-2022-37072 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/16
|
||
|
CVE-2022-37073 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/13
|
||
|
CVE-2022-37074 - https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/11
|
||
|
CVE-2022-37075 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/7
|
||
|
CVE-2022-37076 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/4
|
||
|
CVE-2022-37077 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/9
|
||
|
CVE-2022-37078 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/6
|
||
|
CVE-2022-37079 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/5
|
||
|
CVE-2022-37080 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/8
|
||
|
CVE-2022-37081 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/2
|
||
|
CVE-2022-37082 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/3
|
||
|
CVE-2022-37083 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/1
|
||
|
CVE-2022-37084 - https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/10
|
||
|
CVE-2022-37085 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/9
|
||
|
CVE-2022-37086 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/3
|
||
|
CVE-2022-37087 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/6
|
||
|
CVE-2022-37088 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/4
|
||
|
CVE-2022-37089 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/2
|
||
|
CVE-2022-37090 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/8
|
||
|
CVE-2022-37091 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/10
|
||
|
CVE-2022-37092 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/5
|
||
|
CVE-2022-37093 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/1
|
||
|
CVE-2022-37094 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/7
|
||
|
CVE-2022-37095 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/16
|
||
|
CVE-2022-37096 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/11
|
||
|
CVE-2022-37097 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/13
|
||
|
CVE-2022-37098 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/12
|
||
|
CVE-2022-37099 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/14
|
||
|
CVE-2022-37100 - https://github.com/Darry-lang1/vuln/tree/main/H3C/H200/15
|
||
|
CVE-2022-37109 - http://packetstormsecurity.com/files/171478/Raspberry-Pi-Camera-Server-1.0-Authentication-Bypass.html
|
||
|
CVE-2022-37109 - https://medium.com/@elias.hohl/authentication-bypass-vulnerability-in-camp-a-raspberry-pi-camera-server-477e5d270904
|
||
|
CVE-2022-37122 - https://packetstormsecurity.com/files/167684/
|
||
|
CVE-2022-37122 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5709.php
|
||
|
CVE-2022-37123 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2userconfig_cgi/readme.md
|
||
|
CVE-2022-37123 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37125 - https://github.com/z1r00/IOT_Vul/tree/main/dlink/Dir816/form2systime_cgi
|
||
|
CVE-2022-37125 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37128 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/wizard_end/readme.md
|
||
|
CVE-2022-37128 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37129 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md
|
||
|
CVE-2022-37129 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37130 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR-816%20A2_v1.10CNB05/Diagnosis
|
||
|
CVE-2022-37130 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/Diagnosis/readme.md
|
||
|
CVE-2022-37130 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37133 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/doReboot/readme.md
|
||
|
CVE-2022-37133 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37134 - https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2Wan_cgi/readme.md
|
||
|
CVE-2022-37134 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-37137 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney
|
||
|
CVE-2022-37138 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md
|
||
|
CVE-2022-37139 - https://github.com/saitamang/POC-DUMP/blob/main/Loan%20Management%20System/README.md
|
||
|
CVE-2022-37140 - https://github.com/saitamang/POC-DUMP/tree/main/PayMoney
|
||
|
CVE-2022-37149 - https://github.com/fxc233/iot-vul/blob/main/WAVLINK/WN575A3/Readme.md
|
||
|
CVE-2022-37155 - https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.2/SPIP_4.1.2_AUTH_RCE/SPIP_4.1.2_AUTH_RCE_Abyss_Watcher_12_07_22.md
|
||
|
CVE-2022-37155 - https://spawnzii.github.io/posts/2022/07/how-we-have-pwned-root-me-in-2022/
|
||
|
CVE-2022-37159 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/rce/rce_file_upload.md
|
||
|
CVE-2022-37160 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/csrf/csrf.md
|
||
|
CVE-2022-37161 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/svg_xss/svg_xss.md
|
||
|
CVE-2022-37162 - https://github.com/matthieu-hackwitharts/claroline-CVEs/blob/main/calendar_xss/calendar_xss.md
|
||
|
CVE-2022-37175 - https://www.cnblogs.com/Amalll/p/16527552.html
|
||
|
CVE-2022-37176 - https://drive.google.com/drive/folders/1L6ojSooP8sbZLQYRsAxlb0IWVAZef8Z7?usp=sharing
|
||
|
CVE-2022-37183 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/Piwigo/2022/12.3.0
|
||
|
CVE-2022-37184 - https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/mayuri_k/2022/Garage-Management-System-1.0-SFU
|
||
|
CVE-2022-37191 - https://github.com/CuppaCMS/CuppaCMS/issues/20
|
||
|
CVE-2022-37191 - https://github.com/badru8612/CuppaCMS-Authenticated-LFI-Vulnerability
|
||
|
CVE-2022-37197 - https://www.exploit-db.com/exploits/51029
|
||
|
CVE-2022-3720 - https://wpscan.com/vulnerability/0139a23c-4896-4aef-ab56-dcf7f07f01e5
|
||
|
CVE-2022-37201 - https://github.com/AgainstTheLight/CVE-2022-37201/blob/main/README.md
|
||
|
CVE-2022-37201 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql4.md
|
||
|
CVE-2022-37202 - https://github.com/AgainstTheLight/CVE-2022-37202/blob/main/README.md
|
||
|
CVE-2022-37202 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql1.md
|
||
|
CVE-2022-37203 - https://github.com/AgainstTheLight/CVE-2022-37203/blob/main/README.md
|
||
|
CVE-2022-37203 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql3.md
|
||
|
CVE-2022-37204 - https://github.com/AgainstTheLight/CVE-2022-37204/blob/main/README.md
|
||
|
CVE-2022-37204 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql7.md
|
||
|
CVE-2022-37205 - https://github.com/AgainstTheLight/CVE-2022-37205/blob/main/README.md
|
||
|
CVE-2022-37205 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql8.md
|
||
|
CVE-2022-37207 - https://github.com/AgainstTheLight/CVE-2022-37207/blob/main/README.md
|
||
|
CVE-2022-37207 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql10.md
|
||
|
CVE-2022-37208 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql5.md
|
||
|
CVE-2022-37209 - https://github.com/AgainstTheLight/CVE-2022-37209/tree/main
|
||
|
CVE-2022-37209 - https://github.com/AgainstTheLight/someEXP_of_jfinal_cms/blob/main/jfinal_cms/sql9.md
|
||
|
CVE-2022-3721 - https://huntr.dev/bounties/a3c506f0-5f8a-4eaa-b8cc-46fb9e35cf7a
|
||
|
CVE-2022-37237 - https://github.com/ZLMediaKit/ZLMediaKit/issues/1839
|
||
|
CVE-2022-3725 - https://gitlab.com/wireshark/wireshark/-/issues/18378
|
||
|
CVE-2022-37253 - https://packetstormsecurity.com/files/167875/Crime-Reporting-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-37255 - http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html
|
||
|
CVE-2022-37292 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/1
|
||
|
CVE-2022-37298 - https://github.com/dbyio/cve-2022-37298
|
||
|
CVE-2022-3730 - https://vuldb.com/?id.212412
|
||
|
CVE-2022-37301 - https://www.se.com/us/en/download/document/SEVD-2022-221-02/
|
||
|
CVE-2022-37306 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-37307 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37308 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37309 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37310 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37311 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37312 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37313 - https://seclists.org/fulldisclosure/2022/Nov/18
|
||
|
CVE-2022-37326 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
||
|
CVE-2022-37331 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672
|
||
|
CVE-2022-37332 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1602
|
||
|
CVE-2022-37337 - https://kb.netgear.com/000065417/Security-Advisory-for-Command-Injection-on-Some-Orbi-WiFi-Systems-PSV-2022-0187
|
||
|
CVE-2022-37337 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1596
|
||
|
CVE-2022-3739 - https://wpscan.com/vulnerability/b9f39ced-1e0f-4559-b861-39ddcbcd1249/
|
||
|
CVE-2022-37393 - https://attackerkb.com/topics/92AeLOE1M1/cve-2022-37393/rapid7-analysis
|
||
|
CVE-2022-37400 - https://www.openoffice.org/security/cves/CVE-2022-37400.html
|
||
|
CVE-2022-37401 - https://www.openoffice.org/security/cves/CVE-2022-37401.html
|
||
|
CVE-2022-3741 - https://huntr.dev/bounties/46f6e07e-f438-4540-938a-510047f987d0
|
||
|
CVE-2022-37415 - https://gist.github.com/alfarom256/220cb75816ca2b5556e7fc8d8d2803a0
|
||
|
CVE-2022-37416 - https://issuetracker.google.com/issues/231026247
|
||
|
CVE-2022-37424 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/
|
||
|
CVE-2022-37425 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/
|
||
|
CVE-2022-37426 - https://opennebula.io/opennebula-6-4-2-ee-lts-maintenance-release-is-available/
|
||
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/37
|
||
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/38
|
||
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/41
|
||
|
CVE-2022-37434 - http://seclists.org/fulldisclosure/2022/Oct/42
|
||
|
CVE-2022-37434 - https://github.com/ivd38/zlib_overflow
|
||
|
CVE-2022-37450 - https://medium.com/@aviv.yaish/uncle-maker-time-stamping-out-the-competition-in-ethereum-d27c1cb62fef
|
||
|
CVE-2022-37454 - https://mouha.be/sha-3-buffer-overflow/
|
||
|
CVE-2022-37461 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=30693
|
||
|
CVE-2022-37462 - https://www.campusguard.com/post/going-beyond-pen-testing-to-identify-zero-day-exploits
|
||
|
CVE-2022-3747 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt
|
||
|
CVE-2022-3750 - https://wpscan.com/vulnerability/5019db80-0356-497d-b488-a26a5de78676
|
||
|
CVE-2022-3751 - https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9
|
||
|
CVE-2022-3753 - https://wpscan.com/vulnerability/8e88a5b9-6f1d-40de-99fc-8e1e66646c2b
|
||
|
CVE-2022-3754 - https://huntr.dev/bounties/f4711d7f-1368-48ab-9bef-45f32e356c47
|
||
|
CVE-2022-37599 - https://github.com/webpack/loader-utils/issues/216
|
||
|
CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212
|
||
|
CVE-2022-37601 - https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884
|
||
|
CVE-2022-37601 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826
|
||
|
CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L11
|
||
|
CVE-2022-37611 - https://github.com/tschaub/gh-pages/blob/e363b144defe8e555f5a54251a6f7f1297c0e3f6/lib/util.js#L16
|
||
|
CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436
|
||
|
CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1319412826
|
||
|
CVE-2022-37616 - https://github.com/xmldom/xmldom/issues/436#issuecomment-1327776560
|
||
|
CVE-2022-3762 - https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac
|
||
|
CVE-2022-3763 - https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f
|
||
|
CVE-2022-3764 - https://wpscan.com/vulnerability/9d49df6b-e2f1-4662-90d2-84c29c3b1cb0/
|
||
|
CVE-2022-3765 - https://huntr.dev/bounties/613143a1-8e51-449a-b214-12458308835d
|
||
|
CVE-2022-3766 - https://huntr.dev/bounties/d9666520-4ff5-43bb-aacf-50c8e5570983
|
||
|
CVE-2022-37661 - http://packetstormsecurity.com/files/168336/SmartRG-Router-2.6.13-Remote-Code-Execution.html
|
||
|
CVE-2022-37661 - http://packetstormsecurity.com/files/169816/SmartRG-Router-SR510n-2.6.13-Remote-Code-Execution.html
|
||
|
CVE-2022-37661 - https://packetstormsecurity.com/files/cve/CVE-2022-37661
|
||
|
CVE-2022-3768 - https://bulletin.iese.de/post/wp-smart-contracts_1-3-11/
|
||
|
CVE-2022-3768 - https://wpscan.com/vulnerability/1d8bf5bb-5a17-49b7-a5ba-5f2866e1f8a3
|
||
|
CVE-2022-3769 - https://bulletin.iese.de/post/owm-weather_5-6-8/
|
||
|
CVE-2022-3769 - https://wpscan.com/vulnerability/2f9ffc1e-c8a9-47bb-a76b-d043c93e63f8
|
||
|
CVE-2022-37700 - https://medium.com/@sc0p3hacker/cve-2022-37700-directory-transversal-in-zentao-easy-soft-alm-2573c1f0fc21
|
||
|
CVE-2022-37703 - https://github.com/MaherAzzouzi/CVE-2022-37703
|
||
|
CVE-2022-37704 - https://github.com/MaherAzzouzi/CVE-2022-37704
|
||
|
CVE-2022-37705 - https://github.com/MaherAzzouzi/CVE-2022-37705
|
||
|
CVE-2022-37706 - https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
|
||
|
CVE-2022-37709 - https://github.com/fmsh-seclab/TesMla
|
||
|
CVE-2022-37709 - https://youtu.be/cPhYW5FzA9A
|
||
|
CVE-2022-37718 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html
|
||
|
CVE-2022-37719 - https://www.cryptnetix.com/blog/2022/09/14/Edge-Nexus-Vulnerability-Disclosure.html
|
||
|
CVE-2022-37731 - https://github.com/whiex/webvue2/blob/gh-pages/ftcmsxss.md
|
||
|
CVE-2022-3774 - http://packetstormsecurity.com/files/169604/Train-Scheduler-App-1.0-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2022-3774 - https://github.com/rohit0x5/poc/blob/main/idor
|
||
|
CVE-2022-3774 - https://vuldb.com/?id.212504
|
||
|
CVE-2022-37768 - https://github.com/thorfdbg/libjpeg/issues/77
|
||
|
CVE-2022-37769 - https://github.com/thorfdbg/libjpeg/issues/78
|
||
|
CVE-2022-37770 - https://github.com/thorfdbg/libjpeg/issues/79
|
||
|
CVE-2022-37771 - https://packetstormsecurity.com/files/167913/IObit-Malware-Fighter-9.2-Tampering-Privilege-Escalation.html
|
||
|
CVE-2022-37775 - http://genesys.com
|
||
|
CVE-2022-37775 - http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html
|
||
|
CVE-2022-37781 - https://github.com/nu774/fdkaac/issues/54
|
||
|
CVE-2022-37794 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md
|
||
|
CVE-2022-37797 - https://redmine.lighttpd.net/issues/3165
|
||
|
CVE-2022-37798 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5
|
||
|
CVE-2022-37799 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/2
|
||
|
CVE-2022-37800 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/7
|
||
|
CVE-2022-37801 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/9
|
||
|
CVE-2022-37802 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/6
|
||
|
CVE-2022-37803 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/8
|
||
|
CVE-2022-37804 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/3
|
||
|
CVE-2022-37805 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/1
|
||
|
CVE-2022-37806 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/4
|
||
|
CVE-2022-37807 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/10
|
||
|
CVE-2022-37808 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/15
|
||
|
CVE-2022-37809 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/11
|
||
|
CVE-2022-37810 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/19
|
||
|
CVE-2022-37811 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/17
|
||
|
CVE-2022-37812 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/12
|
||
|
CVE-2022-37813 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/16
|
||
|
CVE-2022-37814 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/14
|
||
|
CVE-2022-37815 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/18
|
||
|
CVE-2022-37816 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/13
|
||
|
CVE-2022-37817 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/4
|
||
|
CVE-2022-37818 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/2
|
||
|
CVE-2022-37819 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/7
|
||
|
CVE-2022-37820 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/8
|
||
|
CVE-2022-37821 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/6
|
||
|
CVE-2022-37822 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/3
|
||
|
CVE-2022-37823 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/1
|
||
|
CVE-2022-37824 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AX1803/5
|
||
|
CVE-2022-37839 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/5.md
|
||
|
CVE-2022-3784 - https://github.com/axiomatic-systems/Bento4/issues/806
|
||
|
CVE-2022-3784 - https://vuldb.com/?id.212563
|
||
|
CVE-2022-37840 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/3.md
|
||
|
CVE-2022-37842 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/1.md
|
||
|
CVE-2022-37843 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A860R/4.md
|
||
|
CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
|
||
|
CVE-2022-3785 - https://github.com/axiomatic-systems/Bento4/issues/780
|
||
|
CVE-2022-37956 - http://packetstormsecurity.com/files/168723/Windows-Kernel-Registry-Subkey-Lists-Integer-Overflow.html
|
||
|
CVE-2022-3797 - https://vuldb.com/?id.212633
|
||
|
CVE-2022-3798 - https://github.com/IBAX-io/go-ibax/issues/2060
|
||
|
CVE-2022-37988 - http://packetstormsecurity.com/files/169731/Windows-Kernel-Registry-Use-After-Free.html
|
||
|
CVE-2022-3799 - https://github.com/IBAX-io/go-ibax/issues/2060
|
||
|
CVE-2022-37991 - http://packetstormsecurity.com/files/169807/Windows-Kernel-Long-Registry-Key-Value-Out-Of-Bounds-Read.html
|
||
|
CVE-2022-3800 - https://github.com/IBAX-io/go-ibax/issues/2061
|
||
|
CVE-2022-3801 - https://github.com/IBAX-io/go-ibax/issues/2062
|
||
|
CVE-2022-3802 - https://github.com/IBAX-io/go-ibax/issues/2063
|
||
|
CVE-2022-38037 - http://packetstormsecurity.com/files/169791/Windows-Kernel-Type-Confusion-Memory-Corruption.html
|
||
|
CVE-2022-38038 - http://packetstormsecurity.com/files/169805/Windows-Kernel-Long-Registry-Path-Memory-Corruption.html
|
||
|
CVE-2022-38060 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1589
|
||
|
CVE-2022-38065 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1599
|
||
|
CVE-2022-38066 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1615
|
||
|
CVE-2022-3807 - https://vuldb.com/?id.212660
|
||
|
CVE-2022-38072 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594
|
||
|
CVE-2022-38088 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1609
|
||
|
CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
|
||
|
CVE-2022-3809 - https://github.com/axiomatic-systems/Bento4/issues/779
|
||
|
CVE-2022-38096 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
|
||
|
CVE-2022-38097 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1601
|
||
|
CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
|
||
|
CVE-2022-3810 - https://github.com/axiomatic-systems/Bento4/issues/779
|
||
|
CVE-2022-38105 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1590
|
||
|
CVE-2022-38108 - http://packetstormsecurity.com/files/171567/SolarWinds-Information-Service-SWIS-Remote-Command-Execution.html
|
||
|
CVE-2022-3811 - https://wpscan.com/vulnerability/262924da-e269-4008-a24f-9f26a033b23e
|
||
|
CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip
|
||
|
CVE-2022-3812 - https://github.com/axiomatic-systems/Bento4/issues/792
|
||
|
CVE-2022-38123 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-38124 - https://www.secomea.com/support/cybersecurity-advisory/
|
||
|
CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip
|
||
|
CVE-2022-3813 - https://github.com/axiomatic-systems/Bento4/issues/792
|
||
|
CVE-2022-3813 - https://vuldb.com/?id.212679
|
||
|
CVE-2022-38131 - https://support.posit.co/hc/en-us/articles/10983374992023
|
||
|
CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip
|
||
|
CVE-2022-3814 - https://github.com/axiomatic-systems/Bento4/issues/792
|
||
|
CVE-2022-3814 - https://vuldb.com/?id.212680
|
||
|
CVE-2022-38143 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1630
|
||
|
CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip
|
||
|
CVE-2022-3815 - https://github.com/axiomatic-systems/Bento4/issues/792
|
||
|
CVE-2022-38152 - http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
|
||
|
CVE-2022-38152 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
||
|
CVE-2022-38153 - http://packetstormsecurity.com/files/170605/wolfSSL-5.3.0-Denial-Of-Service.html
|
||
|
CVE-2022-38153 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
||
|
CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip
|
||
|
CVE-2022-3816 - https://github.com/axiomatic-systems/Bento4/issues/792
|
||
|
CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip
|
||
|
CVE-2022-3817 - https://github.com/axiomatic-systems/Bento4/issues/792
|
||
|
CVE-2022-38171 - https://github.com/jeffssh/CVE-2021-30860
|
||
|
CVE-2022-38176 - https://www.ysoft.com/en/legal/ysoft-safeq-client-v3-local-privilege-escalation
|
||
|
CVE-2022-38181 - http://packetstormsecurity.com/files/172854/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html
|
||
|
CVE-2022-38181 - https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/
|
||
|
CVE-2022-38183 - https://herolab.usd.de/security-advisories/usd-2022-0015/
|
||
|
CVE-2022-38201 - https://www.esri.com/arcgis-blog/products/product/uncategorized/portal-for-arcgis-quick-capture-security-patch-is-now-available
|
||
|
CVE-2022-3822 - https://wpscan.com/vulnerability/48ec2e4a-0190-4f36-afd1-d5799ba28c13
|
||
|
CVE-2022-38222 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42320
|
||
|
CVE-2022-38223 - https://github.com/tats/w3m/issues/242
|
||
|
CVE-2022-3823 - https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e
|
||
|
CVE-2022-3824 - https://wpscan.com/vulnerability/3ca6d724-cd79-4e07-b8d0-a8c1688abf16
|
||
|
CVE-2022-38256 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-005
|
||
|
CVE-2022-38258 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-3828 - https://wpscan.com/vulnerability/4188ed01-b64b-4aba-a215-e8dc5b308486
|
||
|
CVE-2022-3829 - https://wpscan.com/vulnerability/684941ad-541f-43f9-a7ef-d26c0f4e6e21/
|
||
|
CVE-2022-38295 - https://github.com/CuppaCMS/CuppaCMS/issues/34
|
||
|
CVE-2022-38296 - https://github.com/CuppaCMS/CuppaCMS/issues/33
|
||
|
CVE-2022-3830 - https://wpscan.com/vulnerability/98b2321d-fb66-4e02-9906-63af7b08d647
|
||
|
CVE-2022-38305 - https://github.com/MegaTKC/AeroCMS/issues/3
|
||
|
CVE-2022-38306 - https://github.com/lief-project/LIEF/issues/763
|
||
|
CVE-2022-38307 - https://github.com/lief-project/LIEF/issues/764
|
||
|
CVE-2022-38308 - https://github.com/WhoisZkuan/TOTOlink-A700RU
|
||
|
CVE-2022-38309 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/4
|
||
|
CVE-2022-3831 - https://wpscan.com/vulnerability/fa23bd68-69f3-440e-902c-a3bb6c8a40b8
|
||
|
CVE-2022-38310 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/6
|
||
|
CVE-2022-38311 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/5
|
||
|
CVE-2022-38312 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/3
|
||
|
CVE-2022-38313 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/2
|
||
|
CVE-2022-38314 - https://github.com/rickytriky/NWPU_Projct/tree/main/Tenda/AC18/1
|
||
|
CVE-2022-3832 - https://wpscan.com/vulnerability/458ec2fd-4175-4cb4-b334-b63f6e643b92
|
||
|
CVE-2022-38325 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_expandDlnaFile.md
|
||
|
CVE-2022-38326 - https://github.com/1160300418/Vuls/blob/main/Tenda/AC/Vul_NatStaticSetting.md
|
||
|
CVE-2022-38329 - https://albert5888.github.io/posts/CVE-2022-38329/
|
||
|
CVE-2022-38329 - https://github.com/albert5888/CVE-Issues/blob/main/CVE-2022-38329/file.md
|
||
|
CVE-2022-38329 - https://github.com/zhangqiquan/shopxian_cms/issues/4
|
||
|
CVE-2022-3833 - https://wpscan.com/vulnerability/41096d40-83d4-40b4-9632-afef51e8b00e
|
||
|
CVE-2022-38334 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42122
|
||
|
CVE-2022-38335 - https://github.com/sbaresearch/advisories/tree/public/2022/SBA-ADV-20220328-01_Vtiger_CRM_Stored_Cross-Site_Scripting
|
||
|
CVE-2022-3834 - https://wpscan.com/vulnerability/1dbe0f24-b757-49fe-846f-7c259df9f361
|
||
|
CVE-2022-38349 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282
|
||
|
CVE-2022-3835 - https://wpscan.com/vulnerability/514ffd28-f2c2-4c95-87b5-d05ce0746f89
|
||
|
CVE-2022-38351 - https://nobugescapes.com/blog/privilege-escalation-from-user-operator-to-system-administrator/
|
||
|
CVE-2022-38357 - https://www.tenable.com/security/research/tra-2022-29
|
||
|
CVE-2022-38358 - https://www.tenable.com/security/research/tra-2022-29
|
||
|
CVE-2022-38359 - https://www.tenable.com/security/research/tra-2022-29
|
||
|
CVE-2022-3836 - https://wpscan.com/vulnerability/64e144fb-aa9f-4cfe-9c44-a4e1fa2e8dd5/
|
||
|
CVE-2022-38368 - https://docs.aviatrix.com/HowTos/PSIRT_Advisories.html#aviatrix-controller-and-gateways-unauthorized-access
|
||
|
CVE-2022-3837 - https://wpscan.com/vulnerability/8554ca79-5a4b-49df-a75f-5faa4136bb8c
|
||
|
CVE-2022-3838 - https://wpscan.com/vulnerability/2dc82bd7-651f-4af0-ad2a-c20a38eea0d0
|
||
|
CVE-2022-3839 - https://wpscan.com/vulnerability/809cea63-9dbe-495c-8388-e294299d3e90
|
||
|
CVE-2022-38393 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1592
|
||
|
CVE-2022-3840 - https://wpscan.com/vulnerability/71414436-ef54-4ce6-94e2-62e68d1a371d
|
||
|
CVE-2022-38451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642
|
||
|
CVE-2022-38452 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1595
|
||
|
CVE-2022-38457 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2074
|
||
|
CVE-2022-38458 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1598
|
||
|
CVE-2022-38459 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1608
|
||
|
CVE-2022-3846 - https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af
|
||
|
CVE-2022-3847 - https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/
|
||
|
CVE-2022-3847 - https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6
|
||
|
CVE-2022-38473 - https://bugzilla.mozilla.org/show_bug.cgi?id=1771685
|
||
|
CVE-2022-3848 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_2/
|
||
|
CVE-2022-3848 - https://wpscan.com/vulnerability/da1f0313-2576-490e-a95f-bf12de340610
|
||
|
CVE-2022-38488 - https://github.com/secoats/cve/tree/master/CVE-2022-38488_sqli_logrocket-oauth2-example
|
||
|
CVE-2022-3849 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_3/
|
||
|
CVE-2022-3849 - https://wpscan.com/vulnerability/511327d3-499b-4ad9-8fd3-99f9f7deb4f5
|
||
|
CVE-2022-38495 - https://github.com/lief-project/LIEF/issues/767
|
||
|
CVE-2022-38496 - https://github.com/lief-project/LIEF/issues/765
|
||
|
CVE-2022-38497 - https://github.com/lief-project/LIEF/issues/766
|
||
|
CVE-2022-3850 - https://wpscan.com/vulnerability/8ae42ec0-7e3a-4ea5-8e76-0aae7b92a8e9
|
||
|
CVE-2022-38510 - https://github.com/whiter6666/CVE/blob/main/Tenda_TX9pro/SetNetControlList.md
|
||
|
CVE-2022-38511 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_A810R/downloadFile.md
|
||
|
CVE-2022-38528 - https://github.com/assimp/assimp/issues/4662
|
||
|
CVE-2022-38529 - https://github.com/syoyo/tinyexr/issues/169
|
||
|
CVE-2022-3853 - https://wpscan.com/vulnerability/c2bc7d23-5bfd-481c-b42b-da7ee80d9514
|
||
|
CVE-2022-38530 - https://github.com/gpac/gpac/issues/2216
|
||
|
CVE-2022-38532 - https://github.com/nam3lum/msi-central_privesc
|
||
|
CVE-2022-38534 - https://github.com/Jfox816/TOTOLINK-720R/blob/fb6ba109ba9c5bd1b0d8e22c88ee14bdc4a75e6b/TOTOLINK%20720%20RCode%20Execution.md
|
||
|
CVE-2022-38535 - https://github.com/Jfox816/TOTOLINK-720R/blob/177ee39a5a8557a6bd19586731b0e624548b67ee/totolink%20720%20RCode%20Execution2.md
|
||
|
CVE-2022-3855 - https://wpscan.com/vulnerability/ae44f2d8-a452-4310-b616-54d9519867eb
|
||
|
CVE-2022-38553 - https://github.com/4websecurity/CVE-2022-38553/blob/main/README.md
|
||
|
CVE-2022-38555 - https://github.com/xxy1126/Vuln/tree/main/1
|
||
|
CVE-2022-38556 - https://github.com/xxy1126/Vuln/tree/main/2
|
||
|
CVE-2022-38557 - https://github.com/xxy1126/Vuln/tree/main/3
|
||
|
CVE-2022-38557 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-3856 - https://bulletin.iese.de/post/comicbookmanagementsystemweeklypicks_2-0-0_1/
|
||
|
CVE-2022-3856 - https://wpscan.com/vulnerability/c0f5cf61-b3e2-440f-a185-61df360c1192
|
||
|
CVE-2022-38562 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_lan
|
||
|
CVE-2022-38563 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_Mac
|
||
|
CVE-2022-38564 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetPicListItem
|
||
|
CVE-2022-38565 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailpwd
|
||
|
CVE-2022-38566 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formEmailTest-mailname
|
||
|
CVE-2022-38567 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetAdConfigInfo_
|
||
|
CVE-2022-38568 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetFixTools_hostname
|
||
|
CVE-2022-38569 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelAd
|
||
|
CVE-2022-3857 - https://sourceforge.net/p/libpng/bugs/300/
|
||
|
CVE-2022-38570 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formDelPushedAd
|
||
|
CVE-2022-38571 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20M3/formSetGuideListItem
|
||
|
CVE-2022-38573 - https://packetstormsecurity.com
|
||
|
CVE-2022-38573 - https://packetstormsecurity.com/files/168133/10-Strike-Network-Inventory-Explorer-9.3-Buffer-Overflow.html
|
||
|
CVE-2022-38577 - http://packetstormsecurity.com/files/168427/ProcessMaker-Privilege-Escalation.html
|
||
|
CVE-2022-3858 - https://wpscan.com/vulnerability/d251b6c1-602b-4d72-9d6a-bf5d5ec541ec
|
||
|
CVE-2022-38580 - http://packetstormsecurity.com/files/171546/X-Skipper-Proxy-0.13.237-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-38582 - https://gist.github.com/420SmokeBigWeedHackBadDrivers/53de9ff97d95fc3e79307345fddb0a30
|
||
|
CVE-2022-3859 - https://kcm.trellix.com/corporate/index?page=content&id=SB10391
|
||
|
CVE-2022-38599 - https://gist.github.com/arleyna/20d858e11c48984d00926fa8cc0c2722
|
||
|
CVE-2022-3860 - https://wpscan.com/vulnerability/d99ce21f-fbb6-429c-aa3b-19c4a5eb7557
|
||
|
CVE-2022-38604 - https://github.com/LucaBarile/CVE-2022-38604
|
||
|
CVE-2022-38604 - https://lucabarile.github.io/Blog/CVE-2022-38604/index.html
|
||
|
CVE-2022-3861 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt
|
||
|
CVE-2022-38611 - https://gist.github.com/dru1d-foofus/835423de77c3522d53b9e7bdf5a28dfe
|
||
|
CVE-2022-3862 - https://wpscan.com/vulnerability/3db9a8f5-3335-4b8d-a067-091cbfed1efc
|
||
|
CVE-2022-38621 - https://github.com/Doufox/Doufox/issues/7
|
||
|
CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.txt
|
||
|
CVE-2022-38627 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38627/CVE-2022-38627.yaml
|
||
|
CVE-2022-38628 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-38628/CVE-2022-38628.txt
|
||
|
CVE-2022-38637 - https://www.youtube.com/watch?v=m8nW0p69UHU
|
||
|
CVE-2022-3865 - https://bulletin.iese.de/post/wp-user-merger_1-5-1_1/
|
||
|
CVE-2022-3865 - https://wpscan.com/vulnerability/fbe4aed8-964a-4774-bbc3-d432792bfeb6
|
||
|
CVE-2022-38668 - https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.md
|
||
|
CVE-2022-38668 - https://gynvael.coldwind.pl/?id=752
|
||
|
CVE-2022-3869 - https://huntr.dev/bounties/7de20f21-4a9b-445d-ae2b-15ade648900b
|
||
|
CVE-2022-38715 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1610
|
||
|
CVE-2022-3873 - https://huntr.dev/bounties/52a4085e-b687-489b-9ed6-f0987583ed77
|
||
|
CVE-2022-38730 - https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-2
|
||
|
CVE-2022-38745 - https://www.openoffice.org/security/cves/CVE-2022-38745.html
|
||
|
CVE-2022-3875 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-3875 - https://vuldb.com/?id.216244
|
||
|
CVE-2022-38756 - http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html
|
||
|
CVE-2022-38756 - http://seclists.org/fulldisclosure/2023/Jan/28
|
||
|
CVE-2022-3876 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-3876 - https://vuldb.com/?id.216245
|
||
|
CVE-2022-38766 - https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766
|
||
|
CVE-2022-3877 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-38774 - https://www.elastic.co/community/security
|
||
|
CVE-2022-38775 - https://www.elastic.co/community/security
|
||
|
CVE-2022-38777 - https://www.elastic.co/community/security
|
||
|
CVE-2022-38778 - https://www.elastic.co/community/security
|
||
|
CVE-2022-38779 - https://www.elastic.co/community/security
|
||
|
CVE-2022-3878 - https://vuldb.com/?id.213039
|
||
|
CVE-2022-38784 - https://github.com/jeffssh/CVE-2021-30860
|
||
|
CVE-2022-3879 - https://wpscan.com/vulnerability/0db1762e-1401-4006-88ed-d09a4bc6585b
|
||
|
CVE-2022-38796 - https://www.youtube.com/watch?v=k8dp0FJnSsI
|
||
|
CVE-2022-3880 - https://wpscan.com/vulnerability/24743c72-310f-41e9-aac9-e05b2bb1a14e
|
||
|
CVE-2022-38808 - https://github.com/cloudwebsoft/ywoa/issues/26
|
||
|
CVE-2022-3881 - https://wpscan.com/vulnerability/c2a9cf01-051a-429a-82ca-280885114b5a
|
||
|
CVE-2022-38813 - https://drive.google.com/file/d/1iMswKzoUvindXUGh1cuAmi-0R84tLDaH/view?usp=sharing
|
||
|
CVE-2022-38813 - https://github.com/RashidKhanPathan/CVE-2022-38813
|
||
|
CVE-2022-38813 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0
|
||
|
CVE-2022-38814 - https://packetstormsecurity.com/files/168065/Fiberhome-AN5506-02-B-Cross-Site-Scripting.html
|
||
|
CVE-2022-3882 - https://wpscan.com/vulnerability/a39c643f-eaa4-4c71-b75d-2c4fe34ac875
|
||
|
CVE-2022-38826 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setStaticDhcpRules_1.md
|
||
|
CVE-2022-38827 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_2.md
|
||
|
CVE-2022-38828 - https://github.com/whiter6666/CVE/blob/main/TOTOLINK_T6_V3/setWiFiWpsStart_1.md
|
||
|
CVE-2022-38829 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setMacFilterCfg.md
|
||
|
CVE-2022-3883 - https://wpscan.com/vulnerability/8695b157-abac-4aa6-a022-e3ae41c03544
|
||
|
CVE-2022-38830 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/setIPv6Status.md
|
||
|
CVE-2022-38831 - https://github.com/whiter6666/CVE/blob/main/Tenda_RX9_Pro/SetNetControlList.md
|
||
|
CVE-2022-38840 - http://packetstormsecurity.com/files/171439/MAN-EAM-0003-3.2.4-XML-Injection.html
|
||
|
CVE-2022-38841 - http://packetstormsecurity.com/files/171433/Linksys-AX3200-1.1.00-Command-Injection.html
|
||
|
CVE-2022-38843 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-unrestricted-file-upload-7860b15d12bc
|
||
|
CVE-2022-38844 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-csv-injection-4c07494e2a76
|
||
|
CVE-2022-38846 - https://medium.com/cybersecurity-valuelabs/espocrm-7-1-8-is-vulnerable-to-missing-secure-flag-1664bac5ffe4
|
||
|
CVE-2022-38867 - https://github.com/zhaojh329/rttys/issues/117
|
||
|
CVE-2022-38868 - https://github.com/seccome/Ehoney/issues/59
|
||
|
CVE-2022-38873 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-38890 - https://github.com/nginx/njs/issues/569
|
||
|
CVE-2022-3891 - https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1
|
||
|
CVE-2022-3892 - https://wpscan.com/vulnerability/33dddaec-a32a-4fce-89d6-164565be13e1
|
||
|
CVE-2022-38922 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md
|
||
|
CVE-2022-38923 - https://github.com/dtssec/CVE-Disclosures/blob/main/CVE-2022-38922_CVE-2022-38923_Bluepage_CMS_SQLi/CVE-2022-38922-BluePage_CMS_3.9.md
|
||
|
CVE-2022-38928 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421
|
||
|
CVE-2022-38931 - https://github.com/zer0yu/CVE_Request/blob/master/baijiacms/baijiacmsv4_ssrf.md
|
||
|
CVE-2022-38932 - https://github.com/klange/toaruos/issues/243
|
||
|
CVE-2022-38934 - https://github.com/klange/toaruos/issues/244
|
||
|
CVE-2022-38935 - https://github.com/yourkevin/NiterForum/issues/25
|
||
|
CVE-2022-38936 - https://github.com/cloudwu/pbc/issues/158
|
||
|
CVE-2022-3894 - https://wpscan.com/vulnerability/298487b2-4141-4c9f-9bb2-e1450aefc1a8
|
||
|
CVE-2022-38970 - https://www.realinfosec.net/cybersecurity-news/iegeek-vulnerabilities-still-prevalent-in-2022-amazon-ft-ig20/
|
||
|
CVE-2022-3899 - https://wpscan.com/vulnerability/e3131e16-a0eb-4d26-b6d3-048fc1f1e9fa/
|
||
|
CVE-2022-3900 - https://wpscan.com/vulnerability/c969c4bc-82d7-46a0-88ba-e056c0b27de7
|
||
|
CVE-2022-39013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39028 - https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html
|
||
|
CVE-2022-3904 - https://wpscan.com/vulnerability/244d9ef1-335c-4f65-94ad-27c0c633f6ad
|
||
|
CVE-2022-39045 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1611
|
||
|
CVE-2022-39046 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
||
|
CVE-2022-39046 - http://seclists.org/fulldisclosure/2024/Feb/3
|
||
|
CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/6
|
||
|
CVE-2022-39046 - http://www.openwall.com/lists/oss-security/2024/01/30/8
|
||
|
CVE-2022-3906 - https://wpscan.com/vulnerability/fee8652d-cd50-4cb0-b94d-2d124f56af1a
|
||
|
CVE-2022-3907 - https://wpscan.com/vulnerability/7920c1c1-709d-4b1f-ac08-f0a02ddb329c
|
||
|
CVE-2022-3908 - https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505
|
||
|
CVE-2022-3909 - https://wpscan.com/vulnerability/8d57a534-7630-491a-a0fd-90430f85ae78
|
||
|
CVE-2022-3911 - https://wpscan.com/vulnerability/c47fdca8-74ac-48a4-9780-556927fb4e52
|
||
|
CVE-2022-3912 - https://wpscan.com/vulnerability/968c677c-1beb-459b-8fd1-7f70bcaa4f74
|
||
|
CVE-2022-3915 - https://wpscan.com/vulnerability/fd416d99-1970-418f-81f5-8438490d4479
|
||
|
CVE-2022-39164 - https://www.ibm.com/support/pages/node/6847947
|
||
|
CVE-2022-39165 - https://www.ibm.com/support/pages/node/6847947
|
||
|
CVE-2022-39170 - https://github.com/davea42/libdwarf-code/issues/132
|
||
|
CVE-2022-39172 - https://sec-consult.com/vulnerability-lab/advisory/stored-cross-site-scripting-in-mb-support-broker-management-solution-openviva-c2/
|
||
|
CVE-2022-39173 - http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html
|
||
|
CVE-2022-39173 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
||
|
CVE-2022-39188 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
|
||
|
CVE-2022-39189 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
|
||
|
CVE-2022-3919 - https://wpscan.com/vulnerability/fe2f1d52-8421-4b46-b829-6953a0472dcb
|
||
|
CVE-2022-39190 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6
|
||
|
CVE-2022-39195 - https://packetstormsecurity.com/2301-exploits/listserv17-xss.txt
|
||
|
CVE-2022-39197 - https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/
|
||
|
CVE-2022-39197 - https://www.cobaltstrike.com/blog/tag/release/
|
||
|
CVE-2022-3921 - https://wpscan.com/vulnerability/e39b59b0-f24f-4de5-a21c-c4de34c3a14f
|
||
|
CVE-2022-3922 - https://wpscan.com/vulnerability/78054bd7-cdc2-4b14-9b5c-30f10e802d6b
|
||
|
CVE-2022-3923 - https://wpscan.com/vulnerability/6536946a-7ebf-4f8f-9446-36ec2a2a3ad2
|
||
|
CVE-2022-3925 - https://bulletin.iese.de/post/buddybadges_1-0-0/
|
||
|
CVE-2022-3925 - https://wpscan.com/vulnerability/178499a3-97d1-4ab2-abbe-4a9d2ebc85da
|
||
|
CVE-2022-3926 - https://wpscan.com/vulnerability/e1fcde2a-91a5-40cb-876b-884f01c80336
|
||
|
CVE-2022-39261 - https://www.drupal.org/sa-core-2022-016
|
||
|
CVE-2022-39262 - https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/
|
||
|
CVE-2022-39276 - https://huntr.dev/bounties/7a88f92b-1ee2-4ca8-9cf8-05fcf6cfe73f/
|
||
|
CVE-2022-39277 - https://huntr.dev/bounties/8e047ae1-7a7c-48e0-bee3-d1c36e52ff42/
|
||
|
CVE-2022-39285 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-39288 - https://github.com/fastify/fastify/security/policy
|
||
|
CVE-2022-39290 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-39291 - http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-39299 - http://packetstormsecurity.com/files/169826/Node-saml-Root-Element-Signature-Bypass.html
|
||
|
CVE-2022-3930 - https://wpscan.com/vulnerability/8728d02a-51db-4447-a843-0264b6ceb413
|
||
|
CVE-2022-39305 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2
|
||
|
CVE-2022-39321 - https://github.com/actions/runner/pull/2108
|
||
|
CVE-2022-3933 - https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4
|
||
|
CVE-2022-3934 - https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a
|
||
|
CVE-2022-3935 - https://wpscan.com/vulnerability/906c5122-dd6d-494b-b66c-4162e234ea05
|
||
|
CVE-2022-3936 - https://wpscan.com/vulnerability/921daea1-a06d-4310-8bd9-4db32605e500
|
||
|
CVE-2022-3937 - https://wpscan.com/vulnerability/ac7158c5-3d11-4865-b26f-41ab5a8120af
|
||
|
CVE-2022-39399 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39400 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39401 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39402 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39403 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39404 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39405 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39406 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39407 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39408 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39409 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39410 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39411 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39412 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39417 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39419 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39420 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39421 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39422 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39423 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39424 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39425 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39426 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39427 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39428 - https://www.oracle.com/security-alerts/cpuoct2022.html
|
||
|
CVE-2022-39429 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2022-3944 - https://github.com/jerryhanjj/ERP/issues/3
|
||
|
CVE-2022-3945 - https://huntr.dev/bounties/55cd91b3-1d94-4d34-8d7f-86660b41fd65
|
||
|
CVE-2022-3946 - https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0
|
||
|
CVE-2022-3955 - https://github.com/tholum/crm42/issues/1
|
||
|
CVE-2022-3956 - https://github.com/tsruban/HHIMS/issues/1
|
||
|
CVE-2022-3961 - https://wpscan.com/vulnerability/6aad6454-de1b-4304-9c14-05e28d08b253
|
||
|
CVE-2022-3972 - https://github.com/Pingkon/HMS-PHP/issues/1
|
||
|
CVE-2022-3973 - https://github.com/Pingkon/HMS-PHP/issues/1
|
||
|
CVE-2022-3973 - https://vuldb.com/?id.213552
|
||
|
CVE-2022-3974 - https://github.com/axiomatic-systems/Bento4/issues/812
|
||
|
CVE-2022-3977 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89
|
||
|
CVE-2022-39799 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39800 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39801 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39802 - http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html
|
||
|
CVE-2022-39802 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39803 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39804 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39805 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39806 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39807 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39808 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-39809 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-3981 - https://wpscan.com/vulnerability/78054d08-0227-426c-903d-d146e0919028
|
||
|
CVE-2022-39810 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39811 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39812 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39813 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39814 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39815 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39816 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39817 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39818 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39819 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-3982 - https://wpscan.com/vulnerability/4d91f3e1-4de9-46c1-b5ba-cc55b7726867
|
||
|
CVE-2022-39820 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39821 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39822 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-39824 - https://github.com/FCncdn/Appsmith-Js-Injection-POC
|
||
|
CVE-2022-3983 - https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1
|
||
|
CVE-2022-39831 - https://savannah.gnu.org/bugs/?62977
|
||
|
CVE-2022-39832 - https://savannah.gnu.org/bugs/index.php?63000
|
||
|
CVE-2022-39833 - https://gist.github.com/DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c
|
||
|
CVE-2022-39836 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/
|
||
|
CVE-2022-39836 - https://seclists.org/fulldisclosure/2022/Sep/24
|
||
|
CVE-2022-39837 - https://sec-consult.com/vulnerability-lab/advisory/multiple-memory-corruption-vulnerabilities-in-covesa-dlt-daemon/
|
||
|
CVE-2022-39837 - https://seclists.org/fulldisclosure/2022/Sep/24
|
||
|
CVE-2022-39838 - https://github.com/jet-pentest/CVE-2022-39838
|
||
|
CVE-2022-39839 - https://github.com/Cotonti/Cotonti/issues/1661
|
||
|
CVE-2022-3984 - https://wpscan.com/vulnerability/b4694e9d-3f38-4295-929d-0ad37b3cbbaa
|
||
|
CVE-2022-39840 - https://github.com/Cotonti/Cotonti/issues/1660
|
||
|
CVE-2022-39842 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
|
||
|
CVE-2022-3985 - https://wpscan.com/vulnerability/58f82e13-153e-41e8-a22b-a2e96b46a6dc
|
||
|
CVE-2022-3986 - https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a
|
||
|
CVE-2022-3987 - https://wpscan.com/vulnerability/d9309a09-34ba-4e56-b683-e677ad277b29
|
||
|
CVE-2022-3989 - https://wpscan.com/vulnerability/1bd20329-f3a5-466d-81b0-e4ff0ca32091
|
||
|
CVE-2022-3993 - https://huntr.dev/bounties/bebd0cd6-18ec-469c-b6ca-19ffa9db0699
|
||
|
CVE-2022-3994 - https://wpscan.com/vulnerability/802a2139-ab48-4281-888f-225e6e3134aa
|
||
|
CVE-2022-39960 - https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e
|
||
|
CVE-2022-39974 - https://github.com/wasm3/wasm3/issues/379
|
||
|
CVE-2022-3998 - https://github.com/MonikaBrzica/scm/issues/1
|
||
|
CVE-2022-39983 - https://www.swascan.com/it/vulnerability-report-instant-developer/
|
||
|
CVE-2022-39986 - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
|
||
|
CVE-2022-39986 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
|
||
|
CVE-2022-39987 - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
|
||
|
CVE-2022-39988 - http://packetstormsecurity.com/files/168585/Centreon-22.04.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-3999 - https://wpscan.com/vulnerability/625ae924-68db-4579-a34f-e6f33aa33643
|
||
|
CVE-2022-4000 - https://wpscan.com/vulnerability/5563c030-bd62-4839-98e8-84bc8191e242
|
||
|
CVE-2022-40005 - https://cyberdanube.com/en/authenticated-command-injection-in-intelbras-wifiber-120ac-inmesh/
|
||
|
CVE-2022-40005 - https://seclists.org/fulldisclosure/2022/Dec/13
|
||
|
CVE-2022-40008 - https://github.com/matthiaskramm/swftools/issues/188
|
||
|
CVE-2022-40009 - https://github.com/matthiaskramm/swftools/issues/190
|
||
|
CVE-2022-40010 - http://packetstormsecurity.com/files/173029/Tenda-AC6-AC1200-15.03.06.50_multi-Cross-Site-Scripting.html
|
||
|
CVE-2022-40016 - https://github.com/ireader/media-server/issues/235
|
||
|
CVE-2022-40021 - https://www.securifera.com/advisories/CVE-2022-40021/
|
||
|
CVE-2022-40022 - http://packetstormsecurity.com/files/172907/Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution.html
|
||
|
CVE-2022-40022 - https://www.securifera.com/advisories/CVE-2022-40022/
|
||
|
CVE-2022-40023 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
||
|
CVE-2022-40032 - http://packetstormsecurity.com/files/171739/Simple-Task-Managing-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-40032 - https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
|
||
|
CVE-2022-4004 - https://wpscan.com/vulnerability/6a3bcfb3-3ede-459d-969f-b7b30dafd098
|
||
|
CVE-2022-40043 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/
|
||
|
CVE-2022-40044 - https://www.hakaioffensivesecurity.com/centreon-sqli-and-xss-vulnerability/
|
||
|
CVE-2022-4005 - https://wpscan.com/vulnerability/61d5c9b8-5c21-4ab5-b31c-e13ca19ea25c
|
||
|
CVE-2022-40055 - https://blog.alphathreat.in/index.php?post/2022/10/01/Achieving-CVE-2022-40055
|
||
|
CVE-2022-40067 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/9
|
||
|
CVE-2022-40068 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/10
|
||
|
CVE-2022-40069 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/6
|
||
|
CVE-2022-40070 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/8
|
||
|
CVE-2022-40071 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/2
|
||
|
CVE-2022-40072 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/7
|
||
|
CVE-2022-40073 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/5
|
||
|
CVE-2022-40074 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/3
|
||
|
CVE-2022-40075 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/1
|
||
|
CVE-2022-40076 - https://github.com/xxy1126/Vuln/tree/main/Tenda%20AC21/4
|
||
|
CVE-2022-40087 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-unauthenticated-arbitrary-file-upload-rce-44341831bec8
|
||
|
CVE-2022-40087 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
||
|
CVE-2022-40088 - https://gowthamaraj-rajendran.medium.com/simple-college-website-1-0-xss-1f13228233a
|
||
|
CVE-2022-40088 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
||
|
CVE-2022-40089 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/simple-college-website.zip
|
||
|
CVE-2022-40090 - https://gitlab.com/libtiff/libtiff/-/issues/455
|
||
|
CVE-2022-4010 - https://wpscan.com/vulnerability/bed8c81c-04c7-412d-9563-ce4eb64b7754
|
||
|
CVE-2022-4011 - https://vuldb.com/?id.213785
|
||
|
CVE-2022-40110 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/2.md
|
||
|
CVE-2022-40112 - https://github.com/1759134370/iot/blob/main/TOTOLINK/A3002R/3.md
|
||
|
CVE-2022-40113 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection3.md
|
||
|
CVE-2022-40113 - https://github.com/zakee94/online-banking-system/issues/18
|
||
|
CVE-2022-40114 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection5.md
|
||
|
CVE-2022-40114 - https://github.com/zakee94/online-banking-system/issues/16
|
||
|
CVE-2022-40115 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection1.md
|
||
|
CVE-2022-40115 - https://github.com/zakee94/online-banking-system/issues/10
|
||
|
CVE-2022-40116 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection9.md
|
||
|
CVE-2022-40116 - https://github.com/zakee94/online-banking-system/issues/13
|
||
|
CVE-2022-40117 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection2.md
|
||
|
CVE-2022-40117 - https://github.com/zakee94/online-banking-system/issues/17
|
||
|
CVE-2022-40118 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection4.md
|
||
|
CVE-2022-40118 - https://github.com/zakee94/online-banking-system/issues/19
|
||
|
CVE-2022-40119 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection6.md
|
||
|
CVE-2022-40119 - https://github.com/zakee94/online-banking-system/issues/11
|
||
|
CVE-2022-4012 - https://github.com/golamsarwar08/hms/issues/1
|
||
|
CVE-2022-4012 - https://vuldb.com/?id.213786
|
||
|
CVE-2022-40120 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection7.md
|
||
|
CVE-2022-40120 - https://github.com/zakee94/online-banking-system/issues/14
|
||
|
CVE-2022-40121 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection8.md
|
||
|
CVE-2022-40121 - https://github.com/zakee94/online-banking-system/issues/12
|
||
|
CVE-2022-40122 - https://github.com/0clickjacking0/BugReport/blob/main/online-banking-system/sql_injection10.md
|
||
|
CVE-2022-40122 - https://github.com/zakee94/online-banking-system/issues/15
|
||
|
CVE-2022-40123 - https://weed-1.gitbook.io/cve/mojoportal/directory-traversal-in-mojoportal-v2.7-cve-2022-40123
|
||
|
CVE-2022-40129 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1614
|
||
|
CVE-2022-4013 - https://github.com/golamsarwar08/hms/issues/2
|
||
|
CVE-2022-4013 - https://vuldb.com/?id.213787
|
||
|
CVE-2022-40133 - https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
|
||
|
CVE-2022-4014 - https://vuldb.com/?id.213788
|
||
|
CVE-2022-4015 - https://github.com/shreyansh225/Sports-Club-Management-System/issues/6
|
||
|
CVE-2022-4015 - https://vuldb.com/?id.213789
|
||
|
CVE-2022-4016 - https://wpscan.com/vulnerability/9b77044c-fd3f-4e6f-a759-dcc3082dcbd6
|
||
|
CVE-2022-4017 - https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4
|
||
|
CVE-2022-4018 - https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5
|
||
|
CVE-2022-4019 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-40220 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1612
|
||
|
CVE-2022-40222 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638
|
||
|
CVE-2022-40224 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1618
|
||
|
CVE-2022-4023 - https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/
|
||
|
CVE-2022-4023 - https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee
|
||
|
CVE-2022-40233 - https://www.ibm.com/support/pages/node/6847947
|
||
|
CVE-2022-4024 - https://wpscan.com/vulnerability/a087fb45-6f6c-40ac-b48b-2cbceda86cbe
|
||
|
CVE-2022-40250 - https://www.binarly.io/advisories/BRLY-2022-016
|
||
|
CVE-2022-40277 - https://github.com/laurent22/joplin
|
||
|
CVE-2022-40282 - http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html
|
||
|
CVE-2022-40282 - http://seclists.org/fulldisclosure/2022/Nov/19
|
||
|
CVE-2022-40284 - https://github.com/tuxera/ntfs-3g/releases
|
||
|
CVE-2022-40297 - https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc
|
||
|
CVE-2022-40298 - https://www.crestron.com/Security/Security_Advisories
|
||
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-40303 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-40304 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-40305 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-023.txt
|
||
|
CVE-2022-40306 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-042.txt
|
||
|
CVE-2022-40319 - https://packetstormsecurity.com/2301-exploits/listserv17-idor.txt
|
||
|
CVE-2022-40320 - https://github.com/libconfuse/libconfuse/issues/163
|
||
|
CVE-2022-40347 - http://packetstormsecurity.com/files/171740/Intern-Record-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-40347 - https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated
|
||
|
CVE-2022-40348 - https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated
|
||
|
CVE-2022-40357 - https://github.com/zblogcn/zblogphp/issues/336
|
||
|
CVE-2022-40359 - https://cxsecurity.com/issue/WLB-2022090057
|
||
|
CVE-2022-40363 - https://github.com/flipperdevices/flipperzero-firmware/pull/1697
|
||
|
CVE-2022-4042 - https://wpscan.com/vulnerability/8ec76242-717d-4d2d-9c0f-3056cd7c2c90
|
||
|
CVE-2022-4043 - https://wpscan.com/vulnerability/ffff8c83-0a59-450a-9b40-c7f3af7205fc
|
||
|
CVE-2022-40434 - https://isaghojaria.medium.com/softr-v2-0-was-discovered-to-be-vulnerable-to-html-injection-via-the-name-field-of-the-account-page-c6fbd3162254
|
||
|
CVE-2022-40439 - https://github.com/axiomatic-systems/Bento4/issues/750
|
||
|
CVE-2022-4044 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-40440 - https://github.com/SxB64/mxgraph-xss-vul/wiki
|
||
|
CVE-2022-40443 - https://github.com/liong007/ZZCMS/issues/1
|
||
|
CVE-2022-40444 - https://github.com/liong007/ZZCMS/issues/2
|
||
|
CVE-2022-4045 - https://mattermost.com/security-updates/
|
||
|
CVE-2022-40469 - https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469
|
||
|
CVE-2022-4047 - https://wpscan.com/vulnerability/8965a87c-5fe5-4b39-88f3-e00966ca1d94
|
||
|
CVE-2022-40470 - https://drive.google.com/file/d/1UDuez2CTscdWXYzyXLi3x8CMs9IWLL11/view?usp=sharing
|
||
|
CVE-2022-40471 - https://drive.google.com/file/d/1m-wTfOL5gY3huaSEM3YPSf98qIrkl-TW/view?usp=sharing
|
||
|
CVE-2022-40471 - https://github.com/RashidKhanPathan/CVE-2022-40471
|
||
|
CVE-2022-40476 - https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.62
|
||
|
CVE-2022-40482 - https://ephort.dk/blog/laravel-timing-attack-vulnerability/
|
||
|
CVE-2022-40482 - https://github.com/ephort/laravel-user-enumeration-demo
|
||
|
CVE-2022-40486 - https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md
|
||
|
CVE-2022-40489 - https://github.com/thinkcmf/thinkcmf/issues/736
|
||
|
CVE-2022-4049 - https://wpscan.com/vulnerability/9b0781e2-ad62-4308-bafc-d45b9a2472be
|
||
|
CVE-2022-40494 - https://blog.carrot2.cn/2022/08/cve-2022-40494.html
|
||
|
CVE-2022-4050 - https://wpscan.com/vulnerability/5c96bb40-4c2d-4e91-8339-e0ddce25912f
|
||
|
CVE-2022-4051 - https://github.com/itzmehedi/Hostel-searching-project-using-PHP-Mysql/issues/1
|
||
|
CVE-2022-4052 - https://vuldb.com/?id.213845
|
||
|
CVE-2022-4053 - https://vuldb.com/?id.213846
|
||
|
CVE-2022-4057 - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af
|
||
|
CVE-2022-4058 - https://wpscan.com/vulnerability/89656cb3-4611-4ae7-b7f8-1b22eb75cfc4
|
||
|
CVE-2022-4059 - https://wpscan.com/vulnerability/d94bb664-261a-4f3f-8cc3-a2db8230895d
|
||
|
CVE-2022-4060 - https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e
|
||
|
CVE-2022-4061 - https://wpscan.com/vulnerability/fec68e6e-f612-43c8-8301-80f7ae3be665
|
||
|
CVE-2022-40621 - https://www.malbytes.net/2022/07/wavlink-quantum-d4g-zero-day-part-01.html
|
||
|
CVE-2022-40622 - https://youtu.be/cSileV8YbsQ?t=655
|
||
|
CVE-2022-40623 - https://youtu.be/cSileV8YbsQ?t=1028
|
||
|
CVE-2022-40624 - https://github.com/dhammon/pfBlockerNg-CVE-2022-40624
|
||
|
CVE-2022-4063 - https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7
|
||
|
CVE-2022-4064 - https://github.com/petergoldstein/dalli/issues/932
|
||
|
CVE-2022-4067 - https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72
|
||
|
CVE-2022-4068 - https://huntr.dev/bounties/becfecc4-22a6-4f94-bf83-d6030b625fdc
|
||
|
CVE-2022-40684 - http://packetstormsecurity.com/files/169431/Fortinet-FortiOS-FortiProxy-FortiSwitchManager-Authentication-Bypass.html
|
||
|
CVE-2022-40684 - http://packetstormsecurity.com/files/171515/Fortinet-7.2.1-Authentication-Bypass.html
|
||
|
CVE-2022-4069 - https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5
|
||
|
CVE-2022-40691 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1621
|
||
|
CVE-2022-40693 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1616
|
||
|
CVE-2022-4070 - https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775
|
||
|
CVE-2022-40701 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1606
|
||
|
CVE-2022-40711 - https://verneet.com/cve-2022-40711/
|
||
|
CVE-2022-40712 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-40713 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-40714 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-40715 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150
|
||
|
CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1320186966
|
||
|
CVE-2022-40734 - https://github.com/UniSharp/laravel-filemanager/issues/1150#issuecomment-1825310417
|
||
|
CVE-2022-40735 - https://dheatattack.gitlab.io/
|
||
|
CVE-2022-40735 - https://github.com/mozilla/ssl-config-generator/issues/162
|
||
|
CVE-2022-40735 - https://ieeexplore.ieee.org/document/10374117
|
||
|
CVE-2022-40735 - https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf
|
||
|
CVE-2022-40735 - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf
|
||
|
CVE-2022-40736 - https://github.com/axiomatic-systems/Bento4/issues/755
|
||
|
CVE-2022-40737 - https://github.com/axiomatic-systems/Bento4/issues/756
|
||
|
CVE-2022-40738 - https://github.com/axiomatic-systems/Bento4/issues/756
|
||
|
CVE-2022-40755 - https://github.com/jasper-software/jasper/issues/338
|
||
|
CVE-2022-40761 - https://github.com/Samsung/mTower/issues/83
|
||
|
CVE-2022-40769 - https://blog.1inch.io/a-vulnerability-disclosed-in-profanity-an-ethereum-vanity-address-tool-68ed7455fc8c
|
||
|
CVE-2022-40774 - https://github.com/axiomatic-systems/Bento4/issues/757
|
||
|
CVE-2022-40775 - https://github.com/axiomatic-systems/Bento4/issues/758
|
||
|
CVE-2022-40797 - http://packetstormsecurity.com/files/169964/Roxy-Fileman-1.4.6-Remote-Shell-Upload.html
|
||
|
CVE-2022-40798 - https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc
|
||
|
CVE-2022-40839 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40839/poc.txt
|
||
|
CVE-2022-40840 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40840/poc.txt
|
||
|
CVE-2022-40841 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40841/poc.txt
|
||
|
CVE-2022-40842 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-40842/poc.txt
|
||
|
CVE-2022-40843 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-40844 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-40845 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-40846 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-40847 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-40849 - https://github.com/thinkcmf/thinkcmf/issues/737
|
||
|
CVE-2022-40851 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/addressNat.md
|
||
|
CVE-2022-40853 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/form_fast_setting_wifi_set.md
|
||
|
CVE-2022-40854 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md
|
||
|
CVE-2022-40855 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formSetPortMapping.md
|
||
|
CVE-2022-40860 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/formSetQosBand.md
|
||
|
CVE-2022-40861 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/formSetQosBand.md
|
||
|
CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromNatStaticSetting.md
|
||
|
CVE-2022-40862 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromNatStaticSetting.md
|
||
|
CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSmartPowerManagement.md
|
||
|
CVE-2022-40864 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSmartPowerManagement.md
|
||
|
CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/setSchedWifi.md
|
||
|
CVE-2022-40865 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/setSchedWifi.md
|
||
|
CVE-2022-40866 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/setDebugCfg.md
|
||
|
CVE-2022-40867 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formIPMacBindDel.md
|
||
|
CVE-2022-40868 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/W20E/formDelDhcpRule.md
|
||
|
CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC15/fromDhcpListClient-list.md
|
||
|
CVE-2022-40869 - https://github.com/CPSeek/Router-vuls/blob/main/Tenda/AC18/fromDhcpListClient-list.md
|
||
|
CVE-2022-40871 - https://github.com/youncyb/dolibarr-rce
|
||
|
CVE-2022-40874 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html
|
||
|
CVE-2022-40875 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html
|
||
|
CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16695155.html
|
||
|
CVE-2022-40876 - https://www.cnblogs.com/L0g4n-blog/p/16704071.html
|
||
|
CVE-2022-40877 - https://www.exploit-db.com/exploits/50725
|
||
|
CVE-2022-40878 - https://www.exploit-db.com/exploits/50726
|
||
|
CVE-2022-40879 - https://github.com/kekingcn/kkFileView/issues/389
|
||
|
CVE-2022-4088 - https://github.com/rickxy/Stock-Management-System/issues/2
|
||
|
CVE-2022-40881 - https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php
|
||
|
CVE-2022-40884 - https://github.com/yangfar/CVE/blob/main/CVE-2022-40884.md
|
||
|
CVE-2022-40887 - https://github.com/toyydsBT123/One_of_my_take_on_SourceCodester/blob/main/Best-Student-Result-Management-System_1.0.poc.md
|
||
|
CVE-2022-4089 - https://github.com/rickxy/Stock-Management-System/issues/3
|
||
|
CVE-2022-40890 - https://github.com/ToughRunner/Open5gs_bugreport
|
||
|
CVE-2022-40896 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2/
|
||
|
CVE-2022-40897 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
||
|
CVE-2022-40898 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
||
|
CVE-2022-40899 - https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
|
||
|
CVE-2022-4090 - https://github.com/rickxy/Stock-Management-System/issues/4
|
||
|
CVE-2022-40912 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php
|
||
|
CVE-2022-40918 - https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368
|
||
|
CVE-2022-40922 - https://github.com/lief-project/LIEF/issues/781
|
||
|
CVE-2022-40923 - https://github.com/lief-project/LIEF/issues/784
|
||
|
CVE-2022-4093 - https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788
|
||
|
CVE-2022-40931 - https://github.com/dutchcoders/transfer.sh/issues/500
|
||
|
CVE-2022-40943 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/bwdate-report-ds-sql(CVE-2022-40943).md
|
||
|
CVE-2022-40944 - https://caicaizi.top/archives/9/
|
||
|
CVE-2022-40944 - https://github.com/Qrayyy/CVE/blob/main/Dairy%20Farm%20Shop%20Management%20System/sales-report-ds-sql(CVE-2022-40944).md
|
||
|
CVE-2022-40946 - http://packetstormsecurity.com/files/171484/D-Link-DIR-819-A1-Denial-Of-Service.html
|
||
|
CVE-2022-40946 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4095 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73
|
||
|
CVE-2022-40956 - https://bugzilla.mozilla.org/show_bug.cgi?id=1770094
|
||
|
CVE-2022-40959 - https://bugzilla.mozilla.org/show_bug.cgi?id=1782211
|
||
|
CVE-2022-4096 - https://huntr.dev/bounties/7969e834-5982-456e-9683-861a7a5e2d22
|
||
|
CVE-2022-40969 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1607
|
||
|
CVE-2022-4097 - https://wpscan.com/vulnerability/15819d33-7497-4f7d-bbb8-b3ab147806c4
|
||
|
CVE-2022-40982 - https://downfall.page
|
||
|
CVE-2022-40983 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1617
|
||
|
CVE-2022-40985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40986 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40987 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40989 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-4099 - https://wpscan.com/vulnerability/a282dd39-926d-406b-b8f5-e4c6e0c2c028
|
||
|
CVE-2022-40990 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40993 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40994 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40995 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40996 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40997 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40998 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-40999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41000 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41001 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41002 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41003 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41004 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41005 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41006 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41007 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41008 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41009 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-4101 - https://wpscan.com/vulnerability/2ce4c837-c62c-41ac-95ca-54bb1a6d1eeb
|
||
|
CVE-2022-41010 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41011 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41012 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41013 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41014 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41015 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41016 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41017 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41018 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41019 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-4102 - https://wpscan.com/vulnerability/c177f763-0bb5-4734-ba2e-7ba816578937
|
||
|
CVE-2022-41020 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41021 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41022 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41023 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41024 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41025 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41026 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41027 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41028 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-41029 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-4103 - https://wpscan.com/vulnerability/5e1244f7-39b5-4f37-8fef-e3f35fc388f1
|
||
|
CVE-2022-41030 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1613
|
||
|
CVE-2022-4104 - https://tenable.com/security/research/TRA-2022-35
|
||
|
CVE-2022-41040 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html
|
||
|
CVE-2022-41040 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/
|
||
|
CVE-2022-4105 - https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8
|
||
|
CVE-2022-41057 - http://packetstormsecurity.com/files/170128/SentinelOne-sentinelagent-22.3.2.5-Privilege-Escalation.html
|
||
|
CVE-2022-41057 - http://packetstormsecurity.com/files/170128/Windows-HTTP.SYS-Kerberos-PAC-Verification-Bypass-Privilege-Escalation.html
|
||
|
CVE-2022-4106 - https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed
|
||
|
CVE-2022-4107 - https://wpscan.com/vulnerability/0b432858-722c-4bda-aa95-ad48e2097302
|
||
|
CVE-2022-41073 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html
|
||
|
CVE-2022-4108 - https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470
|
||
|
CVE-2022-41082 - http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html
|
||
|
CVE-2022-41082 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/
|
||
|
CVE-2022-4109 - https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670
|
||
|
CVE-2022-4110 - https://wpscan.com/vulnerability/037a81b2-8fd8-4898-bb5b-d15d9a38778c
|
||
|
CVE-2022-4111 - https://huntr.dev/bounties/5596d072-66d2-4361-8cac-101c9c781c3d
|
||
|
CVE-2022-4112 - https://wpscan.com/vulnerability/4cbce79d-9b7a-41f5-9c52-08933ea7c28e
|
||
|
CVE-2022-41128 - https://www.secpod.com/blog/microsoft-november-2022-patch-tuesday-patches-65-vulnerabilities-including-6-zero-days/
|
||
|
CVE-2022-41138 - https://bugs.gentoo.org/868495
|
||
|
CVE-2022-41139 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-7344-4pg9-qf45
|
||
|
CVE-2022-4114 - https://wpscan.com/vulnerability/7569f4ac-05c9-43c9-95e0-5cc360524bbd
|
||
|
CVE-2022-41142 - https://github.com/centreon/centreon/security/policy
|
||
|
CVE-2022-4115 - https://wpscan.com/vulnerability/2b5071e1-9532-4a6c-9da4-d07932474ca4
|
||
|
CVE-2022-41154 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1637
|
||
|
CVE-2022-41166 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41167 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41168 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41169 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-4117 - https://wpscan.com/vulnerability/1fac3eb4-13c0-442d-b27c-7b7736208193
|
||
|
CVE-2022-41170 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41171 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41172 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41173 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41174 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41175 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41176 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41177 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41178 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41179 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-4118 - https://wpscan.com/vulnerability/2839ff82-7d37-4392-8fa3-d490680d42c4
|
||
|
CVE-2022-41180 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41181 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41182 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41183 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41184 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-4119 - https://wpscan.com/vulnerability/11040133-c134-4f96-8421-edd04901ed0d
|
||
|
CVE-2022-41190 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41191 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41192 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41193 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41194 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41195 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41196 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41197 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41198 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41199 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-4120 - https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf
|
||
|
CVE-2022-41200 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41201 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41202 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41203 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41204 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41205 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41206 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41207 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41208 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41209 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-4121 - https://github.com/dinhvh/libetpan/issues/420
|
||
|
CVE-2022-41210 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41211 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41212 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41214 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41215 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/23/4
|
||
|
CVE-2022-41218 - http://www.openwall.com/lists/oss-security/2022/09/24/1
|
||
|
CVE-2022-41221 - https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability
|
||
|
CVE-2022-41222 - http://packetstormsecurity.com/files/168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html
|
||
|
CVE-2022-41222 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
|
||
|
CVE-2022-41222 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
||
|
CVE-2022-4124 - https://wpscan.com/vulnerability/60786bf8-c0d7-4d80-b189-866aba79bce2
|
||
|
CVE-2022-4125 - https://wpscan.com/vulnerability/7862084a-2821-4ef1-8d01-c9c8b3f28b05
|
||
|
CVE-2022-41258 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41259 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41260 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41261 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41262 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41263 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41264 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41266 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41272 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41273 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41274 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41275 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2022-41311 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
|
||
|
CVE-2022-41312 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
|
||
|
CVE-2022-41313 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1619
|
||
|
CVE-2022-41322 - https://bugs.gentoo.org/868543
|
||
|
CVE-2022-41333 - http://packetstormsecurity.com/files/171766/FortiRecorder-6.4.3-Denial-Of-Service.html
|
||
|
CVE-2022-41343 - https://tantosec.com/blog/cve-2022-41343/
|
||
|
CVE-2022-41352 - http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
|
||
|
CVE-2022-41358 - http://packetstormsecurity.com/files/168718/Garage-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-41358 - https://cxsecurity.com/issue/WLB-2022100037
|
||
|
CVE-2022-41358 - https://github.com/thecasual/CVE-2022-41358
|
||
|
CVE-2022-41358 - https://vulmon.com/vulnerabilitydetails?qid=CVE-2022-41358
|
||
|
CVE-2022-4136 - https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3
|
||
|
CVE-2022-41376 - https://alicangonullu.org/konu/138
|
||
|
CVE-2022-4138 - https://gitlab.com/gitlab-org/gitlab/-/issues/383709
|
||
|
CVE-2022-41392 - https://www.edoardoottavianelli.it/CVE-2022-41392/
|
||
|
CVE-2022-41392 - https://www.youtube.com/watch?v=BOPLYnveBqk
|
||
|
CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router
|
||
|
CVE-2022-41395 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router
|
||
|
CVE-2022-41396 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-4140 - https://wpscan.com/vulnerability/0d649a7e-3334-48f7-abca-fff0856e12c7
|
||
|
CVE-2022-41401 - https://github.com/ixSly/CVE-2022-41401
|
||
|
CVE-2022-41403 - https://packetstormsecurity.com/files/168412/OpenCart-3.x-Newsletter-Custom-Popup-4.0-SQL-Injection.html
|
||
|
CVE-2022-41404 - https://sourceforge.net/p/ini4j/bugs/56/
|
||
|
CVE-2022-4141 - https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f
|
||
|
CVE-2022-41412 - http://packetstormsecurity.com/files/170069/perfSONAR-4.4.4-Open-Proxy-Relay.html
|
||
|
CVE-2022-41412 - https://github.com/renmizo/CVE-2022-41412
|
||
|
CVE-2022-41413 - http://packetstormsecurity.com/files/170070/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-41413 - http://packetstormsecurity.com/files/171629/perfSONAR-4.4.5-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-41413 - https://github.com/renmizo/CVE-2022-41413
|
||
|
CVE-2022-41415 - https://github.com/10TG/vulnerabilities/blob/main/Acer/CVE-2022-41415/CVE-2022-41415.md
|
||
|
CVE-2022-41419 - https://github.com/axiomatic-systems/Bento4/issues/766
|
||
|
CVE-2022-4142 - https://wpscan.com/vulnerability/8c2adadd-0684-49a8-9185-0c7d9581aef1
|
||
|
CVE-2022-41423 - https://github.com/axiomatic-systems/Bento4/issues/767
|
||
|
CVE-2022-41424 - https://github.com/axiomatic-systems/Bento4/issues/768
|
||
|
CVE-2022-41425 - https://github.com/axiomatic-systems/Bento4/issues/772
|
||
|
CVE-2022-41426 - https://github.com/axiomatic-systems/Bento4/issues/772
|
||
|
CVE-2022-41427 - https://github.com/axiomatic-systems/Bento4/issues/772
|
||
|
CVE-2022-41428 - https://github.com/axiomatic-systems/Bento4/issues/773
|
||
|
CVE-2022-41429 - https://github.com/axiomatic-systems/Bento4/issues/773
|
||
|
CVE-2022-41430 - https://github.com/axiomatic-systems/Bento4/issues/773
|
||
|
CVE-2022-41441 - http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html
|
||
|
CVE-2022-41441 - https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/
|
||
|
CVE-2022-41445 - https://github.com/RashidKhanPathan/CVE-2022-41445
|
||
|
CVE-2022-41445 - https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor
|
||
|
CVE-2022-41446 - https://github.com/RashidKhanPathan/CVE-2022-41446
|
||
|
CVE-2022-41446 - https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor
|
||
|
CVE-2022-41473 - https://github.com/ralap-z/rpcms/issues/1
|
||
|
CVE-2022-41474 - https://github.com/ralap-z/rpcms/issues/3
|
||
|
CVE-2022-41475 - https://github.com/ralap-z/rpcms/issues/2
|
||
|
CVE-2022-41477 - https://github.com/zer0yu/CVE_Request/blob/master/Webid/WeBid_Path_Traversal.md
|
||
|
CVE-2022-4148 - https://wpscan.com/vulnerability/be9b25c8-b0d7-4c22-81ff-e41650a4ed41
|
||
|
CVE-2022-41495 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF2.md
|
||
|
CVE-2022-41496 - https://github.com/jayus0821/insight/blob/master/iCMS%20SSRF.md
|
||
|
CVE-2022-41497 - https://github.com/jayus0821/insight/blob/master/ClipperCMS%20SSRF.md
|
||
|
CVE-2022-4150 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_13
|
||
|
CVE-2022-4150 - https://wpscan.com/vulnerability/d5d39138-a216-46cd-9e5f-fc706a2c93da
|
||
|
CVE-2022-4151 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_2
|
||
|
CVE-2022-4151 - https://wpscan.com/vulnerability/e1320c2a-818d-4e91-8dc9-ba95a1dc4377
|
||
|
CVE-2022-4152 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_4
|
||
|
CVE-2022-4152 - https://wpscan.com/vulnerability/4b058966-0859-42ed-a796-b6c6cb08a9fc
|
||
|
CVE-2022-4153 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_7
|
||
|
CVE-2022-4153 - https://wpscan.com/vulnerability/35b0126d-9293-4e64-a00f-0903303f960a
|
||
|
CVE-2022-4154 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_5
|
||
|
CVE-2022-4154 - https://wpscan.com/vulnerability/dac32ed4-d3df-420a-a2eb-9e7d2435826a
|
||
|
CVE-2022-41540 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption
|
||
|
CVE-2022-41541 - https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay
|
||
|
CVE-2022-41542 - https://medium.com/@sc0p3hacker/cve-2022-41542-session-mis-configuration-in-devhub-application-ca956bb9027a
|
||
|
CVE-2022-41544 - http://packetstormsecurity.com/files/172553/GetSimple-CMS-3.3.16-Shell-Upload.html
|
||
|
CVE-2022-41547 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166
|
||
|
CVE-2022-4155 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_6
|
||
|
CVE-2022-4155 - https://wpscan.com/vulnerability/a55c6a62-3744-4374-b01a-cb074ac64b4d
|
||
|
CVE-2022-4156 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_1
|
||
|
CVE-2022-4156 - https://wpscan.com/vulnerability/254f6e8b-5fa9-4d6d-8e0e-1a4cae18aee0
|
||
|
CVE-2022-4157 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_3
|
||
|
CVE-2022-4157 - https://wpscan.com/vulnerability/71feec63-67a5-482e-bf77-1396c306fae6
|
||
|
CVE-2022-4158 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_15
|
||
|
CVE-2022-4158 - https://wpscan.com/vulnerability/1b3b51af-ad73-4f8e-ba97-375b8a363b64
|
||
|
CVE-2022-4159 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_8
|
||
|
CVE-2022-4159 - https://wpscan.com/vulnerability/2e993280-1007-4e9d-9ca6-2b5f774e9965
|
||
|
CVE-2022-4160 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_14
|
||
|
CVE-2022-4160 - https://wpscan.com/vulnerability/813de343-4814-42b8-b8df-1695320512cd
|
||
|
CVE-2022-4161 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_16
|
||
|
CVE-2022-4161 - https://wpscan.com/vulnerability/a66af8f7-1d5f-4fe5-a2ba-03337064583b
|
||
|
CVE-2022-4162 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_9
|
||
|
CVE-2022-4162 - https://wpscan.com/vulnerability/011500ac-17e4-4d4f-bbd9-1fec70511776
|
||
|
CVE-2022-4163 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_10
|
||
|
CVE-2022-4163 - https://wpscan.com/vulnerability/de0d7db7-f911-4f5f-97f6-885ca60822d1
|
||
|
CVE-2022-41639 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1633
|
||
|
CVE-2022-4164 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_11
|
||
|
CVE-2022-4164 - https://wpscan.com/vulnerability/57fff222-2c64-4b52-86cd-ab8db4541627
|
||
|
CVE-2022-41649 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1631
|
||
|
CVE-2022-4165 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_17
|
||
|
CVE-2022-4165 - https://wpscan.com/vulnerability/857aba7d-fccd-4672-b734-ab228440dcc0
|
||
|
CVE-2022-41654 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1624
|
||
|
CVE-2022-4166 - https://bulletin.iese.de/post/contest-gallery_19-1-4-1_12
|
||
|
CVE-2022-4166 - https://wpscan.com/vulnerability/6e7de2bb-5f71-4c27-ae79-4f6b2ba7f86f
|
||
|
CVE-2022-41666 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
||
|
CVE-2022-41667 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
||
|
CVE-2022-41668 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
||
|
CVE-2022-41669 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
||
|
CVE-2022-41670 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
||
|
CVE-2022-41671 - https://www.se.com/ww/en/download/document/SEVD-2022-284-01/
|
||
|
CVE-2022-41674 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
||
|
CVE-2022-41674 - https://www.openwall.com/lists/oss-security/2022/10/13/5
|
||
|
CVE-2022-41684 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1632
|
||
|
CVE-2022-41697 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1625
|
||
|
CVE-2022-4173 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2022-41760 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-41761 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-41762 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-41763 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-41793 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667
|
||
|
CVE-2022-41793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667
|
||
|
CVE-2022-41794 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1626
|
||
|
CVE-2022-41837 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1636
|
||
|
CVE-2022-41838 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1634
|
||
|
CVE-2022-41841 - https://github.com/axiomatic-systems/Bento4/issues/779
|
||
|
CVE-2022-41842 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928
|
||
|
CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42344
|
||
|
CVE-2022-41843 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42325&sid=7b08ba9a518a99ce3c5ff40e53fc6421
|
||
|
CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928
|
||
|
CVE-2022-41844 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844
|
||
|
CVE-2022-41845 - https://github.com/axiomatic-systems/Bento4/issues/770
|
||
|
CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/342
|
||
|
CVE-2022-41846 - https://github.com/axiomatic-systems/Bento4/issues/770
|
||
|
CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/750
|
||
|
CVE-2022-41847 - https://github.com/axiomatic-systems/Bento4/issues/775
|
||
|
CVE-2022-41884 - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636
|
||
|
CVE-2022-41912 - http://packetstormsecurity.com/files/170356/crewjam-saml-Signature-Bypass.html
|
||
|
CVE-2022-41924 - https://emily.id.au/tailscale
|
||
|
CVE-2022-41924 - https://tailscale.com/security-bulletins/#ts-2022-004
|
||
|
CVE-2022-41925 - https://emily.id.au/tailscale
|
||
|
CVE-2022-41925 - https://tailscale.com/security-bulletins/#ts-2022-005
|
||
|
CVE-2022-41945 - https://github.com/4ra1n/super-xray/releases/tag/0.2-beta
|
||
|
CVE-2022-41950 - https://github.com/4ra1n/super-xray/releases/tag/0.3-beta
|
||
|
CVE-2022-41952 - https://github.com/matrix-org/synapse/pull/11936
|
||
|
CVE-2022-41955 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/
|
||
|
CVE-2022-41956 - https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/
|
||
|
CVE-2022-41958 - https://github.com/4ra1n/super-xray/security/advisories/GHSA-39pv-4vmj-c4fr
|
||
|
CVE-2022-4196 - https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88
|
||
|
CVE-2022-4197 - https://wpscan.com/vulnerability/96818024-57ab-419d-bd46-7d2da98269e6
|
||
|
CVE-2022-41973 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html
|
||
|
CVE-2022-41973 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
||
|
CVE-2022-41974 - http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-Bypass-Symlink-Attack.html
|
||
|
CVE-2022-41974 - http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
|
||
|
CVE-2022-41976 - https://m3n0sd0n4ld.blogspot.com/2022/11/scada-lts-privilege-escalation-cve-2022.html
|
||
|
CVE-2022-41977 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1627
|
||
|
CVE-2022-4198 - https://wpscan.com/vulnerability/ba372400-96f7-45a9-9e89-5984ecc4d1e2
|
||
|
CVE-2022-41981 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1628
|
||
|
CVE-2022-41985 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680
|
||
|
CVE-2022-41988 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1643
|
||
|
CVE-2022-4199 - https://wpscan.com/vulnerability/c4688c0b-0538-4151-995c-d437d7e4829d
|
||
|
CVE-2022-41991 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1639
|
||
|
CVE-2022-41992 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1644
|
||
|
CVE-2022-41999 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1635
|
||
|
CVE-2022-4200 - https://wpscan.com/vulnerability/ac2e3fea-e1e6-4d90-9945-d8434a00a3cf
|
||
|
CVE-2022-4201 - https://gitlab.com/gitlab-org/gitlab/-/issues/30376
|
||
|
CVE-2022-4202 - https://github.com/gpac/gpac/issues/2333
|
||
|
CVE-2022-42045 - https://github.com/ReCryptLLC/CVE-2022-42045/tree/main
|
||
|
CVE-2022-42046 - https://github.com/kkent030315/CVE-2022-42046
|
||
|
CVE-2022-42053 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-42054 - https://boschko.ca/glinet-router
|
||
|
CVE-2022-42055 - https://boschko.ca/glinet-router
|
||
|
CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router
|
||
|
CVE-2022-42058 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-4206 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4206.json
|
||
|
CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router
|
||
|
CVE-2022-42060 - https://boschko.ca/tenda_ac1200_router/
|
||
|
CVE-2022-42064 - https://packetstormsecurity.com/files/168498/Online-Diagnostic-Lab-Management-System-1.0-SQL-Injection-Shell-Upload.html
|
||
|
CVE-2022-42066 - https://packetstormsecurity.com/files/168549/Online-Examination-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-42067 - https://packetstormsecurity.com/files/168524/Online-Birth-Certificate-Management-System-1.0-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2022-42069 - https://packetstormsecurity.com/files/168529/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-42070 - https://packetstormsecurity.com/files/168522/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Request-Forgery.html
|
||
|
CVE-2022-42071 - https://packetstormsecurity.com/files/168533/Online-Birth-Certificate-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-42077 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-1.md
|
||
|
CVE-2022-42078 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-2.md
|
||
|
CVE-2022-42079 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-3.md
|
||
|
CVE-2022-4208 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42080 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-4.md
|
||
|
CVE-2022-42081 - https://github.com/tianhui999/myCVE/blob/main/AC1206/AC1206-5.md
|
||
|
CVE-2022-42086 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-2.md
|
||
|
CVE-2022-42087 - https://github.com/tianhui999/myCVE/blob/main/AX1803/AX1803-1.md
|
||
|
CVE-2022-4209 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42092 - https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c
|
||
|
CVE-2022-42094 - https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xss-at-cards-84266b5250f1
|
||
|
CVE-2022-42095 - https://grimthereaperteam.medium.com/declined-backdrop-xss-at-pages-26e5d63686bc
|
||
|
CVE-2022-42096 - https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xss-at-posts-437c305036e2
|
||
|
CVE-2022-42097 - https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xss-at-comments-2ea536ec55e1
|
||
|
CVE-2022-42098 - https://grimthereaperteam.medium.com/cve-2022-42098-klik-sql-injection-6a9299621789
|
||
|
CVE-2022-42099 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-forum-subject-a453789736f2
|
||
|
CVE-2022-4210 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42100 - https://grimthereaperteam.medium.com/klik-socialmediawebsite-version-1-0-1-stored-xss-vulnerability-at-reply-form-b189147c1f93
|
||
|
CVE-2022-42109 - https://medium.com/@grimthereaperteam/online-shopping-system-advanced-sql-injection-at-product-php-c55c435c35c2
|
||
|
CVE-2022-4211 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42110 - https://issues.liferay.com/browse/LPE-17403
|
||
|
CVE-2022-42111 - https://issues.liferay.com/browse/LPE-17379
|
||
|
CVE-2022-42118 - https://issues.liferay.com/browse/LPE-17342
|
||
|
CVE-2022-42119 - https://issues.liferay.com/browse/LPE-17632
|
||
|
CVE-2022-4212 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42120 - https://issues.liferay.com/browse/LPE-17513
|
||
|
CVE-2022-42121 - https://issues.liferay.com/browse/LPE-17414
|
||
|
CVE-2022-42122 - https://issues.liferay.com/browse/LPE-17520
|
||
|
CVE-2022-42123 - https://issues.liferay.com/browse/LPE-17518
|
||
|
CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17435
|
||
|
CVE-2022-42124 - https://issues.liferay.com/browse/LPE-17535
|
||
|
CVE-2022-42125 - https://issues.liferay.com/browse/LPE-17517
|
||
|
CVE-2022-42126 - https://issues.liferay.com/browse/LPE-17593
|
||
|
CVE-2022-42127 - https://issues.liferay.com/browse/LPE-17607
|
||
|
CVE-2022-42128 - https://issues.liferay.com/browse/LPE-17595
|
||
|
CVE-2022-42129 - https://issues.liferay.com/browse/LPE-17448
|
||
|
CVE-2022-42130 - https://issues.liferay.com/browse/LPE-17447
|
||
|
CVE-2022-42131 - https://issues.liferay.com/browse/LPE-17377
|
||
|
CVE-2022-42132 - https://issues.liferay.com/browse/LPE-17438
|
||
|
CVE-2022-42139 - https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/
|
||
|
CVE-2022-4214 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-4214 - https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4214
|
||
|
CVE-2022-42140 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/
|
||
|
CVE-2022-42141 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/
|
||
|
CVE-2022-4215 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42150 - https://github.com/eBPF-Research/eBPF-Attack/blob/main/PoC.md#attack-requirements
|
||
|
CVE-2022-42150 - https://hackmd.io/@UR9gnr32QymtmtZHnZceOw/ry428EZGo
|
||
|
CVE-2022-42156 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
||
|
CVE-2022-42156 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-42159 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
||
|
CVE-2022-42159 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4216 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42160 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
||
|
CVE-2022-42160 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-42161 - https://github.com/14isnot40/vul_discovery/blob/master/D-Link%20COVR%2012xx%20.pdf
|
||
|
CVE-2022-42161 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-42163 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromNatStaticSetting/readme.md
|
||
|
CVE-2022-42164 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetClientState/readme.md
|
||
|
CVE-2022-42165 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetDeviceName/readme.md
|
||
|
CVE-2022-42166 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetSpeedWan/readme.md
|
||
|
CVE-2022-42167 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formSetFirewallCfg/readme.md
|
||
|
CVE-2022-42168 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/fromSetIpMacBind/readme.md
|
||
|
CVE-2022-42169 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/addWifiMacFilter/readme.md
|
||
|
CVE-2022-4217 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42170 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/formWifiWpsStart/readme.md
|
||
|
CVE-2022-42171 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/AC10/saveParentControlInfo/readme.md
|
||
|
CVE-2022-42176 - https://github.com/soy-oreocato/CVE-2022-42176
|
||
|
CVE-2022-42176 - https://github.com/soy-oreocato/CVE-Advisories/tree/main/PapiQuieroPollo00
|
||
|
CVE-2022-4218 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-4219 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-42199 - https://github.com/ciph0x01/Simple-Exam-Reviewer-Management-System-CVE/blob/main/CVE-2022-42199.md
|
||
|
CVE-2022-42199 - https://github.com/ciph0x01/poc/blob/main/poc.html
|
||
|
CVE-2022-4220 - https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
|
||
|
CVE-2022-4222 - https://vuldb.com/?id.214523
|
||
|
CVE-2022-42221 - https://github.com/Cj775995/CVE_Report/tree/main/Netgear/R6220
|
||
|
CVE-2022-42235 - https://github.com/draco1725/Stored-XSS/blob/main/poc
|
||
|
CVE-2022-42236 - https://github.com/draco1725/vloggers/blob/main/poc
|
||
|
CVE-2022-42237 - https://github.com/draco1725/sqlinj/blob/main/poc
|
||
|
CVE-2022-42238 - https://github.com/draco1725/localpriv/blob/main/poc
|
||
|
CVE-2022-42245 - https://packetstormsecurity.com/files/171585/Dreamer-CMS-4.0.0-SQL-Injection.html
|
||
|
CVE-2022-42246 - https://github.com/farliy-hacker/Doufoxcms/issues/1
|
||
|
CVE-2022-42254 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42255 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42256 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42257 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42258 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42259 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-4226 - https://wpscan.com/vulnerability/c5ca22e0-b7a5-468d-8366-1855ff33851b
|
||
|
CVE-2022-42260 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42261 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42262 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42263 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42264 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42265 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42266 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42267 - https://nvidia.custhelp.com/app/answers/detail/a_id/5415
|
||
|
CVE-2022-42271 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42272 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42273 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42274 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42275 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42276 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42277 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42278 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42279 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-4228 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash
|
||
|
CVE-2022-4228 - https://vuldb.com/?id.214587
|
||
|
CVE-2022-42280 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42281 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42282 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42283 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42284 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42285 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42286 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42287 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42288 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-42289 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-4229 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/broken-access-control
|
||
|
CVE-2022-42290 - https://nvidia.custhelp.com/app/answers/detail/a_id/5435
|
||
|
CVE-2022-4230 - https://wpscan.com/vulnerability/a0e40cfd-b217-481c-8fc4-027a0a023312
|
||
|
CVE-2022-42300 - https://www.veritas.com/content/support/en_US/security/VTS22-013#M2
|
||
|
CVE-2022-4231 - https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation
|
||
|
CVE-2022-4233 - https://vuldb.com/?id.214591
|
||
|
CVE-2022-4235 - https://fluidattacks.com/advisories/miller/
|
||
|
CVE-2022-4236 - https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635
|
||
|
CVE-2022-4237 - https://wpscan.com/vulnerability/7a4b790c-49ae-46bc-9544-e188deae243f
|
||
|
CVE-2022-4239 - https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c
|
||
|
CVE-2022-4242 - https://wpscan.com/vulnerability/d7f89335-630c-47c6-bebf-92f556caa087
|
||
|
CVE-2022-4243 - https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0
|
||
|
CVE-2022-42457 - https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution
|
||
|
CVE-2022-4246 - https://seclists.org/fulldisclosure/2022/Nov/16
|
||
|
CVE-2022-4247 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/1
|
||
|
CVE-2022-4248 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/3
|
||
|
CVE-2022-4248 - https://vuldb.com/?id.214625
|
||
|
CVE-2022-42484 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1641
|
||
|
CVE-2022-42490 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
||
|
CVE-2022-42491 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
||
|
CVE-2022-42492 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
||
|
CVE-2022-42493 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1640
|
||
|
CVE-2022-4250 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/2
|
||
|
CVE-2022-4251 - https://github.com/aman05382/movie_ticket_booking_system_php/issues/4
|
||
|
CVE-2022-4256 - https://wpscan.com/vulnerability/f5b17c68-c2b0-4d0d-bb7b-19dc30511a89
|
||
|
CVE-2022-4257 - https://vuldb.com/?id.214631
|
||
|
CVE-2022-4260 - https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db
|
||
|
CVE-2022-4265 - https://wpscan.com/vulnerability/095cba08-7edd-41fb-9776-da151c0885dd
|
||
|
CVE-2022-4266 - https://wpscan.com/vulnerability/1bcda9d3-c573-441e-828f-055fbec2e08d
|
||
|
CVE-2022-4267 - https://wpscan.com/vulnerability/e09754f2-e241-4bf8-8c95-a3fbc0ba7585
|
||
|
CVE-2022-4268 - https://bulletin.iese.de/post/plugin-logic_1-0-7/
|
||
|
CVE-2022-4268 - https://wpscan.com/vulnerability/bde93d90-1178-4d55-aea9-e02c4f8bcaa2
|
||
|
CVE-2022-42703 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.7
|
||
|
CVE-2022-42703 - https://googleprojectzero.blogspot.com/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html
|
||
|
CVE-2022-4271 - https://huntr.dev/bounties/a11c922f-255a-412a-aa87-7f3bd7121599
|
||
|
CVE-2022-42710 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-42710/CVE-2022-42710.txt
|
||
|
CVE-2022-42716 - http://packetstormsecurity.com/files/170420/Arm-Mali-CSF-KBASE_REG_NO_USER_FREE-Unsafe-Use-Use-After-Free.html
|
||
|
CVE-2022-42719 - http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
|
||
|
CVE-2022-42719 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
||
|
CVE-2022-4272 - https://github.com/FeMiner/wms/issues/14
|
||
|
CVE-2022-42720 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
||
|
CVE-2022-42720 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
||
|
CVE-2022-42721 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
||
|
CVE-2022-42721 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
||
|
CVE-2022-42722 - http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
|
||
|
CVE-2022-42722 - http://www.openwall.com/lists/oss-security/2022/10/13/5
|
||
|
CVE-2022-4273 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/bypass-fileupload-rce
|
||
|
CVE-2022-4273 - https://vuldb.com/?id.214769
|
||
|
CVE-2022-42732 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-42733 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-42734 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-4274 - https://github.com/nikeshtiwari1/House-Rental-System/issues/6
|
||
|
CVE-2022-4274 - https://vuldb.com/?id.214770
|
||
|
CVE-2022-4275 - https://github.com/nikeshtiwari1/House-Rental-System/issues/7
|
||
|
CVE-2022-4276 - https://github.com/nikeshtiwari1/House-Rental-System/issues/8
|
||
|
CVE-2022-4276 - https://vuldb.com/?id.214772
|
||
|
CVE-2022-4278 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employeeadd-sqli
|
||
|
CVE-2022-4279 - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss
|
||
|
CVE-2022-4279 - https://vuldb.com/?id.214776
|
||
|
CVE-2022-4280 - https://vuldb.com/?id.214778
|
||
|
CVE-2022-42801 - http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html
|
||
|
CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42821 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42837 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42840 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42841 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-42842 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42843 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42844 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-42845 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42846 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42847 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42848 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42849 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-4285 - https://sourceware.org/bugzilla/show_bug.cgi?id=29699
|
||
|
CVE-2022-42850 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42851 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42852 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-42853 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42854 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42855 - http://packetstormsecurity.com/files/170518/libCoreEntitlements-CEContextQuery-Arbitrary-Entitlement-Returns.html
|
||
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42855 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/22
|
||
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42856 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42859 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42861 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42862 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42863 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42864 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42865 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42866 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-42867 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-42885 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668
|
||
|
CVE-2022-42889 - http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html
|
||
|
CVE-2022-42889 - http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html
|
||
|
CVE-2022-42891 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-42892 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-42893 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-42894 - https://www.siemens-healthineers.com/en-us/support-documentation/cybersecurity/shsa-741697
|
||
|
CVE-2022-42905 - http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html
|
||
|
CVE-2022-42905 - http://seclists.org/fulldisclosure/2023/Jan/11
|
||
|
CVE-2022-42905 - https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
|
||
|
CVE-2022-4291 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2022-42915 - http://seclists.org/fulldisclosure/2023/Jan/19
|
||
|
CVE-2022-42916 - http://seclists.org/fulldisclosure/2023/Jan/19
|
||
|
CVE-2022-4292 - https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
|
||
|
CVE-2022-42927 - https://bugzilla.mozilla.org/show_bug.cgi?id=1789128
|
||
|
CVE-2022-4293 - https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
|
||
|
CVE-2022-4294 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2022-42948 - https://www.cobaltstrike.com/blog/
|
||
|
CVE-2022-4295 - https://wpscan.com/vulnerability/4ced1a4d-0c1f-42ad-8473-241c68b92b56
|
||
|
CVE-2022-42953 - https://seclists.org/fulldisclosure/2022/Oct/23
|
||
|
CVE-2022-42953 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
||
|
CVE-2022-42964 - https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/
|
||
|
CVE-2022-42965 - https://research.jfrog.com/vulnerabilities/snowflake-connector-python-redos-xray-257185/
|
||
|
CVE-2022-42966 - https://research.jfrog.com/vulnerabilities/cleo-redos-xray-257186/
|
||
|
CVE-2022-42967 - https://research.jfrog.com/vulnerabilities/caret-xss-rce/
|
||
|
CVE-2022-42969 - https://github.com/pytest-dev/py/issues/287
|
||
|
CVE-2022-4297 - http://packetstormsecurity.com/files/173293/WordPress-WP-AutoComplete-Search-1.0.4-SQL-Injection.html
|
||
|
CVE-2022-4297 - https://wpscan.com/vulnerability/e2dcc76c-65ac-4cd6-a5c9-6d813b5ac26d
|
||
|
CVE-2022-42979 - https://medium.com/@jalee0606/how-i-found-my-first-one-click-account-takeover-via-deeplink-in-ryde-5406010c36d8
|
||
|
CVE-2022-4298 - https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478
|
||
|
CVE-2022-42980 - https://github.com/go-admin-team/go-admin/issues/716
|
||
|
CVE-2022-4299 - https://wpscan.com/vulnerability/169c5611-ed10-4cc3-bd07-09b365adf303
|
||
|
CVE-2022-42991 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Public%20Access%20Catalog/XSS
|
||
|
CVE-2022-42992 - https://github.com/draco1725/POC/blob/main/Exploit/Train%20Scheduler%20App/XSS
|
||
|
CVE-2022-42993 - https://github.com/draco1725/POC/blob/main/Exploit/Password%20Storage%20Application/XSS
|
||
|
CVE-2022-42998 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2IPQoSTcAdd
|
||
|
CVE-2022-42998 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-42999 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSysAdm
|
||
|
CVE-2022-42999 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4300 - https://vuldb.com/?id.214901
|
||
|
CVE-2022-43000 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep4
|
||
|
CVE-2022-43000 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-43001 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setSecurity
|
||
|
CVE-2022-43001 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-43002 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/form2WizardStep54
|
||
|
CVE-2022-43002 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-43003 - https://github.com/hunzi0/VulInfo/tree/main/D-Link/DIR-816/setRepeaterSecurity
|
||
|
CVE-2022-43003 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4301 - https://wpscan.com/vulnerability/a8dca528-fb70-44f3-8149-21385039179d
|
||
|
CVE-2022-43014 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_joborderID.md
|
||
|
CVE-2022-43015 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_entriesPerPage.md
|
||
|
CVE-2022-43016 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_callback.md
|
||
|
CVE-2022-43017 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_indexFile.md
|
||
|
CVE-2022-43018 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/XSS_in_checkEmail.md
|
||
|
CVE-2022-4302 - https://wpscan.com/vulnerability/b7707a15-0987-4051-a8ac-7be2424bcb01
|
||
|
CVE-2022-43020 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_in_Tag_Updates.md
|
||
|
CVE-2022-43021 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_JobOrders.md
|
||
|
CVE-2022-43022 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_tag_deletion.md
|
||
|
CVE-2022-43023 - https://github.com/hansmach1ne/opencats_zero-days/blob/main/SQLI_imports_errors.md
|
||
|
CVE-2022-43024 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-6.md
|
||
|
CVE-2022-43025 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-1.md
|
||
|
CVE-2022-43026 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-2.md
|
||
|
CVE-2022-43027 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-5.md
|
||
|
CVE-2022-43028 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-3.md
|
||
|
CVE-2022-43029 - https://github.com/tianhui999/myCVE/blob/main/TX3/TX3-4.md
|
||
|
CVE-2022-4303 - https://wpscan.com/vulnerability/8428a5e1-dbef-4516-983f-f95605c6dd09
|
||
|
CVE-2022-43039 - https://github.com/gpac/gpac/issues/2281
|
||
|
CVE-2022-43040 - https://github.com/gpac/gpac/issues/2280
|
||
|
CVE-2022-43042 - https://github.com/gpac/gpac/issues/2278
|
||
|
CVE-2022-43043 - https://github.com/gpac/gpac/issues/2276
|
||
|
CVE-2022-43044 - https://github.com/gpac/gpac/issues/2282
|
||
|
CVE-2022-43045 - https://github.com/gpac/gpac/issues/2277
|
||
|
CVE-2022-43046 - https://github.com/Oudaorui/bug_report/blob/main/vendors/oretnom23/Food%20Ordering%20Management%20System/XSS-1.md
|
||
|
CVE-2022-4305 - https://wpscan.com/vulnerability/286d972d-7bda-455c-a226-fd9ce5f925bd
|
||
|
CVE-2022-4306 - https://wpscan.com/vulnerability/18d7f9af-7267-4723-9d6f-05b895c94dbe
|
||
|
CVE-2022-4307 - https://wpscan.com/vulnerability/4000ba69-d73f-4c5b-a299-82898304cebb
|
||
|
CVE-2022-43071 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42349&p=43959#p43959
|
||
|
CVE-2022-43076 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-1.md
|
||
|
CVE-2022-43078 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-2.md
|
||
|
CVE-2022-43079 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-3.md
|
||
|
CVE-2022-43081 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-3.md
|
||
|
CVE-2022-43082 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-4.md
|
||
|
CVE-2022-43083 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-2.md
|
||
|
CVE-2022-43084 - https://github.com/Tr0e/CVE_Hunter/blob/main/XSS-5.md
|
||
|
CVE-2022-43085 - https://github.com/Tr0e/CVE_Hunter/blob/main/RCE-3.md
|
||
|
CVE-2022-43086 - https://github.com/Tr0e/CVE_Hunter/blob/main/SQLi-4.md
|
||
|
CVE-2022-4309 - https://wpscan.com/vulnerability/1965f53d-c94e-4322-9059-49de69df1051
|
||
|
CVE-2022-4310 - https://wpscan.com/vulnerability/b1aef75d-0c84-4702-83fc-11f0e98a0821
|
||
|
CVE-2022-43101 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetdevicenameset_device_namesprintfv4-s1-a1
|
||
|
CVE-2022-43102 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetsystimesub_496104strcpychar-v6-s
|
||
|
CVE-2022-43103 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetqosband
|
||
|
CVE-2022-43104 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwirelessrepeatsub_45cd64sub_45cad8sub_45bb10
|
||
|
CVE-2022-43105 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#fromsetwifigusetbasic
|
||
|
CVE-2022-43106 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setschedwifi-strcpychar-ptr--2-v8
|
||
|
CVE-2022-43107 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#setsmartpowermanagement
|
||
|
CVE-2022-43108 - https://github.com/ppcrab/IOT_FIRMWARE/blob/main/Tenda/ac23/ac23.md#formsetfirewallcfg
|
||
|
CVE-2022-43109 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-43117 - https://drive.google.com/file/d/1ZmAuKMVzUpL8pt5KXQJk8IyPECoVP9xw/view?usp=sharing
|
||
|
CVE-2022-43117 - https://github.com/RashidKhanPathan/CVE-2022-43117
|
||
|
CVE-2022-43119 - https://github.com/sinemsahn/POC/blob/main/Create%20Clansphere%202011.4%20%22username%22%20xss.md
|
||
|
CVE-2022-43138 - https://www.exploit-db.com/exploits/50248
|
||
|
CVE-2022-4314 - https://huntr.dev/bounties/b2dc504d-92ae-4221-a096-12ff223d95a8
|
||
|
CVE-2022-43140 - https://github.com/kekingcn/kkFileView/issues/392
|
||
|
CVE-2022-43143 - https://github.com/beekeeper-studio/beekeeper-studio/issues/1393
|
||
|
CVE-2022-43144 - https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS
|
||
|
CVE-2022-43146 - https://medium.com/@syedmudassiruddinalvi/cve-2022-43146-rce-via-arbitrary-file-upload-28dfa77c5de7
|
||
|
CVE-2022-43148 - https://github.com/lvu/rtf2html/issues/11
|
||
|
CVE-2022-43151 - https://github.com/hzeller/timg/issues/92
|
||
|
CVE-2022-43152 - https://github.com/justdan96/tsMuxer/issues/641
|
||
|
CVE-2022-43164 - https://github.com/anhdq201/rukovoditel/issues/4
|
||
|
CVE-2022-43165 - https://github.com/anhdq201/rukovoditel/issues/5
|
||
|
CVE-2022-43166 - https://github.com/anhdq201/rukovoditel/issues/2
|
||
|
CVE-2022-43167 - https://github.com/anhdq201/rukovoditel/issues/7
|
||
|
CVE-2022-43168 - https://github.com/anhdq201/rukovoditel/issues/1
|
||
|
CVE-2022-43169 - https://github.com/anhdq201/rukovoditel/issues/3
|
||
|
CVE-2022-43170 - https://github.com/anhdq201/rukovoditel/issues/6
|
||
|
CVE-2022-43171 - https://github.com/lief-project/LIEF/issues/782
|
||
|
CVE-2022-43183 - https://github.com/xuxueli/xxl-job/issues/3002
|
||
|
CVE-2022-43184 - https://github.com/HuangPayoung/CVE-request/tree/main/DLink/vuln2
|
||
|
CVE-2022-43184 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-43192 - https://github.com/linchuzhu/Dedecms-v5.7.101-RCE
|
||
|
CVE-2022-4320 - https://wpscan.com/vulnerability/f1244c57-d886-4a6e-8cdb-18404e8c153c
|
||
|
CVE-2022-4321 - https://wpscan.com/vulnerability/6ac1259c-86d9-428b-ba98-7f3d07910644
|
||
|
CVE-2022-43221 - https://github.com/ToughRunner/Open5gs_bugreport3
|
||
|
CVE-2022-43222 - https://github.com/ToughRunner/Open5gs_bugreport4
|
||
|
CVE-2022-43223 - https://github.com/ToughRunner/Open5gs_bugreport2
|
||
|
CVE-2022-43229 - http://packetstormsecurity.com/files/169605/Simple-Cold-Storage-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2022-4323 - https://wpscan.com/vulnerability/ce8027b8-9473-463e-ba80-49b3d6d16228
|
||
|
CVE-2022-43235 - https://github.com/strukturag/libde265/issues/337
|
||
|
CVE-2022-43236 - https://github.com/strukturag/libde265/issues/343
|
||
|
CVE-2022-43237 - https://github.com/strukturag/libde265/issues/344
|
||
|
CVE-2022-43238 - https://github.com/strukturag/libde265/issues/336
|
||
|
CVE-2022-43239 - https://github.com/strukturag/libde265/issues/341
|
||
|
CVE-2022-4324 - https://wpscan.com/vulnerability/70c39236-f7ae-49bf-a2f0-7cb9aa983e45
|
||
|
CVE-2022-43240 - https://github.com/strukturag/libde265/issues/335
|
||
|
CVE-2022-43241 - https://github.com/strukturag/libde265/issues/338
|
||
|
CVE-2022-43242 - https://github.com/strukturag/libde265/issues/340
|
||
|
CVE-2022-43243 - https://github.com/strukturag/libde265/issues/339
|
||
|
CVE-2022-43244 - https://github.com/strukturag/libde265/issues/342
|
||
|
CVE-2022-43245 - https://github.com/strukturag/libde265/issues/352
|
||
|
CVE-2022-43248 - https://github.com/strukturag/libde265/issues/349
|
||
|
CVE-2022-43249 - https://github.com/strukturag/libde265/issues/345
|
||
|
CVE-2022-4325 - https://wpscan.com/vulnerability/5b983c48-6b05-47cf-85cb-28bbeec17395
|
||
|
CVE-2022-43250 - https://github.com/strukturag/libde265/issues/346
|
||
|
CVE-2022-43252 - https://github.com/strukturag/libde265/issues/347
|
||
|
CVE-2022-43253 - https://github.com/strukturag/libde265/issues/348
|
||
|
CVE-2022-43254 - https://github.com/gpac/gpac/issues/2284
|
||
|
CVE-2022-43255 - https://github.com/gpac/gpac/issues/2285
|
||
|
CVE-2022-43256 - https://github.com/seacms-com/seacms/issues/23
|
||
|
CVE-2022-43263 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/
|
||
|
CVE-2022-43264 - https://www.pizzapower.me/2022/10/11/guitar-pro-directory-traversal-and-filename-xss/
|
||
|
CVE-2022-43265 - https://10degres.net/cves/cve-2022-43265/
|
||
|
CVE-2022-4328 - https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed
|
||
|
CVE-2022-43280 - https://github.com/WebAssembly/wabt/issues/1982
|
||
|
CVE-2022-43281 - https://github.com/WebAssembly/wabt/issues/1981
|
||
|
CVE-2022-43282 - https://github.com/WebAssembly/wabt/issues/1983
|
||
|
CVE-2022-43283 - https://github.com/WebAssembly/wabt/issues/1985
|
||
|
CVE-2022-43284 - https://github.com/nginx/njs/issues/470
|
||
|
CVE-2022-43284 - https://github.com/nginx/njs/issues/529
|
||
|
CVE-2022-43285 - https://github.com/nginx/njs/issues/533
|
||
|
CVE-2022-43286 - https://github.com/nginx/njs/issues/480
|
||
|
CVE-2022-43288 - https://github.com/Kubozz/rukovoditel-3.2.1/issues/2
|
||
|
CVE-2022-43289 - https://github.com/jsummers/deark/issues/52
|
||
|
CVE-2022-4329 - https://wpscan.com/vulnerability/d7f2c1c1-75b7-4aec-8574-f38d506d064a
|
||
|
CVE-2022-43293 - https://github.com/LucaBarile/CVE-2022-43293
|
||
|
CVE-2022-43293 - https://lucabarile.github.io/Blog/CVE-2022-43293/index.html
|
||
|
CVE-2022-4330 - https://wpscan.com/vulnerability/d3c39e17-1dc3-4275-97d8-543ca7226772
|
||
|
CVE-2022-43308 - https://github.com/vitorespf/Advisories/blob/master/Intelbras-switch.txt
|
||
|
CVE-2022-4331 - https://gitlab.com/gitlab-org/gitlab/-/issues/385050
|
||
|
CVE-2022-43317 - https://github.com/ImaizumiYui/bug_report/blob/main/vendors/oretnom23/Human%20Resource%20Management%20System/XSS-1.md
|
||
|
CVE-2022-43320 - https://github.com/liufee/feehicms/issues/4
|
||
|
CVE-2022-43321 - https://github.com/shopwind/yii-shopwind/issues/1
|
||
|
CVE-2022-43325 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325
|
||
|
CVE-2022-43326 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43326
|
||
|
CVE-2022-43333 - https://www.swascan.com/it/security-advisory-telenia-software-tvox/
|
||
|
CVE-2022-43340 - https://github.com/zyx0814/dzzoffice/issues/223
|
||
|
CVE-2022-43342 - https://discussions.eramba.org/t/question-stored-xss-vulnerability/2326
|
||
|
CVE-2022-4335 - https://gitlab.com/gitlab-org/gitlab/-/issues/353018
|
||
|
CVE-2022-43357 - https://github.com/sass/libsass/issues/3177
|
||
|
CVE-2022-43358 - https://github.com/sass/libsass/issues/3178
|
||
|
CVE-2022-43372 - https://github.com/emlog/emlog/issues/195
|
||
|
CVE-2022-43380 - https://www.ibm.com/support/pages/node/6847947
|
||
|
CVE-2022-4340 - https://wpscan.com/vulnerability/8a7bd9f6-2789-474b-a237-01c643fdfba7
|
||
|
CVE-2022-43403 - https://www.secpod.com/blog/oracle-releases-critical-security-updates-january-2023-patch-now/
|
||
|
CVE-2022-43441 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1645
|
||
|
CVE-2022-4346 - https://wpscan.com/vulnerability/cc05f760-983d-4dc1-afbb-6b4965aa8abe
|
||
|
CVE-2022-43467 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671
|
||
|
CVE-2022-4347 - https://vuldb.com/?id.215107
|
||
|
CVE-2022-43473 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1685
|
||
|
CVE-2022-43484 - http://terasolunaorg.github.io/vulnerability/cve-2022-43484.html
|
||
|
CVE-2022-43484 - https://osdn.net/projects/terasoluna/wiki/cve-2022-43484
|
||
|
CVE-2022-4349 - https://gitee.com/CTF-hacker/pwn/issues/I5WAAB
|
||
|
CVE-2022-4350 - https://vuldb.com/?id.215112
|
||
|
CVE-2022-4351 - https://wpscan.com/vulnerability/2138f736-8a50-4390-a239-fcd1d736670a
|
||
|
CVE-2022-4352 - https://wpscan.com/vulnerability/325874f4-2482-4ae5-b5cf-cb9ff0843067
|
||
|
CVE-2022-4355 - https://wpscan.com/vulnerability/221bf87b-69e2-4c53-971e-8516b798c759
|
||
|
CVE-2022-4356 - https://wpscan.com/vulnerability/27a8d7cb-e179-408e-af13-8722ab41947b
|
||
|
CVE-2022-4357 - https://wpscan.com/vulnerability/4d1c0886-11f7-494f-b175-691253f46626
|
||
|
CVE-2022-4358 - https://wpscan.com/vulnerability/0076a3b8-9a25-41c9-bb07-36ffe2c8c37d
|
||
|
CVE-2022-43588 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647
|
||
|
CVE-2022-43589 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1648
|
||
|
CVE-2022-4359 - https://wpscan.com/vulnerability/8472dd40-27e3-4084-907a-e251a2a0f339
|
||
|
CVE-2022-43590 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1649
|
||
|
CVE-2022-43591 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1650
|
||
|
CVE-2022-43592 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651
|
||
|
CVE-2022-43593 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1652
|
||
|
CVE-2022-43594 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653
|
||
|
CVE-2022-43595 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1653
|
||
|
CVE-2022-43596 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1654
|
||
|
CVE-2022-43597 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655
|
||
|
CVE-2022-43598 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1655
|
||
|
CVE-2022-43599 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
||
|
CVE-2022-4360 - https://wpscan.com/vulnerability/40c420aa-5da0-42f9-a94f-f68ef57fcdae
|
||
|
CVE-2022-43600 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
||
|
CVE-2022-43601 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
||
|
CVE-2022-43602 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1656
|
||
|
CVE-2022-43603 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1657
|
||
|
CVE-2022-43604 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1661
|
||
|
CVE-2022-43605 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1662
|
||
|
CVE-2022-43606 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1663
|
||
|
CVE-2022-43607 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664
|
||
|
CVE-2022-4362 - https://wpscan.com/vulnerability/2660225a-e4c8-40f2-8c98-775ef2301212
|
||
|
CVE-2022-4364 - https://github.com/siriuswhiter/VulnHub/blob/main/Flir/02-FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/FLIR-AX8%20palette.php%20%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E1.md
|
||
|
CVE-2022-4365 - https://hackerone.com/reports/1792626
|
||
|
CVE-2022-4366 - https://huntr.dev/bounties/f225d69a-d971-410d-a8f9-b0026143aed8
|
||
|
CVE-2022-43663 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1674
|
||
|
CVE-2022-43664 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673
|
||
|
CVE-2022-43665 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1682
|
||
|
CVE-2022-43675 - https://www.gruppotim.it/redteam
|
||
|
CVE-2022-4368 - https://wpscan.com/vulnerability/fa7e2b64-ca48-4b76-a2c2-f5e31e42eab7
|
||
|
CVE-2022-43684 - http://packetstormsecurity.com/files/173354/ServiceNow-Insecure-Access-Control-Full-Admin-Compromise.html
|
||
|
CVE-2022-4369 - https://wpscan.com/vulnerability/460a01e5-7ce5-4d49-b068-a93ea1fba0e3
|
||
|
CVE-2022-4370 - https://bulletin.iese.de/post/multimedial-images_1-0b
|
||
|
CVE-2022-4370 - https://wpscan.com/vulnerability/cf336783-9959-413d-a5d7-73c7087426d8
|
||
|
CVE-2022-43701 - https://developer.arm.com/documentation/ka005596/latest
|
||
|
CVE-2022-43702 - https://developer.arm.com/documentation/ka005596/latest
|
||
|
CVE-2022-43703 - https://developer.arm.com/documentation/ka005596/latest
|
||
|
CVE-2022-43704 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-43704-capture-replay-vulnerability-in-sinilink-xy-wft1-thermostat/
|
||
|
CVE-2022-4371 - https://bulletin.iese.de/post/web-invoice_2-1-3_1
|
||
|
CVE-2022-4371 - https://wpscan.com/vulnerability/45f43359-98c2-4447-b51b-2d466bad8261
|
||
|
CVE-2022-4372 - https://bulletin.iese.de/post/web-invoice_2-1-3_2
|
||
|
CVE-2022-4372 - https://wpscan.com/vulnerability/218f8015-e14b-46a8-889d-08b2b822f8ae
|
||
|
CVE-2022-4373 - https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02
|
||
|
CVE-2022-4374 - https://wpscan.com/vulnerability/bbaa808d-47b1-4c70-b157-f8297f627a07
|
||
|
CVE-2022-4375 - https://gitee.com/mingSoft/MCMS/issues/I61TG5
|
||
|
CVE-2022-43750 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15
|
||
|
CVE-2022-43753 - https://bugzilla.suse.com/show_bug.cgi?id=1204716
|
||
|
CVE-2022-43769 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html
|
||
|
CVE-2022-43774 - https://www.tenable.com/security/research/tra-2022-33
|
||
|
CVE-2022-43775 - https://www.tenable.com/security/research/tra-2022-33
|
||
|
CVE-2022-43776 - https://www.tenable.com/security/research/tra-2022-34
|
||
|
CVE-2022-4378 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
|
||
|
CVE-2022-4378 - https://seclists.org/oss-sec/2022/q4/178
|
||
|
CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0
|
||
|
CVE-2022-4379 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da
|
||
|
CVE-2022-4381 - https://wpscan.com/vulnerability/8bf8ebe8-1063-492d-a0f9-2f824408d0df
|
||
|
CVE-2022-4383 - https://wpscan.com/vulnerability/e0fe5a53-8ae2-4b67-ac6e-4a8860e39035
|
||
|
CVE-2022-4384 - https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5
|
||
|
CVE-2022-43848 - https://www.ibm.com/support/pages/node/6847947
|
||
|
CVE-2022-43849 - https://www.ibm.com/support/pages/node/6847947
|
||
|
CVE-2022-4385 - https://wpscan.com/vulnerability/8f900d37-6eee-4434-8b9b-d10cc4a9167c
|
||
|
CVE-2022-4386 - https://wpscan.com/vulnerability/734064e3-afe9-4dfd-8d76-8a757cc94815
|
||
|
CVE-2022-4391 - https://wpscan.com/vulnerability/c0c37787-3c4c-42d5-bb75-5d4ed3e7aa2b
|
||
|
CVE-2022-4392 - https://wpscan.com/vulnerability/c298e3dc-09a7-40bb-a361-f49af4bce77e
|
||
|
CVE-2022-4393 - https://wpscan.com/vulnerability/0bd4f370-f9f8-43ee-8f20-96e899a1efb5
|
||
|
CVE-2022-43939 - http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html
|
||
|
CVE-2022-4394 - https://wpscan.com/vulnerability/8edbdea1-f9bb-407a-bcd1-fff3e146984c
|
||
|
CVE-2022-43945 - http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
|
||
|
CVE-2022-43945 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
|
||
|
CVE-2022-4395 - https://wpscan.com/vulnerability/80407ac4-8ce3-4df7-9c41-007b69045c40
|
||
|
CVE-2022-43970 - https://youtu.be/73-1lhvJPNg
|
||
|
CVE-2022-43970 - https://youtu.be/RfWVYCUBNZ0
|
||
|
CVE-2022-43970 - https://youtu.be/TeWAmZaKQ_w
|
||
|
CVE-2022-43971 - https://youtu.be/73-1lhvJPNg
|
||
|
CVE-2022-43971 - https://youtu.be/RfWVYCUBNZ0
|
||
|
CVE-2022-43971 - https://youtu.be/TeWAmZaKQ_w
|
||
|
CVE-2022-43972 - https://youtu.be/73-1lhvJPNg
|
||
|
CVE-2022-43972 - https://youtu.be/RfWVYCUBNZ0
|
||
|
CVE-2022-43972 - https://youtu.be/TeWAmZaKQ_w
|
||
|
CVE-2022-43973 - https://youtu.be/73-1lhvJPNg
|
||
|
CVE-2022-43973 - https://youtu.be/RfWVYCUBNZ0
|
||
|
CVE-2022-43973 - https://youtu.be/TeWAmZaKQ_w
|
||
|
CVE-2022-43974 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842
|
||
|
CVE-2022-4398 - https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2
|
||
|
CVE-2022-43996 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0003.json
|
||
|
CVE-2022-43997 - https://winternl.com/cve-2022-43997/
|
||
|
CVE-2022-43999 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-034.txt
|
||
|
CVE-2022-43999 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44000 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-032.txt
|
||
|
CVE-2022-44000 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44001 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-035.txt
|
||
|
CVE-2022-44001 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44002 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44003 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-029.txt
|
||
|
CVE-2022-44003 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44004 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-030.txt
|
||
|
CVE-2022-44004 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44005 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-026.txt
|
||
|
CVE-2022-44005 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44006 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-031.txt
|
||
|
CVE-2022-44006 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44007 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-036.txt
|
||
|
CVE-2022-44007 - https://www.syss.de/pentest-blog/vielfaeltige-schwachstellen-in-backclick-professional-syss-2022-026-bis-037
|
||
|
CVE-2022-44008 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-037.txt
|
||
|
CVE-2022-44012 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
||
|
CVE-2022-44013 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
||
|
CVE-2022-44014 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
||
|
CVE-2022-44015 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
||
|
CVE-2022-44016 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
||
|
CVE-2022-44017 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-simmeth-system-gmbh-lieferantenmanager/
|
||
|
CVE-2022-44019 - https://www.edoardoottavianelli.it/CVE-2022-44019/
|
||
|
CVE-2022-44019 - https://www.youtube.com/watch?v=x-u3eS8-xJg
|
||
|
CVE-2022-4403 - https://vuldb.com/?id.215272
|
||
|
CVE-2022-44037 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44037
|
||
|
CVE-2022-44038 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44038
|
||
|
CVE-2022-4407 - https://huntr.dev/bounties/a1649f43-78c9-4927-b313-36911872a84b
|
||
|
CVE-2022-44079 - https://github.com/zrax/pycdc/issues/291
|
||
|
CVE-2022-4408 - https://huntr.dev/bounties/2ec4ddd4-de22-4f2d-ba92-3382b452bfea
|
||
|
CVE-2022-44081 - https://github.com/lvandeve/lodepng/issues/177
|
||
|
CVE-2022-4409 - https://huntr.dev/bounties/5915ed4c-5fe2-42e7-8fac-5dd0d032727c
|
||
|
CVE-2022-44096 - https://github.com/upasvi/CVE-/issues/1
|
||
|
CVE-2022-44097 - https://github.com/upasvi/CVE-/issues/2
|
||
|
CVE-2022-44108 - https://github.com/ldenoue/pdftojson/issues/3
|
||
|
CVE-2022-44109 - https://github.com/ldenoue/pdftojson/issues/4
|
||
|
CVE-2022-44118 - https://gist.github.com/yinfei6/56bb396f579cb67840ed1ecb77460a5b
|
||
|
CVE-2022-4413 - https://huntr.dev/bounties/70ac720d-c932-4ed3-98b1-dd2cbcb90185
|
||
|
CVE-2022-4414 - https://huntr.dev/bounties/131a41e5-c936-4c3f-84fc-e0e1f0e090b5
|
||
|
CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html
|
||
|
CVE-2022-44149 - http://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-80.103.2.5045-Remote-Code-Execution.html
|
||
|
CVE-2022-44149 - https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html
|
||
|
CVE-2022-4415 - https://www.openwall.com/lists/oss-security/2022/12/21/3
|
||
|
CVE-2022-44156 - https://drive.google.com/file/d/1dbMwByl40uqMiSv_DOEW8pFjRhGX-j97/view?usp=sharing
|
||
|
CVE-2022-44158 - https://drive.google.com/file/d/11PSsUpLmLCl0-eO565TLbVavzfP5aWdG/view?usp=sharing
|
||
|
CVE-2022-44167 - https://drive.google.com/file/d/1Jq8Tm_2FDS4WDD_afdhg1LnA3VcvZdjS/view?usp=sharing
|
||
|
CVE-2022-4417 - https://wpscan.com/vulnerability/a8c6b077-ff93-4c7b-970f-3be4d7971aa5
|
||
|
CVE-2022-44201 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44202 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44204 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3060/5.md
|
||
|
CVE-2022-44204 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44215 - https://github.com/JBalanza/CVE-2022-44215
|
||
|
CVE-2022-44235 - https://github.com/liong007/Zed-3/issues/1
|
||
|
CVE-2022-4426 - https://wpscan.com/vulnerability/7d3d6b9c-d1c1-4e23-b891-7c72e4e89c38
|
||
|
CVE-2022-44262 - https://github.com/ff4j/ff4j/issues/624
|
||
|
CVE-2022-44267 - https://www.metabaseq.com/imagemagick-zero-days/
|
||
|
CVE-2022-44268 - http://packetstormsecurity.com/files/171727/ImageMagick-7.1.0-48-Arbitrary-File-Read.html
|
||
|
CVE-2022-44268 - https://www.metabaseq.com/imagemagick-zero-days/
|
||
|
CVE-2022-44276 - https://github.com/HerrLeStrate/CVE-2022-44276-PoC
|
||
|
CVE-2022-44279 - https://github.com/Onetpaer/bug_report/blob/main/vendors/mayuri_k/garage-management-system/xss1.md
|
||
|
CVE-2022-44283 - https://packetstormsecurity.com/files/169427/AVS-Audio-Converter-10.3-Stack-Overflow.html
|
||
|
CVE-2022-44284 - https://packetstormsecurity.com/files/169531/Dinstar-FXO-Analog-VoIP-Gateway-DAG2000-16O-Cross-Site-Scripting.html
|
||
|
CVE-2022-4429 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2022-44290 - https://github.com/anhdq201/webtareas/issues/2
|
||
|
CVE-2022-44291 - https://github.com/anhdq201/webtareas/issues/1
|
||
|
CVE-2022-44298 - https://github.com/siteserver/cms/issues/3492
|
||
|
CVE-2022-4431 - https://wpscan.com/vulnerability/860b882b-983c-44b5-8c09-b6890df8a0da
|
||
|
CVE-2022-4431 - https://wpscan.com/vulnerability/c7d12fd4-7346-4727-9f6c-7e7e5524a932
|
||
|
CVE-2022-44354 - https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md
|
||
|
CVE-2022-44355 - https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md
|
||
|
CVE-2022-44356 - https://github.com/strik3r0x1/Vulns/blob/main/Wavlink%20WL-WN531G3.md
|
||
|
CVE-2022-44362 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formAddSysLogRule/readme.md
|
||
|
CVE-2022-44363 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSnmpInfo/readme.md
|
||
|
CVE-2022-44365 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetSysPwd/readme.md
|
||
|
CVE-2022-44366 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetDiagnoseInfo/readme.md
|
||
|
CVE-2022-44367 - https://github.com/Double-q1015/CVE-vulns/blob/main/Tenda/i21/formSetUplinkInfo/readme.md
|
||
|
CVE-2022-44373 - https://github.com/johnawm/vulner-box/blob/master/TRENDNet/TEW-820AP/02/README.md
|
||
|
CVE-2022-44380 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/
|
||
|
CVE-2022-44381 - https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/
|
||
|
CVE-2022-44384 - https://www.exploit-db.com/exploits/49783
|
||
|
CVE-2022-4442 - https://wpscan.com/vulnerability/12766537-df59-49d6-815a-4d68265a4c4a
|
||
|
CVE-2022-4443 - https://wpscan.com/vulnerability/1e621d62-13c7-4b2f-96ca-3617a796d037
|
||
|
CVE-2022-4445 - https://wpscan.com/vulnerability/9bb6fde0-1347-496b-be03-3512e6b7e8f8
|
||
|
CVE-2022-44451 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669
|
||
|
CVE-2022-4446 - https://huntr.dev/bounties/718f1be6-3834-4ef2-8134-907a52009894
|
||
|
CVE-2022-4447 - https://wpscan.com/vulnerability/6939c405-ac62-4144-bd86-944d7b89d0ad
|
||
|
CVE-2022-4448 - https://wpscan.com/vulnerability/ce467a2e-081e-4a6c-bfa4-29e4447ebd3b
|
||
|
CVE-2022-4449 - https://wpscan.com/vulnerability/a4895f8d-5a4c-49cb-b144-b761ed82923d
|
||
|
CVE-2022-4451 - https://wpscan.com/vulnerability/a28f52a4-fd57-4f46-8983-f34c71ec88d5
|
||
|
CVE-2022-4453 - https://wpscan.com/vulnerability/120bdcb3-4288-4101-b738-cc84d02da171
|
||
|
CVE-2022-4458 - https://wpscan.com/vulnerability/c85ceab3-7e79-402d-ad48-a028f1ee070c
|
||
|
CVE-2022-4459 - https://wpscan.com/vulnerability/3ef4783b-4e4a-4691-b858-a7fa8dada4ec
|
||
|
CVE-2022-4460 - https://wpscan.com/vulnerability/034c4c75-42a4-4884-b63f-f9d4d2d6aebc
|
||
|
CVE-2022-44638 - http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html
|
||
|
CVE-2022-44638 - https://gitlab.freedesktop.org/pixman/pixman/-/issues/63
|
||
|
CVE-2022-4464 - https://wpscan.com/vulnerability/1d3636c1-976f-4c84-8cca-413e38170d0c
|
||
|
CVE-2022-4465 - https://wpscan.com/vulnerability/28abe589-1371-4ed2-90b6-2bb96c93832c
|
||
|
CVE-2022-4466 - https://wpscan.com/vulnerability/497d0bf9-b750-4293-9662-1722a74442e2
|
||
|
CVE-2022-44666 - http://packetstormsecurity.com/files/171047/Microsoft-Windows-Contact-File-Remote-Code-Execution.html
|
||
|
CVE-2022-44666 - http://seclists.org/fulldisclosure/2023/Feb/14
|
||
|
CVE-2022-4467 - https://wpscan.com/vulnerability/54168861-c0b8-4de6-a9af-0ad5c20b4a45
|
||
|
CVE-2022-4468 - https://wpscan.com/vulnerability/a3bf24af-417e-4ca2-886c-bb36bb2d952b
|
||
|
CVE-2022-44683 - http://packetstormsecurity.com/files/170466/Windows-Kernel-NtNotifyChangeMultipleKeys-Use-After-Free.html
|
||
|
CVE-2022-4469 - https://wpscan.com/vulnerability/b195c373-1db9-4fd7-98d0-0860dacd189e
|
||
|
CVE-2022-4470 - https://wpscan.com/vulnerability/7c4e51b3-87ef-4afc-ab53-9a9bbdcfc9d7
|
||
|
CVE-2022-4471 - https://wpscan.com/vulnerability/c6cf792b-054c-4d77-bcae-3b700f42130b
|
||
|
CVE-2022-4472 - https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a
|
||
|
CVE-2022-44724 - https://stiltsoft.atlassian.net/browse/VD-3
|
||
|
CVE-2022-44724 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-049.txt
|
||
|
CVE-2022-44725 - https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/
|
||
|
CVE-2022-44726 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-050.txt
|
||
|
CVE-2022-44727 - https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf
|
||
|
CVE-2022-4473 - https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3
|
||
|
CVE-2022-4474 - https://wpscan.com/vulnerability/3acc6940-13ec-40fb-8471-6b2f0445c543
|
||
|
CVE-2022-4475 - https://wpscan.com/vulnerability/3b5c377c-3148-4373-996c-89851d5e39e5
|
||
|
CVE-2022-4476 - https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45
|
||
|
CVE-2022-4477 - https://wpscan.com/vulnerability/c32a4c58-9f2b-4afa-9a21-4b4a5c4c4c41
|
||
|
CVE-2022-4478 - https://wpscan.com/vulnerability/4de75de5-e557-46df-9675-e3f0220f4003
|
||
|
CVE-2022-4479 - https://wpscan.com/vulnerability/10f63d30-1b36-459b-80eb-509caaf5d377
|
||
|
CVE-2022-44792 - https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428
|
||
|
CVE-2022-44792 - https://github.com/net-snmp/net-snmp/issues/474
|
||
|
CVE-2022-44793 - https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f
|
||
|
CVE-2022-44793 - https://github.com/net-snmp/net-snmp/issues/475
|
||
|
CVE-2022-4480 - https://wpscan.com/vulnerability/1666f91d-3aa2-487d-a31b-44d051ab0124
|
||
|
CVE-2022-44801 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44804 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44806 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44807 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-44808 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1
|
||
|
CVE-2022-44808 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4481 - https://wpscan.com/vulnerability/9dc9d377-635d-4d4f-9916-33bcedbba6f0
|
||
|
CVE-2022-4482 - https://wpscan.com/vulnerability/389b71d6-b0e6-4e36-b9ca-9d8dab75bb0a
|
||
|
CVE-2022-4483 - https://wpscan.com/vulnerability/a1786400-dc62-489c-b986-ba17c9833179
|
||
|
CVE-2022-44830 - https://github.com/RashidKhanPathan/CVE-2022-44830
|
||
|
CVE-2022-44832 - https://github.com/flamingo1616/iot_vuln/blob/main/D-Link/DIR-3040/6.md
|
||
|
CVE-2022-44832 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4484 - https://wpscan.com/vulnerability/91252899-029d-49be-859e-7d2c4a70efea
|
||
|
CVE-2022-44843 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/1
|
||
|
CVE-2022-44844 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/2
|
||
|
CVE-2022-4485 - https://wpscan.com/vulnerability/685b068e-0727-45fb-bd8c-66bb1dc3a8e7
|
||
|
CVE-2022-4486 - https://wpscan.com/vulnerability/d0afd17c-09cd-4ab5-95a5-6ac8c3c0a50b
|
||
|
CVE-2022-4487 - https://wpscan.com/vulnerability/6130958f-f549-4885-adb1-093aa025920e
|
||
|
CVE-2022-44870 - https://github.com/Cedric1314/CVE-2022-44870/blob/main/README.md
|
||
|
CVE-2022-44877 - http://packetstormsecurity.com/files/170388/Control-Web-Panel-7-Remote-Code-Execution.html
|
||
|
CVE-2022-44877 - http://packetstormsecurity.com/files/170820/Control-Web-Panel-Unauthenticated-Remote-Command-Execution.html
|
||
|
CVE-2022-44877 - http://packetstormsecurity.com/files/171725/Control-Web-Panel-7-CWP7-0.9.8.1147-Remote-Code-Execution.html
|
||
|
CVE-2022-44877 - http://seclists.org/fulldisclosure/2023/Jan/1
|
||
|
CVE-2022-44877 - https://gist.github.com/numanturle/c1e82c47f4cba24cff214e904c227386
|
||
|
CVE-2022-44877 - https://www.youtube.com/watch?v=kiLfSvc1SYY
|
||
|
CVE-2022-4488 - https://wpscan.com/vulnerability/e52c18a9-550a-40b1-a413-0e06e5b4aabc
|
||
|
CVE-2022-4489 - https://wpscan.com/vulnerability/067573f2-b1e6-49a9-8c5b-f91e3b9d722f
|
||
|
CVE-2022-44897 - https://github.com/daaaalllii/cve-s/blob/main/CVE-2022-44897/poc.txt
|
||
|
CVE-2022-44898 - http://packetstormsecurity.com/files/174447/MsIo64-LOLDriver-Memory-Corruption.html
|
||
|
CVE-2022-44898 - https://heegong.github.io/posts/ASUS-AuraSync-Kernel-Stack-Based-Buffer-Overflow-Local-Privilege-Escalation/
|
||
|
CVE-2022-44900 - http://packetstormsecurity.com/files/170127/py7zr-0.20.0-Directory-Traversal.html
|
||
|
CVE-2022-4491 - https://wpscan.com/vulnerability/b62d8fa6-d546-4794-8f7a-c5e4a7f607dc
|
||
|
CVE-2022-44910 - https://github.com/yangfar/CVE/blob/main/Reference%20of%20Binbloom.md
|
||
|
CVE-2022-44928 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44928
|
||
|
CVE-2022-44929 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44929
|
||
|
CVE-2022-44930 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-44930
|
||
|
CVE-2022-44931 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md
|
||
|
CVE-2022-44932 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/TendaTelnet/readme.md
|
||
|
CVE-2022-44937 - https://github.com/5497lvren/Zhenhao/issues/1
|
||
|
CVE-2022-44938 - https://pwnit.io/2022/11/23/weak-password-reset-token-leads-to-account-takeover-in-seeddms/
|
||
|
CVE-2022-44939 - https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt
|
||
|
CVE-2022-44942 - https://github.com/casdoor/casdoor/issues/1171
|
||
|
CVE-2022-44944 - https://github.com/anhdq201/rukovoditel/issues/14
|
||
|
CVE-2022-44945 - https://github.com/anhdq201/rukovoditel/issues/16
|
||
|
CVE-2022-44946 - https://github.com/anhdq201/rukovoditel/issues/15
|
||
|
CVE-2022-44947 - https://github.com/anhdq201/rukovoditel/issues/13
|
||
|
CVE-2022-44948 - https://github.com/anhdq201/rukovoditel/issues/8
|
||
|
CVE-2022-44949 - https://github.com/anhdq201/rukovoditel/issues/12
|
||
|
CVE-2022-44950 - https://github.com/anhdq201/rukovoditel/issues/10
|
||
|
CVE-2022-44951 - https://github.com/anhdq201/rukovoditel/issues/11
|
||
|
CVE-2022-44952 - https://github.com/anhdq201/rukovoditel/issues/9
|
||
|
CVE-2022-44953 - https://github.com/anhdq201/webtareas/issues/8
|
||
|
CVE-2022-44954 - https://github.com/anhdq201/webtareas/issues/10
|
||
|
CVE-2022-44955 - https://github.com/anhdq201/webtareas/issues/5
|
||
|
CVE-2022-44956 - https://github.com/anhdq201/webtareas/issues/3
|
||
|
CVE-2022-44957 - https://github.com/anhdq201/webtareas/issues/11
|
||
|
CVE-2022-44959 - https://github.com/anhdq201/webtareas/issues/6
|
||
|
CVE-2022-44960 - https://github.com/anhdq201/webtareas/issues/4
|
||
|
CVE-2022-44961 - https://github.com/anhdq201/webtareas/issues/7
|
||
|
CVE-2022-44962 - https://github.com/anhdq201/webtareas/issues/12
|
||
|
CVE-2022-4497 - https://wpscan.com/vulnerability/3fa6c8b3-6b81-4fe3-b997-25c9e5fdec86
|
||
|
CVE-2022-4502 - https://huntr.dev/bounties/5bdef791-6886-4008-b9ba-045cb4524114
|
||
|
CVE-2022-45025 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/639
|
||
|
CVE-2022-45026 - https://github.com/shd101wyy/vscode-markdown-preview-enhanced/issues/640
|
||
|
CVE-2022-45027 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/
|
||
|
CVE-2022-45028 - https://seanpesce.blogspot.com/2022/11/unauthenticated-stored-xss-in-arris.html
|
||
|
CVE-2022-4503 - https://huntr.dev/bounties/4cba644c-a2f5-4ed7-af5d-f2cab1895e13
|
||
|
CVE-2022-45030 - http://packetstormsecurity.com/files/171613/rconfig-3.9.7-SQL-Injection.html
|
||
|
CVE-2022-45030 - https://www.rconfig.com/downloads/rconfig-3.9.7.zip
|
||
|
CVE-2022-45033 - https://github.com/cyb3r-n3rd/cve-request/blob/main/cve-poc-payload
|
||
|
CVE-2022-4504 - https://huntr.dev/bounties/f50538cb-99d3-411d-bd1a-5f36d1fa9f5d
|
||
|
CVE-2022-45043 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/2
|
||
|
CVE-2022-45045 - https://vulncheck.com/blog/xiongmai-iot-exploitation
|
||
|
CVE-2022-4505 - https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92
|
||
|
CVE-2022-4506 - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942
|
||
|
CVE-2022-45062 - https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390
|
||
|
CVE-2022-4507 - https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6
|
||
|
CVE-2022-4508 - https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab
|
||
|
CVE-2022-4509 - https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910
|
||
|
CVE-2022-4510 - https://github.com/ReFirmLabs/binwalk/pull/617
|
||
|
CVE-2022-45115 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1684
|
||
|
CVE-2022-4512 - https://wpscan.com/vulnerability/7957f355-c767-4f59-bb28-0302d33386a6
|
||
|
CVE-2022-45124 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1683
|
||
|
CVE-2022-45129 - http://packetstormsecurity.com/files/169864/Payara-Platform-Path-Traversal.html
|
||
|
CVE-2022-45129 - http://seclists.org/fulldisclosure/2022/Nov/11
|
||
|
CVE-2022-45130 - https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/
|
||
|
CVE-2022-45132 - https://podalirius.net/en/articles/python-vulnerabilities-code-execution-in-jinja-templates/
|
||
|
CVE-2022-45144 - https://herolab.usd.de/security-advisories/usd-2022-0048/
|
||
|
CVE-2022-45163 - https://research.nccgroup.com/2022/11/17/cve-2022-45163/
|
||
|
CVE-2022-45163 - https://research.nccgroup.com/category/technical-advisory/
|
||
|
CVE-2022-45169 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45170 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45172 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45173 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45174 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45175 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45177 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45178 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45179 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45180 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-45202 - https://github.com/gpac/gpac/issues/2296
|
||
|
CVE-2022-45204 - https://github.com/gpac/gpac/issues/2307
|
||
|
CVE-2022-45205 - https://github.com/jeecgboot/jeecg-boot/issues/4128
|
||
|
CVE-2022-45207 - https://github.com/jeecgboot/jeecg-boot/issues/4127
|
||
|
CVE-2022-45208 - https://github.com/jeecgboot/jeecg-boot/issues/4126
|
||
|
CVE-2022-45210 - https://github.com/jeecgboot/jeecg-boot/issues/4125
|
||
|
CVE-2022-45213 - https://zxsecurity.co.nz/research/advisories/perfsonar-multiple/
|
||
|
CVE-2022-45218 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/hrm.zip
|
||
|
CVE-2022-45221 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124
|
||
|
CVE-2022-45223 - https://medium.com/@just0rg/web-based-student-clearance-system-in-php-free-source-code-v1-0-unrestricted-input-leads-to-xss-5802ead12124
|
||
|
CVE-2022-45224 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e
|
||
|
CVE-2022-45225 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e
|
||
|
CVE-2022-45283 - https://github.com/gpac/gpac/issues/2295
|
||
|
CVE-2022-45290 - https://github.com/HH1F/KbaseDoc-v1.0-Arbitrary-file-deletion-vulnerability/blob/main/README.md
|
||
|
CVE-2022-45297 - http://packetstormsecurity.com/files/171615/EQ-Enterprise-Management-System-2.2.0-SQL-Injection.html
|
||
|
CVE-2022-45297 - https://github.com/tlfyyds/EQ
|
||
|
CVE-2022-45299 - https://github.com/offalltn/CVE-2022-45299
|
||
|
CVE-2022-45313 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45313/README.md
|
||
|
CVE-2022-45315 - https://github.com/cq674350529/pocs_slides/blob/master/advisory/MikroTik/CVE-2022-45315/README.md
|
||
|
CVE-2022-45326 - https://www.navsec.net/2022/11/12/kwoksys-xxe.html
|
||
|
CVE-2022-45329 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/search_sql_injection/search_sql_injection.md
|
||
|
CVE-2022-45330 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/category_sql_injection/category_sql_injection.md
|
||
|
CVE-2022-45331 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_sql_injection/post_sql_injection.md
|
||
|
CVE-2022-45332 - https://github.com/LibreDWG/libredwg/issues/524
|
||
|
CVE-2022-45337 - https://github.com/no1rr/Vulnerability/tree/master/Tenda/TX9Pro/1
|
||
|
CVE-2022-45343 - https://github.com/gpac/gpac/issues/2315
|
||
|
CVE-2022-45411 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790311
|
||
|
CVE-2022-45413 - https://bugzilla.mozilla.org/show_bug.cgi?id=1791201
|
||
|
CVE-2022-45415 - https://bugzilla.mozilla.org/show_bug.cgi?id=1793551
|
||
|
CVE-2022-45418 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795815
|
||
|
CVE-2022-4542 - https://wpscan.com/vulnerability/f0bef96f-dfe2-4988-adf8-e1bd493c5242
|
||
|
CVE-2022-4543 - https://www.willsroot.io/2022/12/entrybleed.html
|
||
|
CVE-2022-4544 - https://wpscan.com/vulnerability/96e34d3d-627f-42f2-bfdb-c9d47dbf396c
|
||
|
CVE-2022-4545 - https://wpscan.com/vulnerability/19f482cb-fcfd-43e6-9a04-143e06351a70
|
||
|
CVE-2022-4546 - https://wpscan.com/vulnerability/009578b9-016d-49c2-9577-49756c35e1e8
|
||
|
CVE-2022-45460 - https://github.com/tothi/pwn-hisilicon-dvr/blob/master/pwn_hisilicon_dvr.py
|
||
|
CVE-2022-4547 - https://wpscan.com/vulnerability/fe1514b4-74e1-4c19-8741-c0d4db9bab99
|
||
|
CVE-2022-45477 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-45478 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-45479 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-4548 - https://wpscan.com/vulnerability/0ff435bc-ea20-4993-98ae-1f61b1732b59
|
||
|
CVE-2022-45480 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-45481 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-45482 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-45483 - https://www.synopsys.com/blogs/software-security/cyrc-advisory-remote-code-execution-vulnerabilities-mouse-keyboard-apps/
|
||
|
CVE-2022-4549 - https://wpscan.com/vulnerability/06e1be38-fc1a-4799-a006-556b678ae701
|
||
|
CVE-2022-45497 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/exeCommand/readme.md
|
||
|
CVE-2022-45498 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolReboot/readme.md
|
||
|
CVE-2022-45499 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/WifiMacFilterGet/readme.md
|
||
|
CVE-2022-4550 - https://wpscan.com/vulnerability/a1179959-2044-479f-a5ca-3c9ffc46d00e
|
||
|
CVE-2022-45501 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/wifiSSIDset/readme.md
|
||
|
CVE-2022-45503 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/setAutoPing/readme.md
|
||
|
CVE-2022-45504 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W6-S/SysToolRestoreSet/readme.md
|
||
|
CVE-2022-45505 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/exeCommand/readme.md
|
||
|
CVE-2022-45506 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/delFileName/readme.md
|
||
|
CVE-2022-45507 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editFileName/readme.md
|
||
|
CVE-2022-45508 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/editUserName/readme.md
|
||
|
CVE-2022-45509 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addUserName/readme.md
|
||
|
CVE-2022-4551 - https://wpscan.com/vulnerability/91c00b17-00ba-4c3f-8587-d54449a02659
|
||
|
CVE-2022-45510 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/AdvSetWrlsafeset/readme.md
|
||
|
CVE-2022-45511 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/QuickIndex/readme.md
|
||
|
CVE-2022-45512 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeEmailFilter/readme.md
|
||
|
CVE-2022-45513 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/P2pListFilter/readme.md
|
||
|
CVE-2022-45514 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/webExcptypemanFilter/readme.md
|
||
|
CVE-2022-45515 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/addressNat/readme.md
|
||
|
CVE-2022-45516 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/NatStaticSetting/readme.md
|
||
|
CVE-2022-45517 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/VirtualSer/readme.md
|
||
|
CVE-2022-45518 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SetIpBind/readme.md
|
||
|
CVE-2022-45519 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeMacFilter/readme.md
|
||
|
CVE-2022-4552 - https://wpscan.com/vulnerability/307b0fe4-39de-4fbb-8bb0-f7f15ec6ef52
|
||
|
CVE-2022-45520 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/qossetting/readme.md
|
||
|
CVE-2022-45521 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeUrlFilter/readme.md
|
||
|
CVE-2022-45522 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/SafeClientFilter/readme.md
|
||
|
CVE-2022-45523 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/L7Im/readme.md
|
||
|
CVE-2022-45524 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/IPSECsave/readme.md
|
||
|
CVE-2022-45525 - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/W30E/CertListInfo/readme.md
|
||
|
CVE-2022-45526 - https://github.com/Future-Depth/IMS/issues/1
|
||
|
CVE-2022-45527 - https://github.com/Future-Depth/IMS/issues/2
|
||
|
CVE-2022-45529 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/edit_post_post_category_id_sql_injection/edit_post_post_category_id_sql_injection.md
|
||
|
CVE-2022-4553 - https://wpscan.com/vulnerability/483ed482-a1d1-44f6-8b99-56e653d3e45f
|
||
|
CVE-2022-45535 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/update_categories_sql_injection/update_categories_sql_injection.md
|
||
|
CVE-2022-45535 - https://rdyx0.github.io/2018/09/06/AeroCMS-v0.0.1-SQLi%20update_categories_sql_injection/
|
||
|
CVE-2022-45536 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/post_comments_sql_injection/post_comments_sql_injection.md
|
||
|
CVE-2022-45536 - https://rdyx0.github.io/2018/09/07/AeroCMS-v0.0.1-SQLi%20post_comments_sql_injection/
|
||
|
CVE-2022-45537 - https://github.com/weng-xianhu/eyoucms/issues/34
|
||
|
CVE-2022-45538 - https://github.com/weng-xianhu/eyoucms/issues/35
|
||
|
CVE-2022-45539 - https://github.com/weng-xianhu/eyoucms/issues/38
|
||
|
CVE-2022-45540 - https://github.com/weng-xianhu/eyoucms/issues/37
|
||
|
CVE-2022-45541 - https://github.com/weng-xianhu/eyoucms/issues/36
|
||
|
CVE-2022-45542 - https://github.com/weng-xianhu/eyoucms/issues/33
|
||
|
CVE-2022-45543 - https://srpopty.github.io/2023/02/15/Vulnerability-Discuz-X3.4-Reflected-XSS-(CVE-2022-45543)/
|
||
|
CVE-2022-45544 - https://blog.tristaomarinho.com/schlix-cms-2-2-7-2-arbitrary-file-upload/
|
||
|
CVE-2022-45544 - https://github.com/tristao-marinho/CVE-2022-45544/blob/main/README.md
|
||
|
CVE-2022-45546 - https://lgnas.gitbook.io/cve-2022-45546/
|
||
|
CVE-2022-45557 - https://github.com/hundredrabbits/Left/issues/167
|
||
|
CVE-2022-45558 - https://github.com/hundredrabbits/Left/issues/168
|
||
|
CVE-2022-45562 - https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-45562
|
||
|
CVE-2022-45586 - https://forum.xpdfreader.com/viewtopic.php?t=42361
|
||
|
CVE-2022-45587 - https://forum.xpdfreader.com/viewtopic.php?t=42361
|
||
|
CVE-2022-45598 - https://github.com/laurent22/joplin/commit/a2de167b95debad83a0f0c7925a88c0198db812e
|
||
|
CVE-2022-45598 - https://github.com/laurent22/joplin/releases/tag/v2.9.17
|
||
|
CVE-2022-45599 - https://github.com/ethancunt/CVE-2022-45599
|
||
|
CVE-2022-45600 - https://github.com/ethancunt/CVE-2022-45600
|
||
|
CVE-2022-45613 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/stored-xss
|
||
|
CVE-2022-45613 - https://medium.com/@just0rg/book-store-management-system-1-0-unrestricted-input-leads-to-xss-74506d42492e
|
||
|
CVE-2022-45614 - https://github.com/lithonn/bug-report/tree/main/vendors/oretnom23/bsms_ci/passwd-hash
|
||
|
CVE-2022-4562 - https://wpscan.com/vulnerability/2013d79b-e9f6-4a5a-b421-e840a3bae063
|
||
|
CVE-2022-45634 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45634
|
||
|
CVE-2022-45635 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45635
|
||
|
CVE-2022-45636 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636
|
||
|
CVE-2022-45636 - https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co
|
||
|
CVE-2022-45637 - https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45637
|
||
|
CVE-2022-45639 - http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html
|
||
|
CVE-2022-45639 - http://www.binaryworld.it/
|
||
|
CVE-2022-45639 - https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639
|
||
|
CVE-2022-45640 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6v1.0_vuln/Tenda%20AC6V1.0%20V15.03.05.19%20Stack%20overflow%20vulnerability.md
|
||
|
CVE-2022-45640 - https://vulncheck.com/blog/xiongmai-iot-exploitation
|
||
|
CVE-2022-45641 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetMacFilterCfg/formSetMacFilterCfg.md
|
||
|
CVE-2022-45643 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md
|
||
|
CVE-2022-45644 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md
|
||
|
CVE-2022-45645 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/addWifiMacFilter_deviceMac/addWifiMacFilter_derviceMac.md
|
||
|
CVE-2022-45646 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeedUp/formSetClientState_limitSpeed.md
|
||
|
CVE-2022-45647 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md
|
||
|
CVE-2022-45648 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetDeviceName/formSetDeviceName.md
|
||
|
CVE-2022-45649 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_endIp/formSetPPTPServer_endIp.md
|
||
|
CVE-2022-45650 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetFirewallCfg/formSetFirewallCfg.md
|
||
|
CVE-2022-45651 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetVirtualSer/formSetVirtualSer.md
|
||
|
CVE-2022-45652 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetPPTPServer_startIp/formSetPPTPServer_startIp.md
|
||
|
CVE-2022-45653 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromNatStaticSetting/fromNatStaticSetting_page.md
|
||
|
CVE-2022-45654 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_ssid/form_fast_setting_wifi_set_ssid.md
|
||
|
CVE-2022-45655 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/form_fast_setting_wifi_set_timeZone/form_fast_setting_wifi_set_timeZone.md
|
||
|
CVE-2022-45656 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetSysTime/fromSetSysTime.md
|
||
|
CVE-2022-45657 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetIpMacBind/fromSetIpMacBind.md
|
||
|
CVE-2022-45658 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedEndTime/setSchedWifi_schedEndTime.md
|
||
|
CVE-2022-45659 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/fromSetWirelessRepeat/fromSetWirelessRepeat.md
|
||
|
CVE-2022-4566 - https://gitee.com/y_project/RuoYi/issues/I65V2B
|
||
|
CVE-2022-4566 - https://github.com/luelueking/ruoyi-4.7.5-vuln-poc
|
||
|
CVE-2022-45660 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSchedWifi_schedStartTime/setSchedWifi_schedStartTime.md
|
||
|
CVE-2022-45661 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/setSmartPowerManagement/setSmartPowerManagement.md
|
||
|
CVE-2022-45663 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWifiMacFilterSet/formWifiMacFilterSet.md
|
||
|
CVE-2022-45664 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDget/formWifiMacFilterGet.md
|
||
|
CVE-2022-45665 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetCfm/formWifiMacFilterSet.md
|
||
|
CVE-2022-45666 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formwrlSSIDset/formwrlSSIDset.md
|
||
|
CVE-2022-45667 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolRestoreSet/fromSysToolRestoreSet.md
|
||
|
CVE-2022-45668 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/fromSysToolReboot/fromSysToolReboot.md
|
||
|
CVE-2022-45669 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formWifiMacFilterGet/formWifiMacFilterGet.md
|
||
|
CVE-2022-4567 - https://huntr.dev/bounties/1ac677c4-ec0a-4788-9465-51d9b6bd8fd2
|
||
|
CVE-2022-45670 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/formSetAutoPing_ping1/formSetAutoPing_ping1.md
|
||
|
CVE-2022-45671 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formSetAppFilterRule/formSetAppFilterRule.md
|
||
|
CVE-2022-45672 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_i22/formWx3AuthorizeSet/formWx3AuthorizeSet.md
|
||
|
CVE-2022-45673 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolRestoreSet/fromSysToolRestoreSet.md
|
||
|
CVE-2022-45674 - https://github.com/ConfusedChenSir/VulnerabilityProjectRecords/blob/main/fromSysToolReboot/fromSysToolReboot.md
|
||
|
CVE-2022-45677 - https://github.com/yukar1z0e/temp/blob/main/README.md
|
||
|
CVE-2022-45685 - https://github.com/jettison-json/jettison/issues/54
|
||
|
CVE-2022-45688 - https://github.com/stleary/JSON-java/issues/708
|
||
|
CVE-2022-45690 - https://github.com/stleary/JSON-java/issues/654
|
||
|
CVE-2022-45693 - https://github.com/jettison-json/jettison/issues/52
|
||
|
CVE-2022-45697 - https://github.com/Wh04m1001/CVE
|
||
|
CVE-2022-45699 - https://www.youtube.com/watch?v=YNeeaDPJOBY
|
||
|
CVE-2022-4570 - https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef
|
||
|
CVE-2022-45701 - https://packetstormsecurity.com/files/171001/Arris-Router-Firmware-9.1.103-Remote-Code-Execution.htmlhttps://github.com/yerodin/CVE-2022-45701
|
||
|
CVE-2022-45703 - https://sourceware.org/bugzilla/show_bug.cgi?id=29799
|
||
|
CVE-2022-45706 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SJZx0L0Sj
|
||
|
CVE-2022-45707 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HyEfIEpBj
|
||
|
CVE-2022-45708 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1rR3UArj
|
||
|
CVE-2022-45709 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BkFpXcsSs
|
||
|
CVE-2022-4571 - https://wpscan.com/vulnerability/128b150b-3950-4cc5-b46a-5707f7a0df00
|
||
|
CVE-2022-45710 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/B1XG-5iSo
|
||
|
CVE-2022-45711 - https://hackmd.io/dLM8vDnwQOup8mmDbHJRHQ?both
|
||
|
CVE-2022-45712 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/r1pG4cori
|
||
|
CVE-2022-45714 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/S1QhLw0Ss
|
||
|
CVE-2022-45715 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/HkJ_o8Arj
|
||
|
CVE-2022-45716 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/rywHivCBo
|
||
|
CVE-2022-45717 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/By3Y6DRrj
|
||
|
CVE-2022-45718 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/Hkb38vELj
|
||
|
CVE-2022-45719 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJ8I_DCBi
|
||
|
CVE-2022-45720 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/SkCD5PEUo
|
||
|
CVE-2022-45721 - https://hackmd.io/@AAN506JzR6urM5U8fNh1ng/BJUfyuABo
|
||
|
CVE-2022-45748 - https://github.com/assimp/assimp/issues/4286
|
||
|
CVE-2022-4576 - https://wpscan.com/vulnerability/0d679e0e-891b-44f1-ac7f-a766e12956e0
|
||
|
CVE-2022-45768 - https://github.com/Erebua/CVE/blob/main/Edimax.md
|
||
|
CVE-2022-45768 - https://www.lovesandy.cc/2022/11/20/EDIMAX%E6%BC%8F%E6%B4%9E/
|
||
|
CVE-2022-4577 - https://wpscan.com/vulnerability/85d9fad7-ba3d-4140-ae05-46262d2643e6
|
||
|
CVE-2022-45770 - https://hackmag.com/security/aguard-cve/
|
||
|
CVE-2022-45770 - https://xakep.ru/2023/01/27/aguard-cve/
|
||
|
CVE-2022-45771 - https://github.com/pwndoc/pwndoc/issues/401
|
||
|
CVE-2022-4578 - https://wpscan.com/vulnerability/fad16c68-9f14-4866-b241-40468fb71494
|
||
|
CVE-2022-45781 - https://www.cnblogs.com/FALL3N/p/16813932.html
|
||
|
CVE-2022-4580 - https://wpscan.com/vulnerability/e54804c7-68a9-4c4c-94f9-1c3c9b97e8ca
|
||
|
CVE-2022-4584 - https://vuldb.com/?id.216170
|
||
|
CVE-2022-45868 - https://sites.google.com/sonatype.com/vulnerabilities/sonatype-2022-6243
|
||
|
CVE-2022-45869 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15
|
||
|
CVE-2022-45889 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45890 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45891 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45892 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45893 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45894 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45895 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/
|
||
|
CVE-2022-45896 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-planet-enterprises-ltd-planet-estream/-
|
||
|
CVE-2022-45914 - http://packetstormsecurity.com/files/170177/Zhuhai-Suny-Technology-ESL-Tag-Forgery-Replay-Attacks.html
|
||
|
CVE-2022-45914 - http://seclists.org/fulldisclosure/2022/Dec/6
|
||
|
CVE-2022-45915 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
||
|
CVE-2022-45915 - http://seclists.org/fulldisclosure/2022/Dec/7
|
||
|
CVE-2022-45915 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
||
|
CVE-2022-45916 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
||
|
CVE-2022-45916 - http://seclists.org/fulldisclosure/2022/Dec/7
|
||
|
CVE-2022-45916 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
||
|
CVE-2022-45917 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
||
|
CVE-2022-45917 - http://seclists.org/fulldisclosure/2022/Dec/7
|
||
|
CVE-2022-45917 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
||
|
CVE-2022-45918 - http://packetstormsecurity.com/files/170181/ILIAS-eLearning-7.15-Command-Injection-XSS-LFI-Open-Redirect.html
|
||
|
CVE-2022-45918 - http://seclists.org/fulldisclosure/2022/Dec/7
|
||
|
CVE-2022-45918 - https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-ilias-elearning-platform/
|
||
|
CVE-2022-45922 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
||
|
CVE-2022-45922 - http://seclists.org/fulldisclosure/2023/Jan/14
|
||
|
CVE-2022-45922 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
||
|
CVE-2022-45923 - http://packetstormsecurity.com/files/170613/OpenText-Extended-ECM-22.3-cs.exe-Remote-Code-Execution.html
|
||
|
CVE-2022-45923 - http://seclists.org/fulldisclosure/2023/Jan/10
|
||
|
CVE-2022-45923 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-in-csexe-opentext-server-component/
|
||
|
CVE-2022-45924 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
||
|
CVE-2022-45924 - http://seclists.org/fulldisclosure/2023/Jan/14
|
||
|
CVE-2022-45924 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
||
|
CVE-2022-45925 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
||
|
CVE-2022-45925 - http://seclists.org/fulldisclosure/2023/Jan/14
|
||
|
CVE-2022-45925 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
||
|
CVE-2022-45926 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
||
|
CVE-2022-45926 - http://seclists.org/fulldisclosure/2023/Jan/14
|
||
|
CVE-2022-45926 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
||
|
CVE-2022-45927 - http://packetstormsecurity.com/files/170614/OpenText-Extended-ECM-22.3-Java-Frontend-Remote-Code-Execution.html
|
||
|
CVE-2022-45927 - http://seclists.org/fulldisclosure/2023/Jan/13
|
||
|
CVE-2022-45927 - https://sec-consult.com/vulnerability-lab/advisory/pre-authenticated-remote-code-execution-via-java-frontend-qds-endpoint-opentext-extended-ecm/
|
||
|
CVE-2022-45928 - http://packetstormsecurity.com/files/170615/OpenText-Extended-ECM-22.3-File-Deletion-LFI-Privilege-Escsalation.html
|
||
|
CVE-2022-45928 - http://seclists.org/fulldisclosure/2023/Jan/14
|
||
|
CVE-2022-45928 - https://sec-consult.com/vulnerability-lab/advisory/multiple-post-authentication-vulnerabilities-including-rce-opentexttm-extended-ecm/
|
||
|
CVE-2022-45942 - https://github.com/This-is-Y/baijiacms-RCE
|
||
|
CVE-2022-45942 - https://this-is-y.xyz/2022/11/20/baijiacmsV4-RCE/
|
||
|
CVE-2022-45956 - https://packetstormsecurity.com/files/169962/Boa-Web-Server-0.94.13-0.94.14-Authentication-Bypass.html
|
||
|
CVE-2022-45957 - https://packetstormsecurity.com/files/169949/ZTE-ZXHN-H108NS-Stack-Buffer-Overflow-Denial-Of-Service.html
|
||
|
CVE-2022-45957 - https://packetstormsecurity.com/files/169958/ZTE-ZXHN-H108NS-Authentication-Bypass.html
|
||
|
CVE-2022-4596 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-45962 - https://ccat.gitbook.io/cyber-sec/cve/cve-2022-45962-postauth-sqli
|
||
|
CVE-2022-4597 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-45977 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/3
|
||
|
CVE-2022-45979 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/4
|
||
|
CVE-2022-4598 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-45980 - https://github.com/The-Itach1/IOT-CVE/tree/master/Tenda/AX12/6
|
||
|
CVE-2022-4599 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-45995 - https://github.com/bugfinder0/public_bug/tree/main/tenda/ax12/1
|
||
|
CVE-2022-45996 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/2
|
||
|
CVE-2022-45997 - https://github.com/bugfinder0/public_bug/tree/main/tenda/w20e/1
|
||
|
CVE-2022-4600 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-4601 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-4602 - https://seclists.org/fulldisclosure/2022/Dec/11
|
||
|
CVE-2022-46047 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/categories_delete_sql_injection/categories_delete_sql_injection.md
|
||
|
CVE-2022-4605 - https://huntr.dev/bounties/df455d44-0dec-470c-b576-8ea86ec5a367
|
||
|
CVE-2022-46051 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-SQLi/view_all_comments_update/view_all_comments_update.MD
|
||
|
CVE-2022-46059 - https://github.com/rdyx0/CVE/blob/master/AeroCMS/AeroCMS-v0.0.1-CSRF/add_user_csrf/add_user_csrf.md
|
||
|
CVE-2022-4606 - https://huntr.dev/bounties/3dab0466-c35d-4163-b3c7-a8666e2f7d95
|
||
|
CVE-2022-46062 - https://github.com/rdyx0/CVE/blob/master/Gym%20Management%20System/CSRF/delete_user/delete_user.md
|
||
|
CVE-2022-46071 - https://yuyudhn.github.io/CVE-2022-46071/
|
||
|
CVE-2022-46072 - https://yuyudhn.github.io/CVE-2022-46072/
|
||
|
CVE-2022-46073 - https://yuyudhn.github.io/CVE-2022-46073/
|
||
|
CVE-2022-46074 - https://www.youtube.com/watch?v=5Q3vyTo02bc&ab_channel=IkariShinji
|
||
|
CVE-2022-46074 - https://yuyudhn.github.io/CVE-2022-46074/
|
||
|
CVE-2022-46076 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-869
|
||
|
CVE-2022-46076 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46087 - https://github.com/G37SYS73M/Advisory_G37SYS73M/blob/main/CVE-2022-46087/poc.md
|
||
|
CVE-2022-46088 - https://packetstormsecurity.com
|
||
|
CVE-2022-4609 - https://huntr.dev/bounties/5b3115c5-776c-43d3-a7be-c8dc13ab81ce
|
||
|
CVE-2022-46093 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/Hospital-Management-System/Hospital-Management-System.md
|
||
|
CVE-2022-46095 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc/covid-19-vaccination.md
|
||
|
CVE-2022-46096 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/covid-19-vaccination-poc2/covid-19-vaccination2.md
|
||
|
CVE-2022-4610 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-46109 - https://github.com/z1r00/IOT_Vul/tree/main/Tenda/AC10/formSetClientState
|
||
|
CVE-2022-4611 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-4612 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-4613 - https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html
|
||
|
CVE-2022-4613 - https://vuldb.com/?id.216275
|
||
|
CVE-2022-46135 - https://github.com/MegaTKC/AeroCMS/issues/5
|
||
|
CVE-2022-4614 - https://huntr.dev/bounties/8b429330-3096-4fe4-85e0-1a9143e4dca5
|
||
|
CVE-2022-4615 - https://huntr.dev/bounties/9c66ece4-bcaa-417d-8b98-e8daff8a728b
|
||
|
CVE-2022-46152 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:X/RC:X/CR:M/IR:M/AR:M/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H&version=3.1
|
||
|
CVE-2022-46161 - https://securitylab.github.com/advisories/GHSL-2022-068_pdfmake/
|
||
|
CVE-2022-4617 - https://huntr.dev/bounties/1fb2ce08-7016-45fa-b402-ec08d700e4df
|
||
|
CVE-2022-46172 - https://github.com/goauthentik/authentik/security/advisories/GHSA-hv8r-6w7p-mpc5
|
||
|
CVE-2022-46179 - https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf
|
||
|
CVE-2022-4621 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-04
|
||
|
CVE-2022-4622 - https://wpscan.com/vulnerability/ea055ed4-324d-4d77-826a-b6f814413eb2
|
||
|
CVE-2022-4623 - https://wpscan.com/vulnerability/1b3201da-f254-406f-9b4a-cd5025b6b03d
|
||
|
CVE-2022-4624 - https://wpscan.com/vulnerability/e7dc0202-6be4-46fc-a451-fb3a25727b51
|
||
|
CVE-2022-4625 - https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15
|
||
|
CVE-2022-4626 - https://wpscan.com/vulnerability/59c577e9-7d1c-46bc-9218-3e143068738d
|
||
|
CVE-2022-4627 - https://wpscan.com/vulnerability/be9e8870-0682-441d-8955-d096d1346bd1
|
||
|
CVE-2022-4628 - https://wpscan.com/vulnerability/6ae719da-c43c-4b3a-bb8a-efa1de20100a
|
||
|
CVE-2022-46280 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670
|
||
|
CVE-2022-46289 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665
|
||
|
CVE-2022-4629 - https://wpscan.com/vulnerability/cf0a51f9-21d3-4ae8-b7d2-361921038fe8
|
||
|
CVE-2022-46290 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665
|
||
|
CVE-2022-46291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
||
|
CVE-2022-46292 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
||
|
CVE-2022-46293 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
||
|
CVE-2022-46294 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
||
|
CVE-2022-46295 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666
|
||
|
CVE-2022-4630 - https://huntr.dev/bounties/401661ee-40e6-4ee3-a925-3716b96ece5c
|
||
|
CVE-2022-4636 - https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01
|
||
|
CVE-2022-46377 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681
|
||
|
CVE-2022-46378 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681
|
||
|
CVE-2022-46381 - https://github.com/omarhashem123/Security-Research/blob/main/CVE-2022-46381/CVE-2022-46381.txt
|
||
|
CVE-2022-46395 - http://packetstormsecurity.com/files/172855/Android-Arm-Mali-GPU-Arbitrary-Code-Execution.html
|
||
|
CVE-2022-4640 - https://gitee.com/mingSoft/MCMS/issues/I65KI5
|
||
|
CVE-2022-46407 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-46408 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-46428 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/S1hP34Hvj
|
||
|
CVE-2022-46430 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi
|
||
|
CVE-2022-46432 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/B1Vgv1uwo
|
||
|
CVE-2022-46434 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/rJl69Icws
|
||
|
CVE-2022-46435 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SyvnlO9Pi
|
||
|
CVE-2022-4644 - https://huntr.dev/bounties/77e5f425-c764-4cb0-936a-7a76bfcf19b0
|
||
|
CVE-2022-46440 - https://github.com/keepinggg/poc
|
||
|
CVE-2022-46440 - https://github.com/matthiaskramm/swftools/issues/194
|
||
|
CVE-2022-46443 - https://www.youtube.com/watch?v=Dmjk6uOU8vY
|
||
|
CVE-2022-46443 - https://yuyudhn.github.io/CVE-2022-46443/
|
||
|
CVE-2022-4645 - https://gitlab.com/libtiff/libtiff/-/issues/277
|
||
|
CVE-2022-4646 - https://huntr.dev/bounties/17bc1b0f-1f5c-432f-88e4-c9866ccf6e10
|
||
|
CVE-2022-4647 - https://huntr.dev/bounties/ccdd243d-726c-4199-b742-25c571491242
|
||
|
CVE-2022-46475 - https://github.com/Insight8991/iot/blob/main/DIR-645%20genacgi%20Stack%20overflow.md
|
||
|
CVE-2022-46476 - https://github.com/Insight8991/iot/blob/main/dir859%20Command%20Execution%20Vulnerability.md
|
||
|
CVE-2022-46478 - https://github.com/WeiYe-Jing/datax-web/issues/587
|
||
|
CVE-2022-4648 - https://wpscan.com/vulnerability/9bbfb664-5b83-452b-82bb-562a1e18eb65
|
||
|
CVE-2022-46485 - https://github.com/WodenSec/CVE-2022-46485
|
||
|
CVE-2022-46486 - https://jovanbulck.github.io/files/ccs19-tale.pdf
|
||
|
CVE-2022-46489 - https://github.com/gpac/gpac/issues/2328
|
||
|
CVE-2022-4649 - https://wpscan.com/vulnerability/0d9ba176-97be-4b6b-9cf1-6c3047321a1e
|
||
|
CVE-2022-46490 - https://github.com/gpac/gpac/issues/2327
|
||
|
CVE-2022-46491 - https://github.com/Fanli2012/nbnbk/issues/2
|
||
|
CVE-2022-4650 - https://wpscan.com/vulnerability/b430fdaa-191a-429e-b6d2-479b32bb1075
|
||
|
CVE-2022-4651 - https://wpscan.com/vulnerability/d8182075-7472-48c8-8e9d-94b12ab6fcf6
|
||
|
CVE-2022-4652 - https://wpscan.com/vulnerability/ebf3df99-6939-4ae9-ad55-004f33c1cfbc
|
||
|
CVE-2022-4653 - https://wpscan.com/vulnerability/fa44ed44-9dac-4b4f-aaa3-503b76034578
|
||
|
CVE-2022-46530 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/GetParentControlInfo/GetParentControlInfo.md
|
||
|
CVE-2022-46531 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceId/addWifiMacFilter_deviceId.md
|
||
|
CVE-2022-46532 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/addWifiMacFilter_deviceMac/addWifiMacFilter_deviceMac.md
|
||
|
CVE-2022-46533 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md
|
||
|
CVE-2022-46534 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetSpeedWan/formSetSpeedWan.md
|
||
|
CVE-2022-46535 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_deviceId/formSetClientState_deviceId.md
|
||
|
CVE-2022-46536 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeedUp/formSetClientState_limitSpeedUp.md
|
||
|
CVE-2022-46537 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security/formWifiBasicSet_security.md
|
||
|
CVE-2022-46538 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWriteFacMac/formWriteFacMac.md
|
||
|
CVE-2022-46539 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formWifiBasicSet_security%20_5g/formWifiBasicSet_security_5g.md
|
||
|
CVE-2022-4654 - https://wpscan.com/vulnerability/a29744cd-b760-4757-8564-883d59fa4881
|
||
|
CVE-2022-46540 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_entrys/fromAddressNat_entrys.md
|
||
|
CVE-2022-46541 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/form_fast_setting_wifi_set/form_fast_setting_wifi_set.md
|
||
|
CVE-2022-46542 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_page/fromAddressNat_page.md
|
||
|
CVE-2022-46543 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromAddressNat_mitInterface/fromAddressNat_mitInterface.md
|
||
|
CVE-2022-46544 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formexeCommand/formexeCommand.md
|
||
|
CVE-2022-46545 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromNatStaticSetting/fromNatStaticSetting.md
|
||
|
CVE-2022-46546 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromRouteStatic/fromRouteStatic.md
|
||
|
CVE-2022-46547 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromVirtualSer/fromVirtualSer.md
|
||
|
CVE-2022-46548 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/fromDhcpListClient/fromDhcpListClient.md
|
||
|
CVE-2022-46549 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_deviceId/saveParentControlInfo_deviceId.md
|
||
|
CVE-2022-4655 - https://wpscan.com/vulnerability/a1c70c80-e952-4cc7-aca0-c2dde3fa08a9
|
||
|
CVE-2022-46550 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_urls/saveParentControlInfo_urls.md
|
||
|
CVE-2022-46551 - https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/saveParentControlInfo_time/saveParentControlInfo_time.md
|
||
|
CVE-2022-46552 - http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html
|
||
|
CVE-2022-46552 - https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e
|
||
|
CVE-2022-46552 - https://github.com/c2dc/cve-reported/blob/main/CVE-2022-46552/CVE-2022-46552.md
|
||
|
CVE-2022-46552 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4656 - https://wpscan.com/vulnerability/05976ed8-5a26-4eae-adb2-0ea3b2722391
|
||
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_l2tp
|
||
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pppoe
|
||
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/SetWan2Settings_pptp
|
||
|
CVE-2022-46560 - https://hackmd.io/@0dayResearch/rkXr4BQPi
|
||
|
CVE-2022-46560 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_L2TP
|
||
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPPoE
|
||
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/SetWanSettings_PPTP
|
||
|
CVE-2022-46561 - https://hackmd.io/@0dayResearch/ry55QVQvj
|
||
|
CVE-2022-46561 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46562 - https://hackmd.io/@0dayResearch/B1C9jeXDi
|
||
|
CVE-2022-46562 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_PSK
|
||
|
CVE-2022-46562 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46563 - https://hackmd.io/@0dayResearch/HkDzZLCUo
|
||
|
CVE-2022-46563 - https://hackmd.io/@0dayResearch/SetDynamicDNSSettings
|
||
|
CVE-2022-46563 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46566 - https://hackmd.io/@0dayResearch/SetQuickVPNSettings_Password
|
||
|
CVE-2022-46566 - https://hackmd.io/@0dayResearch/SyhDme7wo
|
||
|
CVE-2022-46566 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46568 - https://hackmd.io/@0dayResearch/B1SZP0aIo
|
||
|
CVE-2022-46568 - https://hackmd.io/@0dayResearch/SetSysEmailSettings
|
||
|
CVE-2022-46568 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46569 - https://hackmd.io/@0dayResearch/SetWLanRadioSecurity
|
||
|
CVE-2022-46569 - https://hackmd.io/@0dayResearch/r1R6sWRUs
|
||
|
CVE-2022-46569 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4657 - https://wpscan.com/vulnerability/a90a413d-0e00-4da8-a339-d6cdfba70bb3
|
||
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_l2tp
|
||
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pppoe
|
||
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/SetWan3Settings_pptp
|
||
|
CVE-2022-46570 - https://hackmd.io/@0dayResearch/r1zsTSmDs
|
||
|
CVE-2022-46570 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4658 - https://wpscan.com/vulnerability/c7a17eb9-2811-45ba-bab3-f53b2fa7d051
|
||
|
CVE-2022-46581 - https://brief-nymphea-813.notion.site/Vul5-TEW755-bof-tools_nslookup-c83bac14fe0f4f729535053459479fd1
|
||
|
CVE-2022-46603 - https://github.com/10cks/inkdropPoc
|
||
|
CVE-2022-46604 - http://packetstormsecurity.com/files/171720/Responsive-FileManager-9.9.5-Remote-Shell-Upload.html
|
||
|
CVE-2022-46604 - https://medium.com/@_sadshade/file-extention-bypass-in-responsive-filemanager-9-5-5-leading-to-rce-authenticated-3290eddc54e7
|
||
|
CVE-2022-4661 - https://wpscan.com/vulnerability/b95956c9-40e5-47aa-86f6-e2da61b3c19f
|
||
|
CVE-2022-46631 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/6
|
||
|
CVE-2022-46634 - https://github.com/EPhaha/IOT_vuln/tree/main/TOTOLink/A7100RU/7
|
||
|
CVE-2022-46637 - https://packetstormsecurity.com/files/170342/ProLink-PRS1841-Backdoor-Account.html
|
||
|
CVE-2022-46637 - https://prolink2u.com/product/prs1841/
|
||
|
CVE-2022-46639 - https://ia-informatica.com/it/CVE-2022-46639
|
||
|
CVE-2022-4664 - https://wpscan.com/vulnerability/d6a9cfaa-d3fa-442e-a9a1-b06588723e39
|
||
|
CVE-2022-46640 - https://pwning.tech/cve-2022-46640/
|
||
|
CVE-2022-46641 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetIpMacBindSettings%20Command%20Injection%20Vulnerability.md
|
||
|
CVE-2022-46641 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-46642 - https://github.com/CyberUnicornIoT/IoTvuln/blob/main/d-link/dir-846/D-Link%20dir-846%20SetAutoUpgradeInfo%20command%20injection%20vulnerability.md
|
||
|
CVE-2022-46642 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4665 - https://huntr.dev/bounties/5e7f3ecc-3b08-4e0e-8bf8-ae7ae229941f
|
||
|
CVE-2022-4666 - https://wpscan.com/vulnerability/a6d23f2f-9504-40da-9b71-189033d8bd1d
|
||
|
CVE-2022-4667 - https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d
|
||
|
CVE-2022-4668 - https://wpscan.com/vulnerability/3e43156a-b784-4066-be69-23b139aafbad
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/24
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/25
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46689 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-4669 - https://wpscan.com/vulnerability/79f011e4-3422-4307-8736-f27048796aae
|
||
|
CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46690 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-46691 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46692 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46693 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-46694 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46695 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-46696 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-46697 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-46698 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-46699 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-4670 - https://wpscan.com/vulnerability/2a67c290-2a27-44fe-95ae-2d427e9d7548
|
||
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/21
|
||
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/27
|
||
|
CVE-2022-46700 - http://seclists.org/fulldisclosure/2022/Dec/28
|
||
|
CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/23
|
||
|
CVE-2022-46701 - http://seclists.org/fulldisclosure/2022/Dec/26
|
||
|
CVE-2022-46702 - http://seclists.org/fulldisclosure/2022/Dec/20
|
||
|
CVE-2022-4671 - https://wpscan.com/vulnerability/14c83830-3207-4f92-b8f5-afd7cc93af88
|
||
|
CVE-2022-4672 - https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d
|
||
|
CVE-2022-4673 - https://wpscan.com/vulnerability/1c4f379d-252a-487b-81c9-bf711ab71dff
|
||
|
CVE-2022-4674 - https://wpscan.com/vulnerability/eda64678-81ae-4be3-941e-a1e26e54029b
|
||
|
CVE-2022-46741 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2022-001.md
|
||
|
CVE-2022-4675 - https://wpscan.com/vulnerability/21f4cc5d-c4b4-495f-acf3-9fdf53591052
|
||
|
CVE-2022-4676 - https://wpscan.com/vulnerability/1df3c17c-990d-4074-b1d5-b26da880d88e
|
||
|
CVE-2022-46764 - https://vuldb.com/?diff.216845
|
||
|
CVE-2022-4677 - https://wpscan.com/vulnerability/9c293098-de54-4a04-b13d-2a702200f02e
|
||
|
CVE-2022-46770 - http://packetstormsecurity.com/files/171610/Qubes-Mirage-Firewall-0.8.3-Denial-Of-Service.html
|
||
|
CVE-2022-46770 - https://github.com/mirage/qubes-mirage-firewall/issues/166
|
||
|
CVE-2022-4678 - https://wpscan.com/vulnerability/6a36d665-a0ca-4346-8e55-cf9ba45966cc
|
||
|
CVE-2022-46786 - https://support.squaredup.com
|
||
|
CVE-2022-4679 - https://wpscan.com/vulnerability/c817c4af-cff2-4720-944d-c59e27544d41
|
||
|
CVE-2022-4680 - https://wpscan.com/vulnerability/f4197386-975d-4e53-8fc9-9425732da9af
|
||
|
CVE-2022-4681 - https://wpscan.com/vulnerability/5a4096e8-abe4-41c4-b741-c44e740e8689
|
||
|
CVE-2022-4682 - https://wpscan.com/vulnerability/5fc92954-20cf-4563-806e-e7a8e5ccfc72
|
||
|
CVE-2022-4683 - https://huntr.dev/bounties/84973f6b-739a-4d7e-8757-fc58cbbaf6ef
|
||
|
CVE-2022-4686 - https://huntr.dev/bounties/caa0b22c-501f-44eb-af65-65c315cd1637
|
||
|
CVE-2022-4687 - https://huntr.dev/bounties/b908377f-a61b-432c-8e6a-c7498da69788
|
||
|
CVE-2022-46874 - https://bugzilla.mozilla.org/show_bug.cgi?id=1746139
|
||
|
CVE-2022-46875 - https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
|
||
|
CVE-2022-46887 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
||
|
CVE-2022-46888 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
||
|
CVE-2022-46889 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
||
|
CVE-2022-4689 - https://huntr.dev/bounties/a78c4326-6e7b-47fe-aa82-461e5c12a4e3
|
||
|
CVE-2022-46890 - https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities
|
||
|
CVE-2022-4690 - https://huntr.dev/bounties/7e1be91d-3b13-4300-8af2-9bd9665ec335
|
||
|
CVE-2022-4691 - https://huntr.dev/bounties/459b55c1-22f5-4556-9cda-9b86aa91582f
|
||
|
CVE-2022-46910 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BkwzORiDo
|
||
|
CVE-2022-46912 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/Sk6sfbTPi
|
||
|
CVE-2022-46914 - https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJ4czlpwi
|
||
|
CVE-2022-4692 - https://huntr.dev/bounties/9d1ed6ea-f7a0-4561-9325-a2babef99c74
|
||
|
CVE-2022-4693 - https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea
|
||
|
CVE-2022-46934 - https://github.com/kekingcn/kkFileView/issues/411
|
||
|
CVE-2022-4694 - https://huntr.dev/bounties/a4d865c2-1a2b-4e3a-aaae-915b0dfc3f22
|
||
|
CVE-2022-4695 - https://huntr.dev/bounties/2559d548-b847-40fb-94d6-18c1ad58b789
|
||
|
CVE-2022-46957 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/tracking.zip
|
||
|
CVE-2022-46965 - https://github.com/202ecommerce/security-advisories/security/advisories/GHSA-hg7m-23j3-rf56
|
||
|
CVE-2022-46966 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2022-46967 - https://packetstormsecurity.com/files/169916/Revenue-Collection-System-1.0-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2022-46968 - https://packetstormsecurity.com/files/169917/Revenue-Collection-System-1.0-Cross-Site-Scripting-Authentication-Bypass.html
|
||
|
CVE-2022-4699 - https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9
|
||
|
CVE-2022-47027 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2022-47027/CVE%20detail.md
|
||
|
CVE-2022-47028 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47028/CVE%20detailed.md
|
||
|
CVE-2022-47029 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2022-47029/CVE%20detailed.md
|
||
|
CVE-2022-47035 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-47036 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html
|
||
|
CVE-2022-47037 - https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html
|
||
|
CVE-2022-4706 - https://wpscan.com/vulnerability/30882a45-ca03-4ff1-a36d-758d9b9b641c
|
||
|
CVE-2022-47065 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/01/README.md
|
||
|
CVE-2022-47069 - https://sourceforge.net/p/p7zip/bugs/241/
|
||
|
CVE-2022-47070 - https://github.com/Sylon001/NVS-365-Camera/tree/master/NVS365%20Network%20Video%20Server%20Password%20Information%20Unauthorized%20Access%20Vulnerability
|
||
|
CVE-2022-47072 - https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection
|
||
|
CVE-2022-47073 - https://medium.com/@shiva.infocop/stored-xss-found-in-small-crm-phpgurukul-7890ea3c04df
|
||
|
CVE-2022-47073 - https://packetstormsecurity.com
|
||
|
CVE-2022-47075 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2022-47075 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/
|
||
|
CVE-2022-47076 - http://packetstormsecurity.com/files/173093/Smart-Office-Web-20.28-Information-Disclosure-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2022-47076 - https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/
|
||
|
CVE-2022-47083 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5720.php
|
||
|
CVE-2022-47085 - https://doc.rust-lang.org/std/macro.eprintln.html
|
||
|
CVE-2022-47086 - https://github.com/gpac/gpac/issues/2337
|
||
|
CVE-2022-47087 - https://github.com/gpac/gpac/issues/2339
|
||
|
CVE-2022-47088 - https://github.com/gpac/gpac/issues/2340
|
||
|
CVE-2022-47089 - https://github.com/gpac/gpac/issues/2338
|
||
|
CVE-2022-47091 - https://github.com/gpac/gpac/issues/2343
|
||
|
CVE-2022-47092 - https://github.com/gpac/gpac/issues/2347
|
||
|
CVE-2022-47093 - https://github.com/gpac/gpac/issues/2344
|
||
|
CVE-2022-47094 - https://github.com/gpac/gpac/issues/2345
|
||
|
CVE-2022-47095 - https://github.com/gpac/gpac/issues/2346
|
||
|
CVE-2022-47102 - https://github.com/sudoninja-noob/CVE-2022-47102/blob/main/CVE-2022-47102
|
||
|
CVE-2022-47130 - https://portswigger.net/web-security/csrf
|
||
|
CVE-2022-47130 - https://xpsec.co/blog/academy-lms-5-10-coupon-csrf
|
||
|
CVE-2022-47131 - https://portswigger.net/web-security/csrf
|
||
|
CVE-2022-47131 - https://portswigger.net/web-security/csrf/xss-vs-csrf
|
||
|
CVE-2022-47131 - https://xpsec.co/blog/academy-lms-5-10-add-page-csrf-xss
|
||
|
CVE-2022-47132 - https://portswigger.net/web-security/csrf
|
||
|
CVE-2022-47132 - https://xpsec.co/blog/academy-lms-5-10-add-admin-csrf
|
||
|
CVE-2022-4714 - https://wpscan.com/vulnerability/61b475f1-bbfb-4450-a3b2-b8caf5df2340
|
||
|
CVE-2022-4715 - https://wpscan.com/vulnerability/4394fe86-4240-4454-b724-81464b04123a
|
||
|
CVE-2022-4716 - https://wpscan.com/vulnerability/24176ad3-2317-4853-b4db-8394384d52cd
|
||
|
CVE-2022-4717 - https://wpscan.com/vulnerability/14b679f5-44a8-46d4-89dd-94eb647cb672
|
||
|
CVE-2022-4718 - https://wpscan.com/vulnerability/04d7cd44-9e18-42b9-9f79-cc9cd6980526
|
||
|
CVE-2022-4719 - https://huntr.dev/bounties/9f746881-ad42-446b-9b1d-153391eacc09
|
||
|
CVE-2022-47194 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
||
|
CVE-2022-47195 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
||
|
CVE-2022-47196 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
||
|
CVE-2022-47197 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1686
|
||
|
CVE-2022-4720 - https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70
|
||
|
CVE-2022-4721 - https://huntr.dev/bounties/3c48ef5d-da4d-4ee4-aaca-af65e7273720
|
||
|
CVE-2022-4722 - https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58
|
||
|
CVE-2022-4723 - https://huntr.dev/bounties/9369681b-8bfc-4146-a54c-c5108442d92c
|
||
|
CVE-2022-4724 - https://huntr.dev/bounties/e6fb1931-8d9c-4895-be4a-59839b4b6445
|
||
|
CVE-2022-4730 - https://vuldb.com/?id.216744
|
||
|
CVE-2022-4732 - https://huntr.dev/bounties/d5be2e96-1f2f-4357-a385-e184cf0119aa
|
||
|
CVE-2022-4733 - https://huntr.dev/bounties/f353adfb-e5b8-43e7-957a-894670fd4ccd
|
||
|
CVE-2022-4744 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
|
||
|
CVE-2022-4745 - https://wpscan.com/vulnerability/9703f42e-bdfe-4787-92c9-47963d9af425
|
||
|
CVE-2022-4746 - https://wpscan.com/vulnerability/62e3babc-00c6-4a35-972f-8f03ba70ba32
|
||
|
CVE-2022-4747 - https://wpscan.com/vulnerability/004f1872-1576-447f-8837-f29fa319cbdc
|
||
|
CVE-2022-4749 - https://wpscan.com/vulnerability/8afc3b2a-81e5-4b6f-8f4c-c48492843569
|
||
|
CVE-2022-4750 - https://wpscan.com/vulnerability/7bdc1324-8d08-4185-971f-8d49367702cf
|
||
|
CVE-2022-47502 - https://www.openoffice.org/security/cves/CVE-2022-47502.html
|
||
|
CVE-2022-4751 - https://wpscan.com/vulnerability/dd5cc04a-042d-402a-ab7a-96aff3d57478
|
||
|
CVE-2022-47514 - https://github.com/jumpycastle/xmlrpc.net-poc
|
||
|
CVE-2022-4752 - https://wpscan.com/vulnerability/309799dd-dea7-489d-8d18-b6014534f5af
|
||
|
CVE-2022-47529 - http://seclists.org/fulldisclosure/2023/Mar/26
|
||
|
CVE-2022-47529 - http://seclists.org/fulldisclosure/2024/Apr/17
|
||
|
CVE-2022-47529 - https://hyp3rlinx.altervista.org/advisories/RSA_NETWITNESS_EDR_AGENT_INCORRECT_ACCESS_CONTROL_CVE-2022-47529.txt
|
||
|
CVE-2022-47529 - https://packetstormsecurity.com/files/171476/RSA-NetWitness-Endpoint-EDR-Agent-12.x-Incorrect-Access-Control-Code-Execution.html
|
||
|
CVE-2022-4753 - https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126
|
||
|
CVE-2022-47531 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2022-47532 - https://herolab.usd.de/security-advisories/usd-2022-0064/
|
||
|
CVE-2022-4754 - https://wpscan.com/vulnerability/d2cc0ab2-9bfd-4a09-ac31-bd90e6da12db
|
||
|
CVE-2022-47547 - https://arxiv.org/pdf/2212.05197.pdf
|
||
|
CVE-2022-4756 - https://wpscan.com/vulnerability/d67b0f7a-fdb1-4305-9976-c5f77b0e3b61
|
||
|
CVE-2022-4757 - https://wpscan.com/vulnerability/30211ffd-8751-4354-96d3-69b0106100b1
|
||
|
CVE-2022-47577 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a
|
||
|
CVE-2022-47578 - https://medium.com/nestedif/vulnerability-disclosure-business-logic-unauthorized-data-exfiltration-bypassing-dlp-zoho-cc51465ba84a
|
||
|
CVE-2022-4758 - https://wpscan.com/vulnerability/c2c89234-5e9c-47c8-9827-8ab0b10fb7d6
|
||
|
CVE-2022-47583 - https://dgl.cx/2023/09/ansi-terminal-security#mintty
|
||
|
CVE-2022-4759 - https://wpscan.com/vulnerability/63328927-5614-4fa1-8f46-46ff0c8eb959
|
||
|
CVE-2022-4760 - https://wpscan.com/vulnerability/ad710c22-878a-441b-9c5a-90511b913d9d
|
||
|
CVE-2022-4761 - https://wpscan.com/vulnerability/ad163020-8b9c-42cb-a55f-b137b224bafb
|
||
|
CVE-2022-4762 - https://wpscan.com/vulnerability/4500566a-e5f2-40b8-a185-2bcace221b4e
|
||
|
CVE-2022-4763 - https://wpscan.com/vulnerability/2f79a87f-c994-4a1e-b455-39d7d3c5c1b5
|
||
|
CVE-2022-47630 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html
|
||
|
CVE-2022-47631 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
|
||
|
CVE-2022-47631 - http://seclists.org/fulldisclosure/2023/Sep/6
|
||
|
CVE-2022-47631 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-002.txt
|
||
|
CVE-2022-47632 - http://packetstormsecurity.com/files/170772/Razer-Synapse-3.7.0731.072516-Local-Privilege-Escalation.html
|
||
|
CVE-2022-47632 - http://packetstormsecurity.com/files/174696/Razer-Synapse-Race-Condition-DLL-Hijacking.html
|
||
|
CVE-2022-47632 - http://seclists.org/fulldisclosure/2023/Sep/6
|
||
|
CVE-2022-47632 - https://syss.de
|
||
|
CVE-2022-47632 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-047.txt
|
||
|
CVE-2022-47635 - https://wildix.atlassian.net/wiki/spaces/DOC/pages/30279136/Changelogs
|
||
|
CVE-2022-47636 - http://packetstormsecurity.com/files/174127/OutSystems-Service-Studio-11.53.30-DLL-Hijacking.html
|
||
|
CVE-2022-47636 - https://www.exploit-db.com/exploits/51678
|
||
|
CVE-2022-4764 - https://wpscan.com/vulnerability/788c6aa2-14cc-411f-95e8-5994f8c82d70
|
||
|
CVE-2022-4765 - https://wpscan.com/vulnerability/a21dc4a3-a4f3-4619-b8a3-493a27e14ccb
|
||
|
CVE-2022-47653 - https://github.com/gpac/gpac/issues/2349
|
||
|
CVE-2022-47654 - https://github.com/gpac/gpac/issues/2350
|
||
|
CVE-2022-47655 - https://github.com/strukturag/libde265/issues/367
|
||
|
CVE-2022-47656 - https://github.com/gpac/gpac/issues/2353
|
||
|
CVE-2022-47657 - https://github.com/gpac/gpac/issues/2355
|
||
|
CVE-2022-47658 - https://github.com/gpac/gpac/issues/2356
|
||
|
CVE-2022-47659 - https://github.com/gpac/gpac/issues/2354
|
||
|
CVE-2022-47660 - https://github.com/gpac/gpac/issues/2357
|
||
|
CVE-2022-47661 - https://github.com/gpac/gpac/issues/2358
|
||
|
CVE-2022-47662 - https://github.com/gpac/gpac/issues/2359
|
||
|
CVE-2022-47663 - https://github.com/gpac/gpac/issues/2360
|
||
|
CVE-2022-47664 - https://github.com/strukturag/libde265/issues/368
|
||
|
CVE-2022-47665 - https://github.com/strukturag/libde265/issues/369
|
||
|
CVE-2022-47673 - https://sourceware.org/bugzilla/show_bug.cgi?id=29876
|
||
|
CVE-2022-4769 - https://support.pentaho.com/hc/en-us/articles/14452244712589--Resolved-Pentaho-BA-Server-Generation-of-Error-Message-Containing-Sensitive-Information-Versions-before-9-4-0-0-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-4769-
|
||
|
CVE-2022-47695 - https://sourceware.org/bugzilla/show_bug.cgi?id=29846
|
||
|
CVE-2022-47696 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677
|
||
|
CVE-2022-47732 - https://www.swascan.com/security-advisory-yeastar-n412-and-n824-configuration-panel/
|
||
|
CVE-2022-4774 - https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e
|
||
|
CVE-2022-4775 - https://wpscan.com/vulnerability/5ab3fc58-7d1c-4bcd-8bbd-86c62a3f979c
|
||
|
CVE-2022-47758 - https://pwning.tech/cve-2022-47758
|
||
|
CVE-2022-47758 - https://pwning.tech/cve-2022-47758/
|
||
|
CVE-2022-4776 - https://wpscan.com/vulnerability/d5ea8f7f-7d5a-4b2e-a070-a9aef7cac58a
|
||
|
CVE-2022-47767 - https://www.swascan.com/security-advisory-solar-log/
|
||
|
CVE-2022-47768 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/
|
||
|
CVE-2022-47769 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/
|
||
|
CVE-2022-4777 - https://wpscan.com/vulnerability/b4c53bef-e868-46f1-965d-720b5b9a931e
|
||
|
CVE-2022-47770 - https://www.swascan.com/it/security-advisory-serenissima-informatica-fastcheckin/
|
||
|
CVE-2022-4781 - https://wpscan.com/vulnerability/a2803027-b822-4bf9-8d1d-6f538681af9d
|
||
|
CVE-2022-4782 - https://wpscan.com/vulnerability/d3a0468a-8405-4b6c-800f-abd5ce5387b5
|
||
|
CVE-2022-4783 - https://wpscan.com/vulnerability/38e4c7fe-94d5-48b9-8659-e114cbbb4252
|
||
|
CVE-2022-4784 - https://wpscan.com/vulnerability/a30c6f1e-62fd-493d-ad5e-1b55ceec62a9
|
||
|
CVE-2022-4785 - https://wpscan.com/vulnerability/61873267-9f4f-4be5-bad6-95229ad54b99
|
||
|
CVE-2022-47853 - https://github.com/Am1ngl/ttt/tree/main/16
|
||
|
CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155
|
||
|
CVE-2022-47854 - https://github.com/mkucej/i-librarian/issues/155#issue-1501906608
|
||
|
CVE-2022-4786 - https://wpscan.com/vulnerability/fdad356f-cae4-4390-9a62-605201cee0c0
|
||
|
CVE-2022-4787 - https://wpscan.com/vulnerability/2ab59972-ccfd-48f6-b879-58fb38823ca5
|
||
|
CVE-2022-47870 - https://packetstormsecurity.com/files/171647/SQL-Monitor-12.1.31.893-Cross-Site-Scripting.html
|
||
|
CVE-2022-47873 - https://fordefence.com/cve-2022-47873-keos-software-xx/
|
||
|
CVE-2022-47874 - http://packetstormsecurity.com/files/172156/Jedox-2020.2.5-Database-Credential-Disclosure.html
|
||
|
CVE-2022-47875 - http://packetstormsecurity.com/files/172152/Jedox-2022.4.2-Directory-Traversal-Remote-Code-Execution.html
|
||
|
CVE-2022-47876 - http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html
|
||
|
CVE-2022-47877 - http://packetstormsecurity.com/files/172153/Jedox-2020.2.5-Cross-Site-Scripting.html
|
||
|
CVE-2022-47878 - http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html
|
||
|
CVE-2022-4788 - https://wpscan.com/vulnerability/2a162365-5a86-423d-b7c4-55c9b4d8b024
|
||
|
CVE-2022-47881 - https://www.foxit.com/support/security-bulletins.html
|
||
|
CVE-2022-4789 - https://wpscan.com/vulnerability/5e816e9a-84e5-42d2-a7ff-e46be9072278
|
||
|
CVE-2022-4790 - https://wpscan.com/vulnerability/c01f9d36-955d-432c-8a09-ea9ee750f1a1
|
||
|
CVE-2022-4791 - https://wpscan.com/vulnerability/0a6e4c45-3f6d-4150-9546-141c2e3a1782
|
||
|
CVE-2022-4792 - https://wpscan.com/vulnerability/13304aca-0722-4bd9-b443-a5fed1ce22da
|
||
|
CVE-2022-47924 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json
|
||
|
CVE-2022-47925 - https://wid.cert-bund.de/.well-known/csaf/white/2022/bsi-2022-0004.json
|
||
|
CVE-2022-47929 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
|
||
|
CVE-2022-4793 - https://wpscan.com/vulnerability/00c34ba8-b82e-4bb9-90b1-1afefae75948
|
||
|
CVE-2022-47930 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
||
|
CVE-2022-47931 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
||
|
CVE-2022-47938 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
||
|
CVE-2022-47939 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
||
|
CVE-2022-4794 - https://wpscan.com/vulnerability/feb4580d-df15-45c8-b59e-ad406e4b064c
|
||
|
CVE-2022-47940 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
|
||
|
CVE-2022-47941 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
||
|
CVE-2022-47942 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
||
|
CVE-2022-47943 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
|
||
|
CVE-2022-47949 - https://github.com/PabloMK7/ENLBufferPwn
|
||
|
CVE-2022-4795 - https://wpscan.com/vulnerability/5052e60f-59ea-4758-8af3-112285a18639
|
||
|
CVE-2022-4796 - https://huntr.dev/bounties/efe8001b-1d6a-41af-a64c-736705cc66a6
|
||
|
CVE-2022-47966 - http://packetstormsecurity.com/files/170882/Zoho-ManageEngine-ServiceDesk-Plus-14003-Remote-Code-Execution.html
|
||
|
CVE-2022-47966 - http://packetstormsecurity.com/files/170925/ManageEngine-ADSelfService-Plus-Unauthenticated-SAML-Remote-Code-Execution.html
|
||
|
CVE-2022-47966 - http://packetstormsecurity.com/files/170943/Zoho-ManageEngine-Endpoint-Central-MSP-10.1.2228.10-Remote-Code-Execution.html
|
||
|
CVE-2022-47966 - https://attackerkb.com/topics/gvs0Gv8BID/cve-2022-47966/rapid7-analysis
|
||
|
CVE-2022-47966 - https://github.com/horizon3ai/CVE-2022-47966
|
||
|
CVE-2022-47966 - https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive/
|
||
|
CVE-2022-4797 - https://huntr.dev/bounties/5233f76f-016b-4c65-b019-2c5d27802a1b
|
||
|
CVE-2022-4798 - https://huntr.dev/bounties/e12eed25-1a8e-4ee1-b846-2d4df1db2fae
|
||
|
CVE-2022-47986 - http://packetstormsecurity.com/files/171772/IBM-Aspera-Faspex-4.4.1-YAML-Deserialization.html
|
||
|
CVE-2022-4799 - https://huntr.dev/bounties/c5d70f9d-b7a7-4418-9368-4566a8143e79
|
||
|
CVE-2022-4800 - https://huntr.dev/bounties/aa45a6eb-cc38-45e5-a301-221ef43c0ef8
|
||
|
CVE-2022-48006 - https://github.com/taogogo/taocms/issues/35
|
||
|
CVE-2022-4801 - https://huntr.dev/bounties/b0795261-0f97-4f0b-be44-9dc079e01593
|
||
|
CVE-2022-48011 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-sql%20injection%20in%20viewerrors-importID.md
|
||
|
CVE-2022-48012 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Reflected%20XSS%20in%20onChangeTag.md
|
||
|
CVE-2022-48013 - https://github.com/Sakura-501/Opencats-0.9.7-Vulnerabilities/blob/main/Opencats-0.9.7-Stored%20XSS%20in%20Calendar-Add-Event.md
|
||
|
CVE-2022-48019 - https://github.com/kkent030315/CVE-2022-42046
|
||
|
CVE-2022-4802 - https://huntr.dev/bounties/d47d4a94-92e3-4400-b012-a8577cbd7956
|
||
|
CVE-2022-4803 - https://huntr.dev/bounties/0fba72b9-db10-4d9f-a707-2acf2004a286
|
||
|
CVE-2022-4805 - https://huntr.dev/bounties/b03f6a9b-e49b-42d6-a318-1d7afd985873
|
||
|
CVE-2022-4806 - https://huntr.dev/bounties/2c7101bc-e6d8-4cd0-9003-bc8d86f4e4be
|
||
|
CVE-2022-48063 - https://sourceware.org/bugzilla/show_bug.cgi?id=29924
|
||
|
CVE-2022-48064 - https://sourceware.org/bugzilla/show_bug.cgi?id=29922
|
||
|
CVE-2022-48065 - https://sourceware.org/bugzilla/show_bug.cgi?id=29925
|
||
|
CVE-2022-4807 - https://huntr.dev/bounties/704c9ed7-2120-47ea-aaf0-5fdcbd492954
|
||
|
CVE-2022-48078 - https://github.com/zrax/pycdc/issues/295
|
||
|
CVE-2022-48079 - https://thanatosxingyu.github.io/
|
||
|
CVE-2022-4808 - https://huntr.dev/bounties/11877cbf-fcaf-42ef-813e-502c7293f2b5
|
||
|
CVE-2022-48085 - http://google.com
|
||
|
CVE-2022-4809 - https://huntr.dev/bounties/e46c5380-a590-40de-a8e5-79872ee0bb29
|
||
|
CVE-2022-48090 - https://github.com/tramyardg/hotel-mgmt-system/issues/21
|
||
|
CVE-2022-48091 - https://github.com/tramyardg/hotel-mgmt-system/issues/22
|
||
|
CVE-2022-4810 - https://huntr.dev/bounties/f0c8d778-db86-4ed3-85bb-5315ab56915e
|
||
|
CVE-2022-48107 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20IPAddress
|
||
|
CVE-2022-48107 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-48108 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20inject%20in%20Netmask
|
||
|
CVE-2022-48108 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2022-4811 - https://huntr.dev/bounties/e907b754-4f33-46b6-9dd2-0d2223cb060c
|
||
|
CVE-2022-48110 - https://packetstormsecurity.com/files/170927/CKSource-CKEditor5-35.4.0-Cross-Site-Scripting.html
|
||
|
CVE-2022-48111 - https://devisions.github.io/blog/cve-2022-48111
|
||
|
CVE-2022-48111 - https://labs.yarix.com/2023/02/siri-wi400-xss-on-login-page-cve-2022-48111/
|
||
|
CVE-2022-48113 - https://wefir.blogspot.com/2022/12/totolink-n200rev5-telnet-backdoor.html
|
||
|
CVE-2022-48114 - https://gitee.com/y_project/RuoYi/issues/I65V2B
|
||
|
CVE-2022-48116 - https://github.com/loadream/AyaCMS/issues/10
|
||
|
CVE-2022-4812 - https://huntr.dev/bounties/33924891-5c36-4b46-b417-98eaab688c4c
|
||
|
CVE-2022-48121 - https://github.com/Am1ngl/ttt/tree/main/16
|
||
|
CVE-2022-48122 - https://github.com/Am1ngl/ttt/tree/main/17
|
||
|
CVE-2022-48123 - https://github.com/Am1ngl/ttt/tree/main/15
|
||
|
CVE-2022-48124 - https://github.com/Am1ngl/ttt/tree/main/14
|
||
|
CVE-2022-48125 - https://github.com/Am1ngl/ttt/tree/main/13
|
||
|
CVE-2022-48126 - https://github.com/Am1ngl/ttt/tree/main/12
|
||
|
CVE-2022-4813 - https://huntr.dev/bounties/a24b45d8-554b-4131-8ce1-f33bf8cdbacc
|
||
|
CVE-2022-48130 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formSetStaticRoute.md
|
||
|
CVE-2022-4814 - https://huntr.dev/bounties/e65b3458-c2e2-4c0b-9029-e3c9ee015ae4
|
||
|
CVE-2022-48150 - https://github.com/sahilop123/-CVE-2022-48150
|
||
|
CVE-2022-48164 - https://docs.google.com/document/d/1JgqpBYRxyU0WKDSqkvi4Yo0723k7mrIUeuH9i1eEs8U/edit?usp=sharing
|
||
|
CVE-2022-48164 - https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WN533A8.md
|
||
|
CVE-2022-48177 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html
|
||
|
CVE-2022-48178 - http://packetstormsecurity.com/files/171792/X2CRM-6.6-6.9-Cross-Site-Scripting.html
|
||
|
CVE-2022-48194 - http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html
|
||
|
CVE-2022-48196 - https://www.bleepingcomputer.com/news/security/netgear-warns-users-to-patch-recently-fixed-wifi-router-bug/
|
||
|
CVE-2022-48197 - http://packetstormsecurity.com/files/171633/Yahoo-User-Interface-TreeView-2.8.2-Cross-Site-Scripting.html
|
||
|
CVE-2022-48199 - https://giuliamelottigaribaldi.com/cve-2022-48199/
|
||
|
CVE-2022-48216 - https://media.dedaub.com/uniswap-bug-bounty-1625d8ff04ae
|
||
|
CVE-2022-4824 - https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0
|
||
|
CVE-2022-4825 - https://wpscan.com/vulnerability/a2758983-d3a7-4718-b5b8-30169df6780a
|
||
|
CVE-2022-48251 - https://eshard.com/posts/sca-attacks-on-armv8
|
||
|
CVE-2022-48252 - https://github.com/jokob-sk/Pi.Alert/security/advisories/GHSA-vhg3-f6gv-j89r
|
||
|
CVE-2022-48253 - https://www.soteritsecurity.com/blog/2023/01/nostromo_from_directory_traversal_to_RCE.html
|
||
|
CVE-2022-4826 - https://wpscan.com/vulnerability/59fa32d2-aa66-4980-9ee5-0a7513f3a2b0
|
||
|
CVE-2022-4827 - https://wpscan.com/vulnerability/f2a922ac-6bc9-4caa-b1cc-9ca9cff4bd51
|
||
|
CVE-2022-4828 - https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948
|
||
|
CVE-2022-48281 - https://gitlab.com/libtiff/libtiff/-/issues/488
|
||
|
CVE-2022-4829 - https://wpscan.com/vulnerability/57e528ce-ec8c-4734-8903-926be36f91e7
|
||
|
CVE-2022-4830 - https://wpscan.com/vulnerability/ae103336-a411-4ebf-a5f0-2f35701e364c
|
||
|
CVE-2022-48303 - https://savannah.gnu.org/bugs/?62387
|
||
|
CVE-2022-48306 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-09.md
|
||
|
CVE-2022-48307 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md
|
||
|
CVE-2022-48308 - https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-14.md
|
||
|
CVE-2022-4831 - https://wpscan.com/vulnerability/872fc8e6-4035-4e5a-9f30-16c482c48c7c
|
||
|
CVE-2022-48311 - https://github.com/swzhouu/CVE-2022-48311
|
||
|
CVE-2022-4832 - https://wpscan.com/vulnerability/735a33e1-63fb-4f17-812c-3e68709b5c2c
|
||
|
CVE-2022-48323 - https://asec.ahnlab.com/en/47088/
|
||
|
CVE-2022-4833 - https://wpscan.com/vulnerability/35ba38cf-4f23-4344-8de3-cf3004ebf84c
|
||
|
CVE-2022-48331 - https://cyberintel.es/cve/CVE-2022-48331_Buffer_Overflow_in_Widevine_drm_save_keys_0x69b0/
|
||
|
CVE-2022-48332 - https://cyberintel.es/cve/CVE-2022-48332_Buffer_Overflow_in_Widevine_drm_save_keys_0x6a18/
|
||
|
CVE-2022-48333 - https://cyberintel.es/cve/CVE-2022-48333_Buffer_Overflow_in_Widevine_drm_verify_keys_0x730c/
|
||
|
CVE-2022-48334 - https://cyberintel.es/cve/CVE-2022-48334_Buffer_Overflow_in_Widevine_drm_verify_keys_0x7370/
|
||
|
CVE-2022-48335 - https://cyberintel.es/cve/CVE-2022-48335_Buffer_Overflow_in_Widevine_PRDiagVerifyProvisioning_0x5f90/
|
||
|
CVE-2022-48336 - https://cyberintel.es/cve/CVE-2022-48336_Buffer_Overflow_in_Widevine_PRDiagParseAndStoreData_0x5cc8/
|
||
|
CVE-2022-4834 - https://wpscan.com/vulnerability/6183318f-0230-47a1-87f2-3c5aaef678a5
|
||
|
CVE-2022-4835 - https://wpscan.com/vulnerability/23c22f46-19a2-4a1a-aaef-0a4007eda031
|
||
|
CVE-2022-4836 - https://wpscan.com/vulnerability/e9a228dc-d32e-4918-898d-4d7af4662a14
|
||
|
CVE-2022-4837 - https://wpscan.com/vulnerability/41abeacb-ef3e-4621-89bb-df0f2eb617da
|
||
|
CVE-2022-4838 - https://wpscan.com/vulnerability/9937e369-60e8-451c-8790-1a83a59115fc
|
||
|
CVE-2022-4839 - https://huntr.dev/bounties/ad954cab-f026-4895-8003-99f5e3b507ed
|
||
|
CVE-2022-4840 - https://huntr.dev/bounties/b42aa2e9-c783-464c-915c-a80cb464ee01
|
||
|
CVE-2022-4841 - https://huntr.dev/bounties/fa46b3ef-c621-443a-be3a-0a83fb78ba62
|
||
|
CVE-2022-4843 - https://huntr.dev/bounties/075b2760-66a0-4d38-b3b5-e9934956ab7f
|
||
|
CVE-2022-4844 - https://huntr.dev/bounties/8e8df1f4-07ab-4b75-aec8-75b1229e93a3
|
||
|
CVE-2022-4845 - https://huntr.dev/bounties/075dbd51-b078-436c-9e3d-7f25cd2e7e1b
|
||
|
CVE-2022-4846 - https://huntr.dev/bounties/38c685fc-7065-472d-a46e-e26bf0b556d3
|
||
|
CVE-2022-4847 - https://huntr.dev/bounties/ff6d4b5a-5e75-4a14-b5ce-f318f8613b73
|
||
|
CVE-2022-4848 - https://huntr.dev/bounties/25de88cc-8d0d-41a1-b069-9ef1327770bc
|
||
|
CVE-2022-48482 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
|
||
|
CVE-2022-48483 - https://medium.com/@frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88
|
||
|
CVE-2022-4849 - https://huntr.dev/bounties/404ce7dd-f345-4d98-ad80-c53ac74f4e5c
|
||
|
CVE-2022-4850 - https://huntr.dev/bounties/46dc4728-eacc-43f5-9831-c203fdbcc346
|
||
|
CVE-2022-48502 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
|
||
|
CVE-2022-48506 - https://dvsorder.org
|
||
|
CVE-2022-48506 - https://freedom-to-tinker.com/2023/06/14/security-analysis-of-the-dominion-imagecast-x/
|
||
|
CVE-2022-4851 - https://huntr.dev/bounties/e3cebc1a-1326-4a08-abad-0414a717fa0f
|
||
|
CVE-2022-48545 - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42092
|
||
|
CVE-2022-48547 - https://github.com/Cacti/cacti/issues/1882
|
||
|
CVE-2022-4855 - https://github.com/joinia/webray.com.cn/blob/main/lead-management-system/leadmanasql.md
|
||
|
CVE-2022-48554 - https://bugs.astron.com/view.php?id=310
|
||
|
CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/Modbus%20Slave%20(version%207.5.1%20and%20earlier)%20mbs%20file%20has%20a%20buffer%20overflow%20vulnerability.md
|
||
|
CVE-2022-4856 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Slave/poc/poc.mbs
|
||
|
CVE-2022-4856 - https://vuldb.com/?id.217021
|
||
|
CVE-2022-48560 - https://bugs.python.org/issue39421
|
||
|
CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/Modbus%20Poll%20(version%209.10.0%20and%20earlier)%20mbp%20file%20has%20a%20buffer%20overflow%20vulnerability.md
|
||
|
CVE-2022-4857 - https://github.com/Durian1546/vul/blob/main/webray.com.cn/Modbus%20Poll/poc/poc.mbp
|
||
|
CVE-2022-48579 - https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee
|
||
|
CVE-2022-48580 - https://www.securifera.com/advisories/cve-2022-48580/
|
||
|
CVE-2022-48581 - https://www.securifera.com/advisories/cve-2022-48581/
|
||
|
CVE-2022-48582 - https://www.securifera.com/advisories/cve-2022-48582/
|
||
|
CVE-2022-48583 - https://www.securifera.com/advisories/cve-2022-48583/
|
||
|
CVE-2022-48584 - https://www.securifera.com/advisories/cve-2022-48584/
|
||
|
CVE-2022-48585 - https://www.securifera.com/advisories/cve-2022-48585/
|
||
|
CVE-2022-48586 - https://www.securifera.com/advisories/cve-2022-48586/
|
||
|
CVE-2022-48587 - https://www.securifera.com/advisories/cve-2022-48587/
|
||
|
CVE-2022-48588 - https://www.securifera.com/advisories/cve-2022-48588/
|
||
|
CVE-2022-48589 - https://www.securifera.com/advisories/cve-2022-48589/
|
||
|
CVE-2022-48590 - https://www.securifera.com/advisories/cve-2022-48590/
|
||
|
CVE-2022-48591 - https://www.securifera.com/advisories/cve-2022-48591/
|
||
|
CVE-2022-48592 - https://www.securifera.com/advisories/cve-2022-48592/
|
||
|
CVE-2022-48593 - https://www.securifera.com/advisories/cve-2022-48593/
|
||
|
CVE-2022-48594 - https://www.securifera.com/advisories/cve-2022-48594/
|
||
|
CVE-2022-48595 - https://www.securifera.com/advisories/cve-2022-48595/
|
||
|
CVE-2022-48596 - https://www.securifera.com/advisories/cve-2022-48596/
|
||
|
CVE-2022-48597 - https://www.securifera.com/advisories/cve-2022-48597/
|
||
|
CVE-2022-48598 - https://www.securifera.com/advisories/cve-2022-48598/
|
||
|
CVE-2022-48599 - https://www.securifera.com/advisories/cve-2022-48599/
|
||
|
CVE-2022-48600 - https://www.securifera.com/advisories/cve-2022-48600/
|
||
|
CVE-2022-48601 - https://www.securifera.com/advisories/cve-2022-48601/
|
||
|
CVE-2022-48602 - https://www.securifera.com/advisories/cve-2022-48602/
|
||
|
CVE-2022-48603 - https://www.securifera.com/advisories/cve-2022-48603/
|
||
|
CVE-2022-48604 - https://www.securifera.com/advisories/cve-2022-48604/
|
||
|
CVE-2022-48612 - https://blog.zerdle.net/classlink/
|
||
|
CVE-2022-48615 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/
|
||
|
CVE-2022-48616 - https://wr3nchsr.github.io/huawei-netengine-ar617vw-auth-root-rce/
|
||
|
CVE-2022-48619 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10
|
||
|
CVE-2022-48622 - https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202
|
||
|
CVE-2022-4863 - https://huntr.dev/bounties/42751929-e511-49a9-888d-d5b610da2a45
|
||
|
CVE-2022-4864 - https://huntr.dev/bounties/b7140709-8f84-4f19-9463-78669fa2175b
|
||
|
CVE-2022-4865 - https://huntr.dev/bounties/cd8765a2-bf28-4019-8647-882ccf63b2be
|
||
|
CVE-2022-4866 - https://huntr.dev/bounties/39c04778-6228-4f07-bdd4-ab17f246dbff
|
||
|
CVE-2022-4867 - https://huntr.dev/bounties/c91364dd-9ead-4bf3-96e6-663a017e08fa
|
||
|
CVE-2022-4868 - https://huntr.dev/bounties/3a8f36ac-5eda-41e7-a9c4-e0f3d63e6e3b
|
||
|
CVE-2022-48682 - https://bugzilla.suse.com/show_bug.cgi?id=1200381
|
||
|
CVE-2022-4872 - https://wpscan.com/vulnerability/c76a1c0b-8a5b-4639-85b6-9eebc63c3aa6
|
||
|
CVE-2022-4882 - https://vuldb.com/?id.217664
|
||
|
CVE-2022-4888 - https://wpscan.com/vulnerability/2c2379d0-e373-4587-a747-429d7ee8f6cc
|
||
|
CVE-2022-4897 - https://wpscan.com/vulnerability/7b0eeafe-b9bc-43b2-8487-a23d3960f73f
|
||
|
CVE-2022-4944 - https://github.com/kalcaddle/KodExplorer/issues/512
|
||
|
CVE-2022-4944 - https://www.mediafire.com/file/709i2vxybergtg7/poc.zip/file
|
||
|
CVE-2022-4946 - https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0
|
||
|
CVE-2022-4953 - http://packetstormsecurity.com/files/174550/WordPress-Elementor-Iframe-Injection.html
|
||
|
CVE-2022-4953 - https://wpscan.com/vulnerability/8273357e-f9e1-44bc-8082-8faab838eda7
|
||
|
CVE-2022-4956 - https://heegong.github.io/posts/Advaned-Installer-Local-Privilege-Escalation-Vulnerability/
|
||
|
CVE-2022-4964 - https://bugs.launchpad.net/ubuntu/+source/pipewire/+bug/1995707/
|
||
|
CVE-2023-0005 - https://security.paloaltonetworks.com/CVE-2023-0005
|
||
|
CVE-2023-0012 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0013 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0014 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0015 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0016 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0017 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0018 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0019 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0020 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0021 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0022 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0024 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0025 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-0028 - https://huntr.dev/bounties/bfd935f4-2d1d-4d3f-8b59-522abe7dd065
|
||
|
CVE-2023-0029 - https://vuldb.com/?id.217169
|
||
|
CVE-2023-0045 - https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8
|
||
|
CVE-2023-0046 - https://huntr.dev/bounties/2214dc41-f283-4342-95b1-34a2f4fea943
|
||
|
CVE-2023-0048 - https://huntr.dev/bounties/57abd666-4b9c-4f59-825d-1ec832153e79
|
||
|
CVE-2023-0049 - https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9
|
||
|
CVE-2023-0051 - https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9
|
||
|
CVE-2023-0054 - https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d
|
||
|
CVE-2023-0055 - https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce
|
||
|
CVE-2023-0057 - https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d
|
||
|
CVE-2023-0099 - http://packetstormsecurity.com/files/176983/WordPress-Simple-URLs-Cross-Site-Scripting.html
|
||
|
CVE-2023-0106 - https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb
|
||
|
CVE-2023-0107 - https://huntr.dev/bounties/0b28fa57-acb0-47c8-ac48-962ff3898156
|
||
|
CVE-2023-0108 - https://huntr.dev/bounties/f66d33df-6588-4ab4-80a0-847451517944
|
||
|
CVE-2023-0111 - https://huntr.dev/bounties/70da256c-977a-487e-8a6a-9ae22caedbe3
|
||
|
CVE-2023-0112 - https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6
|
||
|
CVE-2023-0113 - https://vuldb.com/?id.217591
|
||
|
CVE-2023-0114 - https://vuldb.com/?id.217592
|
||
|
CVE-2023-0122 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168
|
||
|
CVE-2023-0125 - https://vuldb.com/?id.217717
|
||
|
CVE-2023-0155 - https://gitlab.com/gitlab-org/gitlab/-/issues/387638
|
||
|
CVE-2023-0160 - https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/
|
||
|
CVE-2023-0164 - https://fluidattacks.com/advisories/queen/
|
||
|
CVE-2023-0179 - http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
|
||
|
CVE-2023-0179 - https://seclists.org/oss-sec/2023/q1/20
|
||
|
CVE-2023-0210 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit
|
||
|
CVE-2023-0210 - https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/
|
||
|
CVE-2023-0210 - https://www.openwall.com/lists/oss-security/2023/01/04/1
|
||
|
CVE-2023-0214 - https://kcm.trellix.com/corporate/index?page=content&id=SB10393
|
||
|
CVE-2023-0221 - https://kcm.trellix.com/corporate/index?page=content&id=SB10370
|
||
|
CVE-2023-0227 - https://huntr.dev/bounties/af3101d7-fea6-463a-b7e4-a48be219e31b
|
||
|
CVE-2023-0236 - https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8
|
||
|
CVE-2023-0243 - https://github.com/yeyinshi/tuzicms/issues/12
|
||
|
CVE-2023-0244 - https://github.com/yeyinshi/tuzicms/issues/13
|
||
|
CVE-2023-0244 - https://vuldb.com/?id.218152
|
||
|
CVE-2023-0247 - https://huntr.dev/bounties/cab50e44-0995-4ac1-a5d5-889293b9704f
|
||
|
CVE-2023-0285 - https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348
|
||
|
CVE-2023-0288 - https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3
|
||
|
CVE-2023-0289 - https://huntr.dev/bounties/b9584c87-60e8-4a03-9e79-5f1e2d595361
|
||
|
CVE-2023-0291 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt
|
||
|
CVE-2023-0292 - https://packetstormsecurity.com/files/171011/wpqsm808-xsrf.txt
|
||
|
CVE-2023-0297 - http://packetstormsecurity.com/files/171096/pyLoad-js2py-Python-Execution.html
|
||
|
CVE-2023-0297 - http://packetstormsecurity.com/files/172914/PyLoad-0.5.0-Remote-Code-Execution.html
|
||
|
CVE-2023-0297 - https://huntr.dev/bounties/3fd606f7-83e1-4265-b083-2e1889a05e65
|
||
|
CVE-2023-0298 - https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed
|
||
|
CVE-2023-0299 - https://huntr.dev/bounties/0049774b-1857-46dc-a834-f1fb15138c53
|
||
|
CVE-2023-0300 - https://huntr.dev/bounties/0a91fec7-a76e-4ca3-80ba-81de1f10d59d
|
||
|
CVE-2023-0301 - https://huntr.dev/bounties/8a91e127-2903-4c6b-9a66-e4d2e30f8dec
|
||
|
CVE-2023-0302 - https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e
|
||
|
CVE-2023-0306 - https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde
|
||
|
CVE-2023-0307 - https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215
|
||
|
CVE-2023-0308 - https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69
|
||
|
CVE-2023-0309 - https://huntr.dev/bounties/c03c5925-43ff-450d-9827-2b65a3307ed6
|
||
|
CVE-2023-0310 - https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a
|
||
|
CVE-2023-0311 - https://huntr.dev/bounties/82b0b629-c56b-4651-af3f-17f749751857
|
||
|
CVE-2023-0312 - https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9
|
||
|
CVE-2023-0313 - https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256
|
||
|
CVE-2023-0314 - https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67
|
||
|
CVE-2023-0315 - http://packetstormsecurity.com/files/171108/Froxlor-2.0.6-Remote-Command-Execution.html
|
||
|
CVE-2023-0315 - http://packetstormsecurity.com/files/171729/Froxlor-2.0.3-Stable-Remote-Code-Execution.html
|
||
|
CVE-2023-0315 - https://huntr.dev/bounties/ff4e177b-ba48-4913-bbfa-ab8ce0db5943
|
||
|
CVE-2023-0316 - https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244
|
||
|
CVE-2023-0321 - https://www.hackplayers.com/2023/01/cve-2023-0321-info-sensible-campbell.html
|
||
|
CVE-2023-0323 - https://huntr.dev/bounties/129d6a4b-0504-4de1-a72c-3f12c4552343
|
||
|
CVE-2023-0324 - https://vuldb.com/?id.218426
|
||
|
CVE-2023-0326 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132
|
||
|
CVE-2023-0329 - http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html
|
||
|
CVE-2023-0332 - https://vuldb.com/?id.218472
|
||
|
CVE-2023-0341 - https://litios.github.io/2023/01/14/CVE-2023-0341.html
|
||
|
CVE-2023-0358 - https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355
|
||
|
CVE-2023-0386 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
||
|
CVE-2023-0386 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
|
||
|
CVE-2023-0391 - https://www.bleepingcomputer.com/news/security/cloudpanel-installations-use-the-same-ssl-certificate-private-key/
|
||
|
CVE-2023-0394 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
|
||
|
CVE-2023-0398 - https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58
|
||
|
CVE-2023-0400 - https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US
|
||
|
CVE-2023-0406 - https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c
|
||
|
CVE-2023-0410 - https://huntr.dev/bounties/2da583f0-7f66-4ba7-9bed-8e7229aa578e
|
||
|
CVE-2023-0419 - https://wpscan.com/vulnerability/5ccfee43-920d-4613-b976-2ea8966696ba
|
||
|
CVE-2023-0432 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-05
|
||
|
CVE-2023-0433 - http://seclists.org/fulldisclosure/2023/Mar/21
|
||
|
CVE-2023-0433 - https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
|
||
|
CVE-2023-0434 - https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4
|
||
|
CVE-2023-0435 - https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d
|
||
|
CVE-2023-0438 - https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3
|
||
|
CVE-2023-0440 - https://huntr.dev/bounties/208a096f-7986-4eed-8629-b7285348a686
|
||
|
CVE-2023-0448 - https://www.tenable.com/security/research/tra-2023-3
|
||
|
CVE-2023-0455 - http://packetstormsecurity.com/files/172674/Bumsys-Business-Management-System-1.0.3-beta-Shell-Upload.html
|
||
|
CVE-2023-0455 - https://huntr.dev/bounties/b5e9c578-1a33-4745-bf6b-e7cdb89793f7
|
||
|
CVE-2023-0461 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
|
||
|
CVE-2023-0470 - https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b
|
||
|
CVE-2023-0488 - https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a
|
||
|
CVE-2023-0491 - https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60
|
||
|
CVE-2023-0493 - http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html
|
||
|
CVE-2023-0493 - https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f
|
||
|
CVE-2023-0509 - https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839
|
||
|
CVE-2023-0512 - http://seclists.org/fulldisclosure/2023/Mar/21
|
||
|
CVE-2023-0512 - https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74
|
||
|
CVE-2023-0513 - https://vuldb.com/?id.219334
|
||
|
CVE-2023-0519 - https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129
|
||
|
CVE-2023-0527 - http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-0527 - https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md
|
||
|
CVE-2023-0528 - https://vuldb.com/?id.219597
|
||
|
CVE-2023-0531 - https://vuldb.com/?id.219600
|
||
|
CVE-2023-0532 - https://vuldb.com/?id.219601
|
||
|
CVE-2023-0533 - https://vuldb.com/?id.219602
|
||
|
CVE-2023-0549 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5
|
||
|
CVE-2023-0562 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md
|
||
|
CVE-2023-0563 - https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md
|
||
|
CVE-2023-0567 - https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4
|
||
|
CVE-2023-0569 - https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9
|
||
|
CVE-2023-0571 - https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md
|
||
|
CVE-2023-0571 - https://vuldb.com/?id.219730
|
||
|
CVE-2023-0587 - https://www.tenable.com/security/research/tra-2023-5
|
||
|
CVE-2023-0591 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
||
|
CVE-2023-0592 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
||
|
CVE-2023-0593 - https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
||
|
CVE-2023-0597 - http://www.openwall.com/lists/oss-security/2023/07/28/1
|
||
|
CVE-2023-0606 - https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b
|
||
|
CVE-2023-0608 - https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c
|
||
|
CVE-2023-0609 - https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0
|
||
|
CVE-2023-0610 - https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926
|
||
|
CVE-2023-0611 - https://vuldb.com/?id.219935
|
||
|
CVE-2023-0612 - https://vuldb.com/?id.219936
|
||
|
CVE-2023-0617 - https://vuldb.com/?id.219957
|
||
|
CVE-2023-0638 - https://vuldb.com/?id.220018
|
||
|
CVE-2023-0641 - https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md
|
||
|
CVE-2023-0642 - https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d
|
||
|
CVE-2023-0643 - https://huntr.dev/bounties/ea90f8b9-d8fe-4432-9a52-4d663400c52f
|
||
|
CVE-2023-0647 - https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md
|
||
|
CVE-2023-0650 - https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m
|
||
|
CVE-2023-0663 - https://vuldb.com/?id.220175
|
||
|
CVE-2023-0666 - https://gitlab.com/wireshark/wireshark/-/issues/19085
|
||
|
CVE-2023-0666 - https://takeonme.org/cves/CVE-2023-0666.html
|
||
|
CVE-2023-0667 - https://gitlab.com/wireshark/wireshark/-/issues/19086
|
||
|
CVE-2023-0667 - https://takeonme.org/cves/CVE-2023-0667.html
|
||
|
CVE-2023-0668 - https://gitlab.com/wireshark/wireshark/-/issues/19087
|
||
|
CVE-2023-0668 - https://takeonme.org/cves/CVE-2023-0668.html
|
||
|
CVE-2023-0669 - http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html
|
||
|
CVE-2023-0669 - https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis
|
||
|
CVE-2023-0669 - https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html
|
||
|
CVE-2023-0671 - https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de
|
||
|
CVE-2023-0673 - https://vuldb.com/?id.220195
|
||
|
CVE-2023-0674 - https://github.com/boyi0508/xxl-job-explain/blob/main/README.md
|
||
|
CVE-2023-0675 - https://www.youtube.com/watch?v=eoPuINHWjHo
|
||
|
CVE-2023-0676 - https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b
|
||
|
CVE-2023-0677 - https://huntr.dev/bounties/d280ae81-a1c9-4a50-9aa4-f98f1f9fd2c0
|
||
|
CVE-2023-0679 - https://vuldb.com/?id.220220
|
||
|
CVE-2023-0698 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693
|
||
|
CVE-2023-0732 - https://vuldb.com/?id.220369
|
||
|
CVE-2023-0734 - https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b
|
||
|
CVE-2023-0736 - https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e
|
||
|
CVE-2023-0738 - https://fluidattacks.com/advisories/eilish/
|
||
|
CVE-2023-0739 - https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae
|
||
|
CVE-2023-0740 - https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110
|
||
|
CVE-2023-0741 - https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809
|
||
|
CVE-2023-0742 - https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544
|
||
|
CVE-2023-0743 - https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863
|
||
|
CVE-2023-0744 - http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html
|
||
|
CVE-2023-0744 - https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434
|
||
|
CVE-2023-0747 - https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff
|
||
|
CVE-2023-0748 - https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86
|
||
|
CVE-2023-0756 - https://gitlab.com/gitlab-org/gitlab/-/issues/390910
|
||
|
CVE-2023-0758 - https://vuldb.com/?id.220469
|
||
|
CVE-2023-0759 - https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347
|
||
|
CVE-2023-0760 - https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
|
||
|
CVE-2023-0770 - https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
|
||
|
CVE-2023-0771 - https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1
|
||
|
CVE-2023-0774 - https://www.youtube.com/watch?v=s3oK5jebx_I
|
||
|
CVE-2023-0777 - http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html
|
||
|
CVE-2023-0777 - https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7
|
||
|
CVE-2023-0779 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549
|
||
|
CVE-2023-0780 - https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4
|
||
|
CVE-2023-0782 - https://github.com/jingping911/tendaAC23overflow/blob/main/README.md
|
||
|
CVE-2023-0783 - https://vuldb.com/?id.220641
|
||
|
CVE-2023-0784 - https://vuldb.com/?id.220644
|
||
|
CVE-2023-0787 - https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024
|
||
|
CVE-2023-0789 - https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5
|
||
|
CVE-2023-0790 - https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156
|
||
|
CVE-2023-0793 - https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9
|
||
|
CVE-2023-0794 - https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb
|
||
|
CVE-2023-0795 - https://gitlab.com/libtiff/libtiff/-/issues/493
|
||
|
CVE-2023-0796 - https://gitlab.com/libtiff/libtiff/-/issues/499
|
||
|
CVE-2023-0797 - https://gitlab.com/libtiff/libtiff/-/issues/495
|
||
|
CVE-2023-0798 - https://gitlab.com/libtiff/libtiff/-/issues/492
|
||
|
CVE-2023-0799 - https://gitlab.com/libtiff/libtiff/-/issues/494
|
||
|
CVE-2023-0800 - https://gitlab.com/libtiff/libtiff/-/issues/496
|
||
|
CVE-2023-0801 - https://gitlab.com/libtiff/libtiff/-/issues/498
|
||
|
CVE-2023-0802 - https://gitlab.com/libtiff/libtiff/-/issues/500
|
||
|
CVE-2023-0803 - https://gitlab.com/libtiff/libtiff/-/issues/501
|
||
|
CVE-2023-0804 - https://gitlab.com/libtiff/libtiff/-/issues/497
|
||
|
CVE-2023-0810 - https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68
|
||
|
CVE-2023-0817 - https://huntr.dev/bounties/cb730bc5-d79c-4de6-9e57-10e8c3ce2cf3
|
||
|
CVE-2023-0818 - https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a
|
||
|
CVE-2023-0819 - https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef
|
||
|
CVE-2023-0827 - https://huntr.dev/bounties/75bc7d07-46a7-4ed9-a405-af4fc47fb422
|
||
|
CVE-2023-0841 - https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3
|
||
|
CVE-2023-0848 - https://vuldb.com/?id.221147
|
||
|
CVE-2023-0860 - https://huntr.dev/bounties/64f3ab93-1357-4468-8ff4-52bbcec18cca
|
||
|
CVE-2023-0866 - https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f
|
||
|
CVE-2023-0877 - https://huntr.dev/bounties/b29cf038-06f1-4fb0-9437-08f2991f92a8
|
||
|
CVE-2023-0878 - https://huntr.dev/bounties/a892caf7-b8c2-4638-8cee-eb779d51066a
|
||
|
CVE-2023-0879 - https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541
|
||
|
CVE-2023-0880 - https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c
|
||
|
CVE-2023-0887 - https://vuldb.com/?id.221351
|
||
|
CVE-2023-0888 - https://www.bbraun.com/productsecurity
|
||
|
CVE-2023-0888 - https://www.bbraunusa.com/productsecurity
|
||
|
CVE-2023-0897 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-0901 - https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010
|
||
|
CVE-2023-0902 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Simple%20Food%20Ordering%20System%20-%20Authenticated%20Reflected%20XSS.md
|
||
|
CVE-2023-0903 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md
|
||
|
CVE-2023-0904 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md
|
||
|
CVE-2023-0905 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md
|
||
|
CVE-2023-0907 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0907
|
||
|
CVE-2023-0908 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908
|
||
|
CVE-2023-0912 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2023-0913 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md
|
||
|
CVE-2023-0914 - https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec
|
||
|
CVE-2023-0915 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md
|
||
|
CVE-2023-0916 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md
|
||
|
CVE-2023-0916 - https://vuldb.com/?id.221491
|
||
|
CVE-2023-0919 - https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f
|
||
|
CVE-2023-0938 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md
|
||
|
CVE-2023-0943 - https://vuldb.com/?id.221591
|
||
|
CVE-2023-0947 - https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496
|
||
|
CVE-2023-0949 - https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19
|
||
|
CVE-2023-0961 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md
|
||
|
CVE-2023-0962 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md
|
||
|
CVE-2023-0962 - https://vuldb.com/?id.221632
|
||
|
CVE-2023-0963 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md
|
||
|
CVE-2023-0964 - https://vuldb.com/?id.221634
|
||
|
CVE-2023-0975 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396
|
||
|
CVE-2023-0976 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398
|
||
|
CVE-2023-0977 - https://kcm.trellix.com/corporate/index?page=content&id=SB10396
|
||
|
CVE-2023-0978 - https://kcm.trellix.com/corporate/index?page=content&id=SB10397
|
||
|
CVE-2023-0994 - https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad
|
||
|
CVE-2023-0995 - https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f
|
||
|
CVE-2023-0999 - https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md
|
||
|
CVE-2023-0999 - https://vuldb.com/?id.221734
|
||
|
CVE-2023-1003 - https://github.com/typora/typora-issues/issues/5623
|
||
|
CVE-2023-1004 - https://github.com/marktext/marktext/issues/3575
|
||
|
CVE-2023-1005 - https://github.com/JP1016/Markdown-Electron/issues/3
|
||
|
CVE-2023-1006 - https://vuldb.com/?id.221739
|
||
|
CVE-2023-1007 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007
|
||
|
CVE-2023-1008 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1008
|
||
|
CVE-2023-1009 - https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md
|
||
|
CVE-2023-1010 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md
|
||
|
CVE-2023-1021 - https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3
|
||
|
CVE-2023-1030 - https://github.com/jidle123/bug_report/blob/main/vendors/winex01/Online%20Boat%20Reservation%20System/XSS-1.md#online-boat-reservation-system-v10-by-winex01-has-cross-site-scripting-reflected
|
||
|
CVE-2023-1031 - https://fluidattacks.com/advisories/napoli
|
||
|
CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6024-1
|
||
|
CVE-2023-1032 - https://ubuntu.com/security/notices/USN-6033-1
|
||
|
CVE-2023-1033 - https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387
|
||
|
CVE-2023-1034 - https://huntr.dev/bounties/0c1365bc-8d9a-4ae0-8b55-615d492b3730
|
||
|
CVE-2023-1036 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/XSS-1.md
|
||
|
CVE-2023-1037 - https://github.com/nightcloudos/bug_report/blob/main/vendors/jkev/Dental%20Clinic%20Appointment%20Reservation%20System/SQLi-1.md
|
||
|
CVE-2023-1037 - https://vuldb.com/?id.221795
|
||
|
CVE-2023-1044 - https://vuldb.com/?id.221803
|
||
|
CVE-2023-1063 - https://vuldb.com/?id.221827
|
||
|
CVE-2023-1067 - https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045
|
||
|
CVE-2023-1070 - https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c
|
||
|
CVE-2023-1090 - https://github.com/youki992/youki992.github.io/blob/master/others/apply.md
|
||
|
CVE-2023-1094 - https://fluidattacks.com/advisories/napoli
|
||
|
CVE-2023-1103 - https://huntr.dev/bounties/4c5a8af6-3078-4180-bb30-33b57a5540e6
|
||
|
CVE-2023-1104 - https://huntr.dev/bounties/a4909b4e-ab3c-41d6-b0d8-1c6e933bf758
|
||
|
CVE-2023-1105 - https://huntr.dev/bounties/4089a63f-cffd-42f3-b8d8-e80b6bd9c80f
|
||
|
CVE-2023-1106 - https://huntr.dev/bounties/1288ec00-f69d-4b84-abce-efc9a97941a0
|
||
|
CVE-2023-1107 - https://huntr.dev/bounties/4b880868-bd28-4fd0-af56-7686e55d3762
|
||
|
CVE-2023-1115 - https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17
|
||
|
CVE-2023-1116 - https://huntr.dev/bounties/3245ff99-9adf-4db9-af94-f995747e09d1
|
||
|
CVE-2023-1127 - https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb
|
||
|
CVE-2023-1131 - https://vuldb.com/?id.222106
|
||
|
CVE-2023-1133 - http://packetstormsecurity.com/files/172799/Delta-Electronics-InfraSuite-Device-Master-Deserialization.html
|
||
|
CVE-2023-1146 - https://huntr.dev/bounties/d6d1e1e2-2f67-4d28-aa84-b30fb1d2e737
|
||
|
CVE-2023-1147 - https://huntr.dev/bounties/187f5353-f866-4d26-a5ba-fca378520020
|
||
|
CVE-2023-1148 - https://huntr.dev/bounties/f0cc2c4b-fdf9-483b-9a83-4e0dfeb4dac7
|
||
|
CVE-2023-1149 - https://huntr.dev/bounties/2e734209-d7b0-4f57-a8be-c65c82208f2f
|
||
|
CVE-2023-1151 - https://vuldb.com/?id.222163
|
||
|
CVE-2023-1157 - https://github.com/10cksYiqiyinHangzhouTechnology/elf-parser_segments_poc
|
||
|
CVE-2023-1160 - https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87
|
||
|
CVE-2023-1162 - https://github.com/xxy1126/Vuln/blob/main/Draytek/2.md
|
||
|
CVE-2023-1163 - https://github.com/xxy1126/Vuln/blob/main/Draytek/3.md
|
||
|
CVE-2023-1163 - https://vuldb.com/?id.222259
|
||
|
CVE-2023-1164 - https://github.com/i900008/vulndb/blob/main/kylin-activation_vuln.md
|
||
|
CVE-2023-1170 - https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4
|
||
|
CVE-2023-1175 - https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
|
||
|
CVE-2023-1176 - https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085
|
||
|
CVE-2023-1177 - https://huntr.dev/bounties/1fe8f21a-c438-4cba-9add-e8a5dab94e28
|
||
|
CVE-2023-1178 - https://gitlab.com/gitlab-org/gitlab/-/issues/381815
|
||
|
CVE-2023-1181 - https://huntr.dev/bounties/f5cb8816-fc12-4282-9571-81f25670e04a
|
||
|
CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2023/12/28/4
|
||
|
CVE-2023-1183 - http://www.openwall.com/lists/oss-security/2024/01/03/4
|
||
|
CVE-2023-1186 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1186
|
||
|
CVE-2023-1187 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1187
|
||
|
CVE-2023-1188 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1188
|
||
|
CVE-2023-1189 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1189
|
||
|
CVE-2023-1189 - https://vuldb.com/?id.222361
|
||
|
CVE-2023-1190 - https://github.com/10cksYiqiyinHangzhouTechnology/imageinfo_poc
|
||
|
CVE-2023-1190 - https://github.com/xiaozhuai/imageinfo/issues/1
|
||
|
CVE-2023-1197 - https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26
|
||
|
CVE-2023-1200 - https://vuldb.com/?id.222388
|
||
|
CVE-2023-1211 - https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd
|
||
|
CVE-2023-1212 - https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499
|
||
|
CVE-2023-1219 - http://packetstormsecurity.com/files/171795/Chrome-base-debug-ActivityUserData-ActivityUserData-Heap-Buffer-Overflow.html
|
||
|
CVE-2023-1220 - http://packetstormsecurity.com/files/171796/Chrome-base-SampleVectorBase-MoveSingleSampleToCounts-Heap-Buffer-Overflow.html
|
||
|
CVE-2023-1238 - https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d
|
||
|
CVE-2023-1239 - https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8
|
||
|
CVE-2023-1241 - https://huntr.dev/bounties/e0e9b1bb-3025-4b9f-acb4-16a5da28aa3c
|
||
|
CVE-2023-1242 - https://huntr.dev/bounties/71c24c5e-ceb2-45cf-bda7-fa195d37e289
|
||
|
CVE-2023-1243 - https://huntr.dev/bounties/1d62d35a-b096-4b76-a021-347c3f1c570c
|
||
|
CVE-2023-1244 - https://huntr.dev/bounties/bcab9555-8a35-42b2-a7de-0a79fd710b52
|
||
|
CVE-2023-1245 - https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004
|
||
|
CVE-2023-1247 - https://huntr.dev/bounties/04447124-c7d4-477f-8364-91fe5b59cda0
|
||
|
CVE-2023-1249 - http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
|
||
|
CVE-2023-1258 - http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html
|
||
|
CVE-2023-1264 - https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815
|
||
|
CVE-2023-1265 - https://gitlab.com/gitlab-org/gitlab/-/issues/394960
|
||
|
CVE-2023-1270 - https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b
|
||
|
CVE-2023-1277 - https://github.com/cn-lwj/vuldb/blob/master/kylin-system-updater_vuln.md
|
||
|
CVE-2023-1277 - https://vuldb.com/?id.222600
|
||
|
CVE-2023-1281 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
|
||
|
CVE-2023-1282 - https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a
|
||
|
CVE-2023-1283 - https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8
|
||
|
CVE-2023-1286 - https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c
|
||
|
CVE-2023-1289 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
|
||
|
CVE-2023-1304 - https://docs.divvycloud.com/changelog/23321-release-notes
|
||
|
CVE-2023-1305 - https://docs.divvycloud.com/changelog/23321-release-notes
|
||
|
CVE-2023-1306 - https://docs.divvycloud.com/changelog/23321-release-notes
|
||
|
CVE-2023-1307 - https://huntr.dev/bounties/5fe85af4-a667-41a9-a00d-f99e07c5e2f1
|
||
|
CVE-2023-1311 - https://vuldb.com/?id.222699
|
||
|
CVE-2023-1312 - https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356
|
||
|
CVE-2023-1313 - https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61
|
||
|
CVE-2023-1315 - https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e
|
||
|
CVE-2023-1316 - https://huntr.dev/bounties/c6353bab-c382-47f6-937b-56d253f2e8d3
|
||
|
CVE-2023-1317 - https://huntr.dev/bounties/c3e27af2-358b-490b-9baf-e451663e4e5f
|
||
|
CVE-2023-1318 - https://huntr.dev/bounties/e58b38e0-4897-4bb0-84e8-a7ad8efab338
|
||
|
CVE-2023-1319 - https://huntr.dev/bounties/a822067a-d90d-4c3e-b9ef-9b2a5c2bc97f
|
||
|
CVE-2023-1320 - https://huntr.dev/bounties/c2bb34ac-452d-4624-a1b9-c5b54f52f0cd
|
||
|
CVE-2023-1326 - https://github.com/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb
|
||
|
CVE-2023-1349 - https://vuldb.com/?id.222842
|
||
|
CVE-2023-1350 - https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59
|
||
|
CVE-2023-1353 - https://vuldb.com/?id.222852
|
||
|
CVE-2023-1355 - https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9
|
||
|
CVE-2023-1361 - https://huntr.dev/bounties/1b1dbc5a-df16-421f-9a0d-de83e43146c4
|
||
|
CVE-2023-1362 - https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac
|
||
|
CVE-2023-1367 - https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2
|
||
|
CVE-2023-1369 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369
|
||
|
CVE-2023-1370 - https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/
|
||
|
CVE-2023-1372 - https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/
|
||
|
CVE-2023-1374 - https://danielkelley.me/solidres-hotel-booking-plugin-for-wordpress-post-based-xss-vulnerability-in-add-new-currency-feature/
|
||
|
CVE-2023-1380 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
||
|
CVE-2023-1380 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
||
|
CVE-2023-1381 - https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/
|
||
|
CVE-2023-1383 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
|
||
|
CVE-2023-1384 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
|
||
|
CVE-2023-1385 - https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
|
||
|
CVE-2023-1387 - https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j
|
||
|
CVE-2023-1388 - https://kcm.trellix.com/corporate/index?page=content&id=SB10398
|
||
|
CVE-2023-1389 - http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html
|
||
|
CVE-2023-1389 - https://www.tenable.com/security/research/tra-2023-11
|
||
|
CVE-2023-1390 - https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5
|
||
|
CVE-2023-1391 - https://blog.csdn.net/Dwayne_Wade/article/details/129526901
|
||
|
CVE-2023-1394 - https://blog.csdn.net/Dwayne_Wade/article/details/129522869
|
||
|
CVE-2023-1395 - https://blog.csdn.net/Dwayne_Wade/article/details/129496689
|
||
|
CVE-2023-1396 - https://blog.csdn.net/Dwayne_Wade/article/details/129524104
|
||
|
CVE-2023-1410 - https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76
|
||
|
CVE-2023-1421 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1429 - https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f
|
||
|
CVE-2023-1436 - https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/
|
||
|
CVE-2023-1442 - https://vuldb.com/?id.223287
|
||
|
CVE-2023-1443 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443
|
||
|
CVE-2023-1444 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444
|
||
|
CVE-2023-1445 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1445
|
||
|
CVE-2023-1446 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446
|
||
|
CVE-2023-1448 - https://github.com/gpac/gpac/issues/2388
|
||
|
CVE-2023-1449 - https://github.com/gpac/gpac/issues/2387
|
||
|
CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc
|
||
|
CVE-2023-1450 - https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16
|
||
|
CVE-2023-1450 - https://vuldb.com/?id.223295
|
||
|
CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc
|
||
|
CVE-2023-1451 - https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8
|
||
|
CVE-2023-1452 - https://github.com/gpac/gpac/issues/2386
|
||
|
CVE-2023-1453 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1453
|
||
|
CVE-2023-1459 - https://vuldb.com/?id.223304
|
||
|
CVE-2023-1460 - https://vuldb.com/?id.223305
|
||
|
CVE-2023-1463 - https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6
|
||
|
CVE-2023-1486 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1486
|
||
|
CVE-2023-1487 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1487
|
||
|
CVE-2023-1487 - https://vuldb.com/?id.223373
|
||
|
CVE-2023-1488 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1488
|
||
|
CVE-2023-1489 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1489
|
||
|
CVE-2023-1490 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1490
|
||
|
CVE-2023-1491 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491
|
||
|
CVE-2023-1492 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1492
|
||
|
CVE-2023-1493 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1493
|
||
|
CVE-2023-1494 - https://gitee.com/cui-yiwei/cve-number/blob/master/images/IBOS%20oa%20v4.5.5.md/1.md
|
||
|
CVE-2023-1496 - https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2
|
||
|
CVE-2023-1515 - https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282
|
||
|
CVE-2023-1517 - https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d
|
||
|
CVE-2023-1523 - https://marc.info/?l=oss-security&m=167879021709955&w=2
|
||
|
CVE-2023-1527 - https://huntr.dev/bounties/f0272a31-9944-4545-8428-a26154d20348
|
||
|
CVE-2023-1531 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1724
|
||
|
CVE-2023-1532 - http://packetstormsecurity.com/files/171959/Chrome-media-mojom-VideoFrame-Missing-Validation.html
|
||
|
CVE-2023-1534 - http://packetstormsecurity.com/files/171961/Chrome-GL_ShaderBinary-Untrusted-Process-Exposure.html
|
||
|
CVE-2023-1534 - http://packetstormsecurity.com/files/171965/Chrome-SpvGetMappedSamplerName-Out-Of-Bounds-String-Copy.html
|
||
|
CVE-2023-1535 - https://huntr.dev/bounties/4d4b0caa-6d8c-4574-ae7e-e9ef5e2e1a40
|
||
|
CVE-2023-1536 - https://huntr.dev/bounties/538207f4-f805-419a-a314-51716643f05e
|
||
|
CVE-2023-1537 - https://huntr.dev/bounties/171cde18-a447-446c-a9ab-297953ad9b86
|
||
|
CVE-2023-1538 - https://huntr.dev/bounties/ac0271eb-660f-4966-8b57-4bc660a9a1a0
|
||
|
CVE-2023-1539 - https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28
|
||
|
CVE-2023-1540 - https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4
|
||
|
CVE-2023-1541 - https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92
|
||
|
CVE-2023-1542 - https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f
|
||
|
CVE-2023-1543 - https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683
|
||
|
CVE-2023-1545 - https://huntr.dev/bounties/942c015f-7486-49b1-94ae-b1538d812bc2
|
||
|
CVE-2023-1546 - https://wpscan.com/vulnerability/bb065397-370f-4ee1-a2c8-20e4dc4415a0
|
||
|
CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF
|
||
|
CVE-2023-1560 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/id8
|
||
|
CVE-2023-1560 - https://vuldb.com/?id.223553
|
||
|
CVE-2023-1562 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1568 - https://vuldb.com/?id.223560
|
||
|
CVE-2023-1570 - https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1
|
||
|
CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/28
|
||
|
CVE-2023-1570 - https://github.com/syoyo/tinydng/issues/29
|
||
|
CVE-2023-1571 - https://vuldb.com/?id.223563
|
||
|
CVE-2023-1576 - https://sourceforge.net/p/p7zip/bugs/241/
|
||
|
CVE-2023-1578 - https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e
|
||
|
CVE-2023-1579 - https://sourceware.org/bugzilla/show_bug.cgi?id=29988
|
||
|
CVE-2023-1585 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2023-1586 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2023-1587 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2023-1590 - https://blog.csdn.net/weixin_43864034/article/details/129730106
|
||
|
CVE-2023-1594 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf
|
||
|
CVE-2023-1594 - https://vuldb.com/?id.223662
|
||
|
CVE-2023-1595 - https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md
|
||
|
CVE-2023-1605 - https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2
|
||
|
CVE-2023-1606 - https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf
|
||
|
CVE-2023-1616 - https://vuldb.com/?id.223800
|
||
|
CVE-2023-1621 - https://gitlab.com/gitlab-org/gitlab/-/issues/399774
|
||
|
CVE-2023-1629 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629
|
||
|
CVE-2023-1630 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630
|
||
|
CVE-2023-1631 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1631
|
||
|
CVE-2023-1634 - https://github.com/BigTiger2020/2023-1/blob/main/ssrf/ssrf.md
|
||
|
CVE-2023-1634 - https://vuldb.com/?id.224016
|
||
|
CVE-2023-1635 - https://github.com/BigTiger2020/2023/blob/main/XSS.md
|
||
|
CVE-2023-1637 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
|
||
|
CVE-2023-1638 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638
|
||
|
CVE-2023-1639 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639
|
||
|
CVE-2023-1640 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640
|
||
|
CVE-2023-1641 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641
|
||
|
CVE-2023-1642 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642
|
||
|
CVE-2023-1643 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643
|
||
|
CVE-2023-1644 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644
|
||
|
CVE-2023-1645 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645
|
||
|
CVE-2023-1646 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646
|
||
|
CVE-2023-1647 - https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6
|
||
|
CVE-2023-1648 - https://gitlab.com/gitlab-org/gitlab/-/issues/388132
|
||
|
CVE-2023-1654 - https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14
|
||
|
CVE-2023-1655 - https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9
|
||
|
CVE-2023-1665 - https://huntr.dev/bounties/db8fcbab-6ef0-44ba-b5c6-3b0f17ca22a2
|
||
|
CVE-2023-1671 - http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html
|
||
|
CVE-2023-1674 - https://vuldb.com/?id.224231
|
||
|
CVE-2023-1676 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676
|
||
|
CVE-2023-1677 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677
|
||
|
CVE-2023-1678 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678
|
||
|
CVE-2023-1679 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679
|
||
|
CVE-2023-1685 - https://vuldb.com/?id.224242
|
||
|
CVE-2023-1687 - https://vuldb.com/?id.224244
|
||
|
CVE-2023-1701 - https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256
|
||
|
CVE-2023-1702 - https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19
|
||
|
CVE-2023-1704 - https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f
|
||
|
CVE-2023-1708 - https://gitlab.com/gitlab-org/gitlab/-/issues/387185
|
||
|
CVE-2023-1712 - https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829
|
||
|
CVE-2023-1713 - https://starlabs.sg/advisories/23/23-1713/
|
||
|
CVE-2023-1714 - https://starlabs.sg/advisories/23/23-1714/
|
||
|
CVE-2023-1715 - https://starlabs.sg/advisories/23/23-1715/
|
||
|
CVE-2023-1717 - https://starlabs.sg/advisories/23/23-1717/
|
||
|
CVE-2023-1718 - https://starlabs.sg/advisories/23/23-1718/
|
||
|
CVE-2023-1719 - https://starlabs.sg/advisories/23/23-1719/
|
||
|
CVE-2023-1720 - https://starlabs.sg/advisories/23/23-1720/
|
||
|
CVE-2023-1721 - https://fluidattacks.com/advisories/blessd/
|
||
|
CVE-2023-1722 - https://fluidattacks.com/advisories/wyckoff/
|
||
|
CVE-2023-1729 - https://github.com/LibRaw/LibRaw/issues/557
|
||
|
CVE-2023-1741 - https://vuldb.com/?id.224629
|
||
|
CVE-2023-1742 - https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md
|
||
|
CVE-2023-1745 - https://github.com/10cksYiqiyinHangzhouTechnology/KMPlayer_Poc
|
||
|
CVE-2023-1745 - https://youtu.be/7bh2BQOqxFo
|
||
|
CVE-2023-1754 - https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28
|
||
|
CVE-2023-1755 - https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a
|
||
|
CVE-2023-1756 - https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9
|
||
|
CVE-2023-1757 - https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c
|
||
|
CVE-2023-1758 - https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c
|
||
|
CVE-2023-1759 - https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1
|
||
|
CVE-2023-1760 - https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5
|
||
|
CVE-2023-1762 - https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a
|
||
|
CVE-2023-1767 - https://weizman.github.io/2023/04/10/snyk-xss/
|
||
|
CVE-2023-1774 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1775 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1776 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1777 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1780 - https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3
|
||
|
CVE-2023-1783 - https://fluidattacks.com/advisories/stirling/
|
||
|
CVE-2023-1788 - https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2
|
||
|
CVE-2023-1789 - https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d
|
||
|
CVE-2023-1798 - https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md
|
||
|
CVE-2023-1826 - http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html
|
||
|
CVE-2023-1829 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
|
||
|
CVE-2023-1831 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-1836 - https://gitlab.com/gitlab-org/gitlab/-/issues/404613
|
||
|
CVE-2023-1841 - https://https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-1850 - https://vuldb.com/?id.224990
|
||
|
CVE-2023-1856 - https://vuldb.com/?id.224995
|
||
|
CVE-2023-1872 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
||
|
CVE-2023-1874 - http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html
|
||
|
CVE-2023-1875 - https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61
|
||
|
CVE-2023-1876 - https://huntr.dev/bounties/15b06488-5849-47ce-aaf4-81d4c3c202e2
|
||
|
CVE-2023-1877 - https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55
|
||
|
CVE-2023-1878 - https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc
|
||
|
CVE-2023-1879 - https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334
|
||
|
CVE-2023-1880 - https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e
|
||
|
CVE-2023-1881 - https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344
|
||
|
CVE-2023-1882 - https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957
|
||
|
CVE-2023-1883 - https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191
|
||
|
CVE-2023-1884 - https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e
|
||
|
CVE-2023-1887 - https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1
|
||
|
CVE-2023-1890 - http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html
|
||
|
CVE-2023-1891 - https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828
|
||
|
CVE-2023-1892 - https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777
|
||
|
CVE-2023-1893 - http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html
|
||
|
CVE-2023-1893 - https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7
|
||
|
CVE-2023-1900 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2023-1903 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-1906 - https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247
|
||
|
CVE-2023-1912 - http://packetstormsecurity.com/files/171824/WordPress-Limit-Login-Attempts-1.7.1-Cross-Site-Scripting.html
|
||
|
CVE-2023-1916 - https://gitlab.com/libtiff/libtiff/-/issues/537
|
||
|
CVE-2023-1934 - http://packetstormsecurity.com/files/172511/PnPSCADA-2.x-SQL-Injection.html
|
||
|
CVE-2023-1936 - https://gitlab.com/gitlab-org/gitlab/-/issues/405150
|
||
|
CVE-2023-1947 - https://gitee.com/misak7in/cve/blob/master/taocms.md
|
||
|
CVE-2023-1956 - https://vuldb.com/?id.225343
|
||
|
CVE-2023-1960 - https://vuldb.com/?id.225347
|
||
|
CVE-2023-1965 - https://gitlab.com/gitlab-org/gitlab/-/issues/406235
|
||
|
CVE-2023-1974 - https://huntr.dev/bounties/852781c6-9cc8-4d25-9336-bf3cb8ee3439
|
||
|
CVE-2023-1985 - https://vuldb.com/?id.225533
|
||
|
CVE-2023-1988 - https://vuldb.com/?id.225536
|
||
|
CVE-2023-1998 - https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
|
||
|
CVE-2023-20009 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8
|
||
|
CVE-2023-2002 - https://www.openwall.com/lists/oss-security/2023/04/16/3
|
||
|
CVE-2023-20024 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20025 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
|
||
|
CVE-2023-20026 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
|
||
|
CVE-2023-2003 - https://www.hackplayers.com/2023/07/vulnerabilidad-vision1210-unitronics.html
|
||
|
CVE-2023-20032 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-q8DThCy
|
||
|
CVE-2023-2004 - https://bugzilla.redhat.com/show_bug.cgi?id=2186428
|
||
|
CVE-2023-20046 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j7p3-gjw6-pp4r
|
||
|
CVE-2023-20046 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h
|
||
|
CVE-2023-20065 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qrpq-fp26-7v9r
|
||
|
CVE-2023-20065 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-priv-escalate-Xg8zkyPk
|
||
|
CVE-2023-20075 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-privesc-9DVkFpJ8
|
||
|
CVE-2023-20098 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-5j43-q336-92ch
|
||
|
CVE-2023-20116 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-dos-4Ag3yWbD
|
||
|
CVE-2023-20118 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
|
||
|
CVE-2023-2014 - https://huntr.dev/bounties/a77bf7ed-6b61-452e-b5ee-e20017e28d1a
|
||
|
CVE-2023-20156 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20157 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20158 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20159 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20160 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20161 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20162 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-2017 - https://starlabs.sg/advisories/23/23-2017/
|
||
|
CVE-2023-20178 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw
|
||
|
CVE-2023-20189 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv
|
||
|
CVE-2023-20197 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-rNwNEEee
|
||
|
CVE-2023-20198 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-20198 - https://www.darkreading.com/vulnerabilities-threats/critical-unpatched-cisco-zero-day-bug-active-exploit
|
||
|
CVE-2023-20209 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-injection-X475EbTQ
|
||
|
CVE-2023-2021 - https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0
|
||
|
CVE-2023-20211 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-injection-g6MbwH2
|
||
|
CVE-2023-20217 - http://packetstormsecurity.com/files/174232/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Read.html
|
||
|
CVE-2023-20217 - http://seclists.org/fulldisclosure/2023/Aug/19
|
||
|
CVE-2023-2022 - https://gitlab.com/gitlab-org/gitlab/-/issues/407166
|
||
|
CVE-2023-20224 - http://packetstormsecurity.com/files/174233/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Privilege-Escalation.html
|
||
|
CVE-2023-20224 - http://seclists.org/fulldisclosure/2023/Aug/20
|
||
|
CVE-2023-20235 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn
|
||
|
CVE-2023-20273 - http://packetstormsecurity.com/files/175674/Cisco-IOX-XE-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-2029 - http://packetstormsecurity.com/files/173729/WordPress-PrePost-SEO-3.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-2034 - https://huntr.dev/bounties/aba6beaa-570e-4523-8128-da4d8e374ef6
|
||
|
CVE-2023-2035 - https://vuldb.com/?id.225913
|
||
|
CVE-2023-2036 - https://vuldb.com/?id.225914
|
||
|
CVE-2023-2037 - https://vuldb.com/?id.225915
|
||
|
CVE-2023-2042 - https://vuldb.com/?id.225920
|
||
|
CVE-2023-2050 - https://github.com/E1CHO/cve_hub/blob/main/Advanced%20Online%20Voting%20System/Advanced%20Online%20Voting%20System%20-%20vuln%204.pdf
|
||
|
CVE-2023-2051 - https://vuldb.com/?id.225936
|
||
|
CVE-2023-2054 - https://vuldb.com/?id.225939
|
||
|
CVE-2023-2055 - https://vuldb.com/?id.225940
|
||
|
CVE-2023-20569 - https://comsec.ethz.ch/research/microarch/inception/
|
||
|
CVE-2023-2057 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS1.md
|
||
|
CVE-2023-2057 - https://vuldb.com/?id.225942
|
||
|
CVE-2023-2058 - https://github.com/sleepyvv/vul_report/blob/main/EYOUCMS/XSS2.md
|
||
|
CVE-2023-2058 - https://vuldb.com/?id.225943
|
||
|
CVE-2023-20593 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-20593 - http://www.openwall.com/lists/oss-security/2023/07/24/3
|
||
|
CVE-2023-2068 - http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html
|
||
|
CVE-2023-2069 - https://gitlab.com/gitlab-org/gitlab/-/issues/407374
|
||
|
CVE-2023-2074 - https://github.com/E1CHO/cve_hub/blob/main/Online%20Traffic%20Offense%20Management%20System/Online%20Traffic%20Offense%20Management%20System%20-%20vuln%202.pdf
|
||
|
CVE-2023-2074 - https://vuldb.com/?id.226052
|
||
|
CVE-2023-20854 - https://www.vmware.com/security/advisories/VMSA-2023-0003.html
|
||
|
CVE-2023-20857 - http://packetstormsecurity.com/files/171158/VMware-Security-Advisory-2023-0006.html
|
||
|
CVE-2023-20887 - http://packetstormsecurity.com/files/173761/VMWare-Aria-Operations-For-Networks-Remote-Command-Execution.html
|
||
|
CVE-2023-2089 - https://vuldb.com/?id.226097
|
||
|
CVE-2023-20891 - https://www.vmware.com/security/advisories/VMSA-2023-0016.html
|
||
|
CVE-2023-20894 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658
|
||
|
CVE-2023-20895 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740
|
||
|
CVE-2023-20902 - https://github.com/goharbor/harbor/security/advisories/GHSA-mq6f-5xh5-hgcf
|
||
|
CVE-2023-20928 - http://packetstormsecurity.com/files/170855/Android-Binder-VMA-Management-Security-Issues.html
|
||
|
CVE-2023-20937 - http://packetstormsecurity.com/files/171239/Android-GKI-Kernels-Contain-Broken-Non-Upstream-Speculative-Page-Faults-MM-Code.html
|
||
|
CVE-2023-2097 - https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%206.pdf
|
||
|
CVE-2023-2102 - https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44
|
||
|
CVE-2023-2103 - https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc
|
||
|
CVE-2023-2105 - https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1
|
||
|
CVE-2023-2107 - https://vuldb.com/?id.226110
|
||
|
CVE-2023-2109 - https://huntr.dev/bounties/fd5999fd-b1fd-44b4-ae2e-8f95b5c3d1b6
|
||
|
CVE-2023-2110 - https://starlabs.sg/advisories/23/23-2110/
|
||
|
CVE-2023-2123 - https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin
|
||
|
CVE-2023-21238 - https://android.googlesource.com/platform/frameworks/base/+/91bfcbbd87886049778142618a655352b16cd911
|
||
|
CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/3a448067ac9ebdf669951e90678c2daa592a81d3
|
||
|
CVE-2023-21244 - https://android.googlesource.com/platform/frameworks/base/+/5a3d0c131175d923cf35c7beb3ee77a9e6485dad
|
||
|
CVE-2023-21255 - https://android.googlesource.com/kernel/common/+/1ca1130ec62d
|
||
|
CVE-2023-21274 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/2bffd7f5e66dd0cf7e5668fb65c4f2b2e9f87cf7
|
||
|
CVE-2023-21282 - https://android.googlesource.com/platform/external/aac/+/4242f97d149b0bf0cd96f00cd1e9d30d5922cd46
|
||
|
CVE-2023-21285 - https://android.googlesource.com/platform/frameworks/base/+/0c3b7ec3377e7fb645ec366be3be96bb1a252ca1
|
||
|
CVE-2023-21292 - https://android.googlesource.com/platform/frameworks/base/+/d10b27e539f7bc91c2360d429b9d05f05274670d
|
||
|
CVE-2023-2138 - https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6
|
||
|
CVE-2023-21400 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-2150 - https://youtu.be/o46oHLvY2-E
|
||
|
CVE-2023-2152 - https://vuldb.com/?id.226273
|
||
|
CVE-2023-21521 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406
|
||
|
CVE-2023-21522 - https://support.blackberry.com/kb/articleDetail?articleNumber=000112406
|
||
|
CVE-2023-2154 - https://youtu.be/teK82KkWtdA
|
||
|
CVE-2023-2156 - http://www.openwall.com/lists/oss-security/2023/05/19/1
|
||
|
CVE-2023-2160 - https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b
|
||
|
CVE-2023-2164 - https://gitlab.com/gitlab-org/gitlab/-/issues/407783
|
||
|
CVE-2023-21665 - http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html
|
||
|
CVE-2023-21666 - http://packetstormsecurity.com/files/172664/Qualcomm-Adreno-KGSL-Data-Leakage.html
|
||
|
CVE-2023-21670 - http://packetstormsecurity.com/files/173296/Qualcomm-Adreno-KGSL-Insecure-Execution.html
|
||
|
CVE-2023-21675 - http://packetstormsecurity.com/files/170852/Windows-Kernel-Registry-Virtualization-Memory-Corruption.html
|
||
|
CVE-2023-21747 - http://packetstormsecurity.com/files/170933/Windows-Kernel-Dangling-Registry-Link-Node-Use-After-Free.html
|
||
|
CVE-2023-21748 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
||
|
CVE-2023-21748 - http://packetstormsecurity.com/files/170949/Windows-Kernel-Registry-Virtualization-Incompatibility.html
|
||
|
CVE-2023-21749 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html
|
||
|
CVE-2023-21750 - http://packetstormsecurity.com/files/170948/Windows-Kernel-Virtualizable-Hive-Key-Deletion.html
|
||
|
CVE-2023-21768 - http://packetstormsecurity.com/files/171606/Ancillary-Function-Driver-AFD-For-Winsock-Privilege-Escalation.html
|
||
|
CVE-2023-21772 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
||
|
CVE-2023-21773 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
||
|
CVE-2023-21774 - http://packetstormsecurity.com/files/170946/Windows-Kernel-Key-Replication-Issues.html
|
||
|
CVE-2023-21776 - http://packetstormsecurity.com/files/170947/Windows-Kernsl-SID-Table-Poisoning.html
|
||
|
CVE-2023-21776 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html
|
||
|
CVE-2023-21824 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21825 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21826 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21827 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21828 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21829 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-2183 - https://github.com/grafana/bugbounty/security/advisories/GHSA-cvm3-pp2j-chr3
|
||
|
CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21830 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21831 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21832 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21834 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21835 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21836 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21837 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21838 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21839 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html
|
||
|
CVE-2023-21839 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21840 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21841 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21842 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21843 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21844 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21845 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21846 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21847 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21848 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21849 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21850 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21851 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21852 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21853 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21854 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21855 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21856 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21857 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21858 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21859 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-2186 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
|
||
|
CVE-2023-21860 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21861 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21862 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21863 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21864 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21865 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21866 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21867 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21868 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21869 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-2187 - https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
|
||
|
CVE-2023-21870 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21871 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21872 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21873 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21874 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21875 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21876 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21877 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21878 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21879 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21880 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21881 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21882 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21883 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21884 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21885 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21886 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21887 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21888 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21889 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21890 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21891 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21892 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21893 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21894 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21896 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21898 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21899 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21900 - https://www.oracle.com/security-alerts/cpujan2023.html
|
||
|
CVE-2023-21902 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21903 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21904 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21905 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21906 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21907 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21908 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21909 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-2191 - https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31
|
||
|
CVE-2023-21910 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21911 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21912 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21913 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21915 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21916 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21917 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21918 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21919 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21920 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21921 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21922 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21923 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21924 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21925 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21926 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21927 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21928 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21929 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-2193 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-21930 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21931 - http://packetstormsecurity.com/files/172882/Oracle-Weblogic-PreAuth-Remote-Command-Execution.html
|
||
|
CVE-2023-21931 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21932 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21933 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21934 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21935 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21936 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21937 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21938 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21939 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21940 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21941 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21942 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21943 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21944 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21945 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21946 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21947 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21948 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21949 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21950 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21952 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21953 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21954 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21955 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21956 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21959 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21960 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21961 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21962 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21963 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21964 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21965 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21966 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21967 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21968 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21969 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21970 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21971 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21971 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21972 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21973 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21974 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21975 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21976 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21977 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21978 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21979 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21980 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21981 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21982 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21983 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21984 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21985 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21986 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21987 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21988 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21989 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21990 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21991 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21992 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21993 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21994 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-21996 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21997 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21998 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-21999 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-22000 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-22001 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-22002 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-22003 - https://www.oracle.com/security-alerts/cpuapr2023.html
|
||
|
CVE-2023-22004 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22005 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22006 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22007 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22008 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22009 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22010 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22011 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22012 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22013 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22014 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22016 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22017 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22018 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22020 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22021 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22022 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22023 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22027 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22031 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22033 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22034 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22035 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22036 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22037 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22038 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22039 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22040 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22041 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22042 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22043 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22044 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22045 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22046 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22047 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22048 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22049 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22050 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22051 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22052 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22053 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22054 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22055 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22056 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22057 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22058 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22060 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22061 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22062 - https://www.oracle.com/security-alerts/cpujul2023.html
|
||
|
CVE-2023-22074 - http://packetstormsecurity.com/files/175352/Oracle-19c-21c-Sharding-Component-Password-Hash-Exposure.html
|
||
|
CVE-2023-2212 - https://vuldb.com/?id.226977
|
||
|
CVE-2023-2216 - https://vuldb.com/?id.226981
|
||
|
CVE-2023-2223 - http://packetstormsecurity.com/files/173726/WordPress-Login-Rebuilder-Cross-Site-Scripting.html
|
||
|
CVE-2023-22232 - http://packetstormsecurity.com/files/171390/Adobe-Connect-11.4.5-12.1.5-Local-File-Disclosure.html
|
||
|
CVE-2023-2224 - http://packetstormsecurity.com/files/173725/WordPress-Seo-By-10Web-Cross-Site-Scripting.html
|
||
|
CVE-2023-2227 - https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3
|
||
|
CVE-2023-2228 - https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9
|
||
|
CVE-2023-22291 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1687
|
||
|
CVE-2023-22299 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1712
|
||
|
CVE-2023-22306 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1698
|
||
|
CVE-2023-22308 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1737
|
||
|
CVE-2023-2231 - https://vuldb.com/?id.227001
|
||
|
CVE-2023-22319 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1701
|
||
|
CVE-2023-22325 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736
|
||
|
CVE-2023-2233 - https://gitlab.com/gitlab-org/gitlab/-/issues/408359
|
||
|
CVE-2023-2235 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
|
||
|
CVE-2023-2236 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4
|
||
|
CVE-2023-22365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1711
|
||
|
CVE-2023-22371 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1703
|
||
|
CVE-2023-2239 - https://huntr.dev/bounties/edeff16b-fc71-4e26-8d2d-dfe7bb5e7868
|
||
|
CVE-2023-2240 - https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203
|
||
|
CVE-2023-2241 - https://github.com/podofo/podofo/files/11260976/poc-file.zip
|
||
|
CVE-2023-2241 - https://github.com/podofo/podofo/issues/69
|
||
|
CVE-2023-2241 - https://vuldb.com/?id.227226
|
||
|
CVE-2023-2242 - https://docs.google.com/document/d/1GZt9MKB2K-nDrg0cnrnU6_z9wDd9xPE-YJbPV2Qgqg4/edit
|
||
|
CVE-2023-2245 - https://github.com/MorStardust/hansuncmswebshell/blob/main/README.md
|
||
|
CVE-2023-2245 - https://vuldb.com/?id.227230
|
||
|
CVE-2023-22451 - https://huntr.dev/bounties/32a873c8-f605-4aae-9272-d80985ef2b73
|
||
|
CVE-2023-2246 - http://packetstormsecurity.com/files/172182/Online-Pizza-Ordering-System-1.0-Shell-Upload.html
|
||
|
CVE-2023-2248 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d
|
||
|
CVE-2023-22481 - https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8vvv-jxg6-8578
|
||
|
CVE-2023-22483 - https://github.com/github/cmark-gfm/security/advisories/GHSA-29g3-96g3-jg6c
|
||
|
CVE-2023-22484 - https://github.com/github/cmark-gfm/security/advisories/GHSA-24f7-9frr-5h2r
|
||
|
CVE-2023-22485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-c944-cv5f-hpvr
|
||
|
CVE-2023-22486 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r572-jvj2-3m8p
|
||
|
CVE-2023-2251 - https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c
|
||
|
CVE-2023-22515 - http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-22518 - http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
|
||
|
CVE-2023-22527 - http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html
|
||
|
CVE-2023-2258 - https://huntr.dev/bounties/31eaf0fe-4d91-4022-aa9b-802bc6eafb8f
|
||
|
CVE-2023-2259 - https://huntr.dev/bounties/e753bce0-ce82-463b-b344-2f67b39b60ff
|
||
|
CVE-2023-22612 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
||
|
CVE-2023-22613 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
||
|
CVE-2023-22614 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
||
|
CVE-2023-22616 - https://research.nccgroup.com/2023/04/11/stepping-insyde-system-management-mode/
|
||
|
CVE-2023-22620 - http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html
|
||
|
CVE-2023-22620 - http://seclists.org/fulldisclosure/2023/Apr/7
|
||
|
CVE-2023-22620 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22620.txt
|
||
|
CVE-2023-22621 - https://github.com/strapi/strapi/releases
|
||
|
CVE-2023-22621 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
|
||
|
CVE-2023-22621 - https://www.ghostccamm.com/blog/multi_strapi_vulns/
|
||
|
CVE-2023-22622 - https://www.tenable.com/plugins/was/113449
|
||
|
CVE-2023-22629 - http://packetstormsecurity.com/files/171737/Titan-FTP-Path-Traversal.html
|
||
|
CVE-2023-22629 - https://f20.be/cves/titan-ftp-vulnerabilities
|
||
|
CVE-2023-22629 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||
|
CVE-2023-22630 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-j94f-5cg6-6j9j
|
||
|
CVE-2023-22653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1714
|
||
|
CVE-2023-22659 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1699
|
||
|
CVE-2023-22660 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1722
|
||
|
CVE-2023-22671 - https://github.com/NationalSecurityAgency/ghidra/issues/4869
|
||
|
CVE-2023-22710 - https://patchstack.com/database/vulnerability/wc-return-warrranty/wordpress-return-and-warranty-management-system-for-woocommerce-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
|
||
|
CVE-2023-22726 - https://github.com/nektos/act/security/advisories/GHSA-pc99-qmg4-rcff
|
||
|
CVE-2023-22726 - https://securitylab.github.com/advisories/GHSL-2023-004_act/
|
||
|
CVE-2023-22741 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-8599-x7rq-fr54
|
||
|
CVE-2023-22745 - https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67
|
||
|
CVE-2023-22809 - http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html
|
||
|
CVE-2023-22809 - http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html
|
||
|
CVE-2023-22809 - http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
|
||
|
CVE-2023-22809 - http://seclists.org/fulldisclosure/2023/Aug/21
|
||
|
CVE-2023-22809 - http://www.openwall.com/lists/oss-security/2023/01/19/1
|
||
|
CVE-2023-2281 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-22812 - https://www.westerndigital.com/support/product-security/wdc-23005-sandisk-privateaccess-software-update
|
||
|
CVE-2023-22813 - https://www.westerndigital.com/support/product-security/wdc-23004-western-digital-my-cloud-os-5-my-cloud-home-sandisk-ibi-and-wd-cloud-mobile-and-web-app-update
|
||
|
CVE-2023-2283 - http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html
|
||
|
CVE-2023-22833 - https://palantir.safebase.us/?tcuUid=7f1fd834-805d-4679-85d0-9d779fa064ae
|
||
|
CVE-2023-22834 - https://palantir.safebase.us/?tcuUid=14874400-e9c9-4ac4-a8a6-9f4c48a56ff8
|
||
|
CVE-2023-22835 - https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d
|
||
|
CVE-2023-22844 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1700
|
||
|
CVE-2023-22845 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1708
|
||
|
CVE-2023-22855 - http://packetstormsecurity.com/files/171046/Kardex-Mlog-MCC-5.7.12-0-a203c2a213-master-File-Inclusion-Remote-Code-Execution.html
|
||
|
CVE-2023-22855 - http://packetstormsecurity.com/files/171689/Kardex-Mlog-MCC-5.7.12-Remote-Code-Execution.html
|
||
|
CVE-2023-22855 - http://seclists.org/fulldisclosure/2023/Feb/10
|
||
|
CVE-2023-22855 - https://github.com/patrickhener/CVE-2023-22855/blob/main/advisory/advisory.md
|
||
|
CVE-2023-22855 - https://www.exploit-db.com/exploits/51239
|
||
|
CVE-2023-22893 - https://github.com/strapi/strapi/releases
|
||
|
CVE-2023-22893 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
|
||
|
CVE-2023-22893 - https://www.ghostccamm.com/blog/multi_strapi_vulns/
|
||
|
CVE-2023-22894 - https://github.com/strapi/strapi/releases
|
||
|
CVE-2023-22894 - https://strapi.io/blog/security-disclosure-of-vulnerabilities-cve
|
||
|
CVE-2023-22894 - https://www.ghostccamm.com/blog/multi_strapi_vulns/
|
||
|
CVE-2023-22897 - http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html
|
||
|
CVE-2023-22897 - http://seclists.org/fulldisclosure/2023/Apr/8
|
||
|
CVE-2023-22897 - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2023-22897.txt
|
||
|
CVE-2023-22899 - https://breakingthe3ma.app
|
||
|
CVE-2023-22899 - https://breakingthe3ma.app/files/Threema-PST22.pdf
|
||
|
CVE-2023-22906 - https://github.com/nonamecoder/CVE-2023-22906
|
||
|
CVE-2023-2291 - https://tenable.com/security/research/tra-2023-16
|
||
|
CVE-2023-22947 - https://shibboleth.atlassian.net/browse/SSPCPP-961
|
||
|
CVE-2023-22947 - https://shibboleth.atlassian.net/wiki/spaces/SP3/pages/2065335545/Install+on+Windows#Restricting-ACLs
|
||
|
CVE-2023-22952 - http://packetstormsecurity.com/files/171320/SugarCRM-12.x-Remote-Code-Execution-Shell-Upload.html
|
||
|
CVE-2023-22955 - http://packetstormsecurity.com/files/174214/AudioCodes-VoIP-Phones-Insufficient-Firmware-Validation.html
|
||
|
CVE-2023-22955 - http://seclists.org/fulldisclosure/2023/Aug/17
|
||
|
CVE-2023-22955 - https://syss.de
|
||
|
CVE-2023-22955 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-055.txt
|
||
|
CVE-2023-22956 - http://packetstormsecurity.com/files/174216/AudioCodes-VoIP-Phones-Hardcoded-Key.html
|
||
|
CVE-2023-22956 - http://seclists.org/fulldisclosure/2023/Aug/16
|
||
|
CVE-2023-22956 - https://syss.de
|
||
|
CVE-2023-22956 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-054.txt
|
||
|
CVE-2023-22957 - http://packetstormsecurity.com/files/174215/AudioCodes-VoIP-Phones-Hardcoded-Key.html
|
||
|
CVE-2023-22957 - http://seclists.org/fulldisclosure/2023/Aug/15
|
||
|
CVE-2023-22957 - https://syss.de
|
||
|
CVE-2023-22957 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-052.txt
|
||
|
CVE-2023-22958 - https://github.com/piuppi/Proof-of-Concepts/blob/main/Syracom/SecureLogin2FA-OpenRedirect.md
|
||
|
CVE-2023-22959 - https://github.com/chenan224/webchess_sqli_poc
|
||
|
CVE-2023-2297 - https://www.wordfence.com/blog/2023/03/vulnerability-patched-in-cozmolabs-profile-builder-plugin-information-disclosure-leads-to-account-takeover/
|
||
|
CVE-2023-22971 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5743.php
|
||
|
CVE-2023-2298 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-22984 - https://d0ub1e-d.github.io/2022/12/30/exploit-db-1/
|
||
|
CVE-2023-2299 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-22995 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
|
||
|
CVE-2023-22996 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
|
||
|
CVE-2023-22997 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2
|
||
|
CVE-2023-22999 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
||
|
CVE-2023-2300 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-23000 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
|
||
|
CVE-2023-23001 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
||
|
CVE-2023-23002 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
|
||
|
CVE-2023-23003 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16
|
||
|
CVE-2023-23004 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
|
||
|
CVE-2023-23005 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
|
||
|
CVE-2023-23006 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13
|
||
|
CVE-2023-2301 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-2302 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-2303 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-23040 - https://midist0xf.medium.com/tl-wr940n-uses-weak-md5-hashing-algorithm-ae7b589860d2
|
||
|
CVE-2023-23059 - https://packetstormsecurity.com/files/172141/GV-Edge-Recording-Manager-2.2.3.0-Privilege-Escalation.html
|
||
|
CVE-2023-23063 - https://github.com/ahmedalroky/CVEs/tree/cellinx
|
||
|
CVE-2023-23064 - https://github.com/shellpei/TOTOLINK-Unauthorized/blob/main/CVE-2023-23064
|
||
|
CVE-2023-2307 - https://huntr.dev/bounties/204ea12e-9e5c-4166-bf0e-fd49c8836917
|
||
|
CVE-2023-23073 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459171?tab=originator
|
||
|
CVE-2023-23074 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459195?tab=originator
|
||
|
CVE-2023-23075 - https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator
|
||
|
CVE-2023-23076 - https://bugbounty.zohocorp.com/bb/#/bug/101000006459751?tab=originator
|
||
|
CVE-2023-23077 - https://bugbounty.zohocorp.com/bb/#/bug/101000006387693?tab=originator
|
||
|
CVE-2023-23078 - https://bugbounty.zohocorp.com/bb/#/bug/101000006458675?tab=originator
|
||
|
CVE-2023-23080 - https://github.com/fxc233/iot-vul/tree/main/Tenda/IPC
|
||
|
CVE-2023-2315 - https://starlabs.sg/advisories/23/23-2315/
|
||
|
CVE-2023-2316 - https://starlabs.sg/advisories/23/23-2316/
|
||
|
CVE-2023-23161 - http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-23162 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html
|
||
|
CVE-2023-23163 - http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html
|
||
|
CVE-2023-23169 - https://github.com/S4nshine/CVE-2023-23169
|
||
|
CVE-2023-2317 - https://starlabs.sg/advisories/23/23-2317/
|
||
|
CVE-2023-2318 - https://github.com/marktext/marktext/issues/3618
|
||
|
CVE-2023-2318 - https://starlabs.sg/advisories/23/23-2318/
|
||
|
CVE-2023-2322 - https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67
|
||
|
CVE-2023-2323 - https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3
|
||
|
CVE-2023-2327 - https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6
|
||
|
CVE-2023-23277 - https://github.com/pawelmalak/snippet-box/issues/57
|
||
|
CVE-2023-23279 - https://hackmd.io/mG658E9iSW6TkbS8xAuUNg
|
||
|
CVE-2023-2328 - https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6
|
||
|
CVE-2023-23286 - http://packetstormsecurity.com/files/171734/Provide-Server-14.4-XSS-Cross-Site-Request-Forgery-Code-Execution.html
|
||
|
CVE-2023-23286 - https://f20.be/cves/provide-server-v-14-4
|
||
|
CVE-2023-23294 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/
|
||
|
CVE-2023-23295 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/
|
||
|
CVE-2023-23296 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetwave-series/
|
||
|
CVE-2023-23298 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23298.md
|
||
|
CVE-2023-23299 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23299.md
|
||
|
CVE-2023-23300 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23300.md
|
||
|
CVE-2023-23301 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23301.md
|
||
|
CVE-2023-23302 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23302.md
|
||
|
CVE-2023-23303 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23303.md
|
||
|
CVE-2023-23304 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23304.md
|
||
|
CVE-2023-23305 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23305.md
|
||
|
CVE-2023-23306 - https://github.com/anvilsecure/garmin-ciq-app-research/blob/main/advisories/CVE-2023-23306.md
|
||
|
CVE-2023-23315 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/01/stripejs.html
|
||
|
CVE-2023-23326 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md
|
||
|
CVE-2023-23327 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md
|
||
|
CVE-2023-23328 - https://github.com/superkojiman/vulnerabilities/blob/master/AvantFAX-3.3.7/README.md
|
||
|
CVE-2023-23330 - https://medium.com/@saleh.py/amano-xparc-local-file-inclusion-cve-2023-23330-672ae8fbfd1e
|
||
|
CVE-2023-23331 - https://0xhunter20.medium.com/how-i-found-my-first-blind-sql-injection-cve-2023-23331-aef103a7f73c
|
||
|
CVE-2023-23333 - http://packetstormsecurity.com/files/174537/SolarView-Compact-6.00-Remote-Command-Execution.html
|
||
|
CVE-2023-23333 - https://github.com/Timorlover/CVE-2023-23333
|
||
|
CVE-2023-2336 - https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14
|
||
|
CVE-2023-2338 - https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462
|
||
|
CVE-2023-2339 - https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2
|
||
|
CVE-2023-23399 - http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html
|
||
|
CVE-2023-2340 - https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b
|
||
|
CVE-2023-23408 - http://packetstormsecurity.com/files/173134/Azure-Apache-Ambari-2302250400-Spoofing.html
|
||
|
CVE-2023-2341 - https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d
|
||
|
CVE-2023-2342 - https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829
|
||
|
CVE-2023-23420 - http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html
|
||
|
CVE-2023-23420 - http://packetstormsecurity.com/files/171867/Microsoft-Windows-Kernel-New-Registry-Key-name-Insufficient-Validation.html
|
||
|
CVE-2023-23421 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html
|
||
|
CVE-2023-23422 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html
|
||
|
CVE-2023-23423 - http://packetstormsecurity.com/files/171866/Microsoft-Windows-Kernel-Transactional-Registry-Key-Rename-Issues.html
|
||
|
CVE-2023-2343 - https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2
|
||
|
CVE-2023-23454 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
|
||
|
CVE-2023-23455 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
|
||
|
CVE-2023-23456 - https://github.com/upx/upx/issues/632
|
||
|
CVE-2023-23457 - https://github.com/upx/upx/issues/631
|
||
|
CVE-2023-23488 - http://packetstormsecurity.com/files/171661/WordPress-Paid-Memberships-Pro-2.9.8-SQL-Injection.html
|
||
|
CVE-2023-23488 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-23489 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-23490 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-23491 - https://www.tenable.com/security/research/tra-2023-3
|
||
|
CVE-2023-23492 - https://www.tenable.com/security/research/tra-2023-3
|
||
|
CVE-2023-23514 - http://packetstormsecurity.com/files/171359/XNU-NFSSVC-Root-Check-Bypass-Use-After-Free.html
|
||
|
CVE-2023-23514 - http://seclists.org/fulldisclosure/2023/Mar/21
|
||
|
CVE-2023-23529 - http://seclists.org/fulldisclosure/2023/Mar/20
|
||
|
CVE-2023-23546 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1705
|
||
|
CVE-2023-23547 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1695
|
||
|
CVE-2023-23550 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1694
|
||
|
CVE-2023-2356 - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896
|
||
|
CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository
|
||
|
CVE-2023-23563 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
|
||
|
CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository
|
||
|
CVE-2023-23564 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
|
||
|
CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository
|
||
|
CVE-2023-23565 - https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
|
||
|
CVE-2023-23567 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1729
|
||
|
CVE-2023-23571 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1696
|
||
|
CVE-2023-23581 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1741
|
||
|
CVE-2023-23599 - https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
|
||
|
CVE-2023-23607 - https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq
|
||
|
CVE-2023-23608 - https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v
|
||
|
CVE-2023-2361 - https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7
|
||
|
CVE-2023-23614 - https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-33w4-xf7m-f82m
|
||
|
CVE-2023-2363 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-SQL-Injection-1.md
|
||
|
CVE-2023-23634 - https://herolab.usd.de/en/security-advisories/usd-2022-0066/
|
||
|
CVE-2023-23635 - https://herolab.usd.de/security-advisories/usd-2022-0031/
|
||
|
CVE-2023-23636 - https://herolab.usd.de/security-advisories/usd-2022-0030/
|
||
|
CVE-2023-2364 - https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Resort_Reservation_System-Stored-Cross-Site-Scripting-1.md
|
||
|
CVE-2023-2366 - https://vuldb.com/?id.227642
|
||
|
CVE-2023-2374 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/6
|
||
|
CVE-2023-2374 - https://vuldb.com/?id.227650
|
||
|
CVE-2023-23770 - https://tetraburst.com/
|
||
|
CVE-2023-23771 - https://tetraburst.com/
|
||
|
CVE-2023-23772 - https://tetraburst.com/
|
||
|
CVE-2023-23773 - https://tetraburst.com/
|
||
|
CVE-2023-23774 - https://tetraburst.com/
|
||
|
CVE-2023-2378 - https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/4
|
||
|
CVE-2023-2380 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/17
|
||
|
CVE-2023-2382 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/1
|
||
|
CVE-2023-2382 - https://vuldb.com/?id.227660
|
||
|
CVE-2023-2383 - https://vuldb.com/?id.227661
|
||
|
CVE-2023-2384 - https://vuldb.com/?id.227662
|
||
|
CVE-2023-2385 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/5
|
||
|
CVE-2023-23851 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23852 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23853 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23854 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23855 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23856 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23857 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23858 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23859 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-23860 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-2389 - https://vuldb.com/?id.227667
|
||
|
CVE-2023-2390 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/10
|
||
|
CVE-2023-23902 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1697
|
||
|
CVE-2023-23907 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702
|
||
|
CVE-2023-2391 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/11
|
||
|
CVE-2023-2392 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/12
|
||
|
CVE-2023-2392 - https://vuldb.com/?id.227670
|
||
|
CVE-2023-23924 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3cw5-7cxw-v5qg
|
||
|
CVE-2023-23927 - https://github.com/craftcms/cms/security/advisories/GHSA-qcrj-6ffc-v7hq
|
||
|
CVE-2023-2393 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/13
|
||
|
CVE-2023-2393 - https://vuldb.com/?id.227671
|
||
|
CVE-2023-2394 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/14
|
||
|
CVE-2023-23948 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/
|
||
|
CVE-2023-2395 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/15
|
||
|
CVE-2023-2395 - https://vuldb.com/?id.227673
|
||
|
CVE-2023-23956 - http://packetstormsecurity.com/files/173038/Symantec-SiteMinder-WebAgent-12.52-Cross-Site-Scripting.html
|
||
|
CVE-2023-2396 - https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/16
|
||
|
CVE-2023-24018 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715
|
||
|
CVE-2023-24019 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718
|
||
|
CVE-2023-24033 - http://packetstormsecurity.com/files/172137/Shannon-Baseband-accept-type-SDP-Attribute-Memory-Corruption.html
|
||
|
CVE-2023-24039 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
|
||
|
CVE-2023-24039 - https://security.humanativaspa.it/nothing-new-under-the-sun/
|
||
|
CVE-2023-2404 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-24040 - https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
|
||
|
CVE-2023-24040 - https://security.humanativaspa.it/nothing-new-under-the-sun/
|
||
|
CVE-2023-24044 - https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae
|
||
|
CVE-2023-24044 - https://medium.com/@jetnipat.tho/cve-2023-24044-10e48ab940d8
|
||
|
CVE-2023-24045 - https://dataiku.com
|
||
|
CVE-2023-24045 - https://gist.github.com/alert3/04e2d0a934001180104f846cfa00552b
|
||
|
CVE-2023-24046 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-24047 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-24048 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-24049 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-2405 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-24050 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-24051 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-24052 - https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
|
||
|
CVE-2023-24055 - https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
|
||
|
CVE-2023-2406 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-24068 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/
|
||
|
CVE-2023-24069 - https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/
|
||
|
CVE-2023-2407 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-24078 - http://packetstormsecurity.com/files/173279/FuguHub-8.1-Remote-Code-Execution.html
|
||
|
CVE-2023-24078 - https://github.com/ojan2021/Fuguhub-8.1-RCE
|
||
|
CVE-2023-24095 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md
|
||
|
CVE-2023-24096 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md
|
||
|
CVE-2023-24097 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/03/README.md
|
||
|
CVE-2023-24098 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/04/README.md
|
||
|
CVE-2023-24099 - https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md
|
||
|
CVE-2023-24114 - https://github.com/typecho/typecho/issues/1523
|
||
|
CVE-2023-24117 - https://oxnan.com/posts/WifiBasic_wepauth_5g_DoS
|
||
|
CVE-2023-24118 - https://oxnan.com/posts/WifiBasic_security_DoS
|
||
|
CVE-2023-24119 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS
|
||
|
CVE-2023-24120 - https://oxnan.com/posts/WifiBasic_wrlEn_5g_DoS
|
||
|
CVE-2023-24121 - https://oxnan.com/posts/WifiBasic_security_5g_DoS
|
||
|
CVE-2023-24122 - https://oxnan.com/posts/WifiBasic_ssid_5g_DoS
|
||
|
CVE-2023-24123 - https://oxnan.com/posts/WifiBasic_wepauth_DoS
|
||
|
CVE-2023-24124 - https://oxnan.com/posts/WifiBasic_wrlEn_DoS
|
||
|
CVE-2023-24125 - https://oxnan.com/posts/WifiBasic_wepkey2_5g_DoS
|
||
|
CVE-2023-24126 - https://oxnan.com/posts/WifiBasic_wepkey4_5g_DoS
|
||
|
CVE-2023-24127 - https://oxnan.com/posts/WifiBasic_wepkey1_DoS
|
||
|
CVE-2023-24128 - https://oxnan.com/posts/WifiBasic_wepkey2_DoS
|
||
|
CVE-2023-24129 - https://oxnan.com/posts/WifiBasic_wepkey4_DoS
|
||
|
CVE-2023-24130 - https://oxnan.com/posts/WifiBasic_wepkey_DoS
|
||
|
CVE-2023-24131 - https://oxnan.com/posts/WifiBasic_wepkey1_5g_DoS
|
||
|
CVE-2023-24132 - https://oxnan.com/posts/WifiBasic_wepkey3_5g_DoS
|
||
|
CVE-2023-24133 - https://oxnan.com/posts/WifiBasic_wepkey_5g_DoS
|
||
|
CVE-2023-24134 - https://oxnan.com/posts/WifiBasic_wepkey3_DoS
|
||
|
CVE-2023-24135 - https://oxnan.com/posts/WriteFacMac-Command-Injection
|
||
|
CVE-2023-24138 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/NTPSyncWithHost/NTPSyncWithHost.md
|
||
|
CVE-2023-2414 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-2415 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-24150 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveDlfw/meshSlaveDlfw.md
|
||
|
CVE-2023-24151 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md
|
||
|
CVE-2023-24152 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveUpdate/meshSlaveUpdate.md
|
||
|
CVE-2023-24153 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md
|
||
|
CVE-2023-24154 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/setUpgradeFW/setUpgradeFW.md
|
||
|
CVE-2023-24156 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveUpgstatus/recvSlaveUpgstatus.md
|
||
|
CVE-2023-24157 - https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/updateWifiInfo/updateWifiInfo.md
|
||
|
CVE-2023-24159 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md
|
||
|
CVE-2023-2416 - https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita
|
||
|
CVE-2023-24160 - https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admuser/setPasswordCfg_admuser.md
|
||
|
CVE-2023-24164 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/4/4.md
|
||
|
CVE-2023-24165 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/7/7.md
|
||
|
CVE-2023-24166 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md
|
||
|
CVE-2023-24167 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/1/1.md
|
||
|
CVE-2023-24169 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/6/6.md
|
||
|
CVE-2023-2417 - http://packetstormsecurity.com/files/172105/Advanced-Host-Monitor-12.56-Unquoted-Service-Path.html
|
||
|
CVE-2023-24170 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/3/3.md
|
||
|
CVE-2023-24181 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-9gqg-pp5p-q9hg
|
||
|
CVE-2023-24182 - https://github.com/ABB-EL/external-vulnerability-disclosures/security/advisories/GHSA-7vqh-2r8q-rjg2
|
||
|
CVE-2023-24205 - https://github.com/Fndroid/clash_for_windows_pkg/issues/3891
|
||
|
CVE-2023-2421 - https://youtu.be/4JOLhAuoizE
|
||
|
CVE-2023-24212 - https://github.com/Venus-WQLab/bug_report/blob/main/Tenda/CVE-2023-24212.md
|
||
|
CVE-2023-24212 - https://github.com/w0x68y/cve-lists/blob/main/Tenda/vuln/readme.md
|
||
|
CVE-2023-24217 - http://packetstormsecurity.com/files/171252/Agilebio-Lab-Collector-4.234-Remote-Code-Execution.html
|
||
|
CVE-2023-24229 - https://github.com/sadwwcxz/Vul
|
||
|
CVE-2023-24229 - https://web.archive.org/web/20230315181013/https://github.com/sadwwcxz/Vul
|
||
|
CVE-2023-24230 - https://medium.com/@0x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a
|
||
|
CVE-2023-24231 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
||
|
CVE-2023-24232 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
||
|
CVE-2023-24233 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
||
|
CVE-2023-24234 - https://medium.com/@0x2bit/inventory-management-system-multiple-stored-xss-vulnerability-b296365065b
|
||
|
CVE-2023-24236 - https://github.com/Am1ngl/ttt/tree/main/19
|
||
|
CVE-2023-24238 - https://github.com/Am1ngl/ttt/tree/main/20
|
||
|
CVE-2023-24251 - https://github.com/Cutegod/CMS_0_day/issues/2
|
||
|
CVE-2023-2426 - https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425
|
||
|
CVE-2023-24261 - https://justinapplegate.me/2023/glinet-CVE-2023-24261/
|
||
|
CVE-2023-24269 - https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md
|
||
|
CVE-2023-2427 - https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d
|
||
|
CVE-2023-24276 - https://github.com/Am1ngl/ttt/tree/main/18
|
||
|
CVE-2023-24279 - https://www.edoardoottavianelli.it/CVE-2023-24279
|
||
|
CVE-2023-24279 - https://www.youtube.com/watch?v=1mSXzzwcGMM
|
||
|
CVE-2023-2428 - https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e
|
||
|
CVE-2023-24282 - https://www.cryptnetix.com/blog/2023/01/19/Polycom-Trio-Vulnerability-Disclosure.html
|
||
|
CVE-2023-2429 - https://huntr.dev/bounties/20d3a0b3-2693-4bf1-b196-10741201a540
|
||
|
CVE-2023-24317 - https://packetstormsecurity.com/files/170205/Judging-Management-System-1.0-Shell-Upload.html
|
||
|
CVE-2023-24320 - https://yuyudhn.github.io/CVE-2023-24320/
|
||
|
CVE-2023-24322 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
||
|
CVE-2023-24323 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
||
|
CVE-2023-24329 - https://github.com/python/cpython/issues/102153
|
||
|
CVE-2023-24330 - https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330
|
||
|
CVE-2023-24331 - https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331
|
||
|
CVE-2023-24332 - https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332
|
||
|
CVE-2023-24333 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333
|
||
|
CVE-2023-24334 - https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334
|
||
|
CVE-2023-24343 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/01
|
||
|
CVE-2023-24344 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/01
|
||
|
CVE-2023-24345 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/03
|
||
|
CVE-2023-24346 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/02
|
||
|
CVE-2023-24347 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/02
|
||
|
CVE-2023-24348 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/02
|
||
|
CVE-2023-24349 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/curTime_Vuls/04
|
||
|
CVE-2023-24350 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/03
|
||
|
CVE-2023-24351 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/01
|
||
|
CVE-2023-24352 - https://github.com/1160300418/Vuls/tree/main/D-Link/DIR-605L/webpage_Vuls/03
|
||
|
CVE-2023-24364 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2023-24366.md
|
||
|
CVE-2023-24366 - https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md
|
||
|
CVE-2023-2437 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
||
|
CVE-2023-2437 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2438 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2439 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2440 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2446 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
||
|
CVE-2023-2446 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2447 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-24472 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709
|
||
|
CVE-2023-24473 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707
|
||
|
CVE-2023-24479 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762
|
||
|
CVE-2023-2448 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
||
|
CVE-2023-2448 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2449 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
||
|
CVE-2023-2449 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-24496 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
|
||
|
CVE-2023-24497 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
|
||
|
CVE-2023-2451 - https://vuldb.com/?id.227795
|
||
|
CVE-2023-24519 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
|
||
|
CVE-2023-24520 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
|
||
|
CVE-2023-24521 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24522 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24523 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24524 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24525 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24526 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24527 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24528 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24529 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24530 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-24582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
|
||
|
CVE-2023-24583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
|
||
|
CVE-2023-24585 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725
|
||
|
CVE-2023-24595 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713
|
||
|
CVE-2023-24609 - https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842
|
||
|
CVE-2023-24620 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
|
||
|
CVE-2023-24621 - https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
|
||
|
CVE-2023-24626 - https://www.exploit-db.com/exploits/51252
|
||
|
CVE-2023-24651 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24652 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24653 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24654 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24656 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24671 - https://medium.com/@SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
|
||
|
CVE-2023-24671 - https://packetstormsecurity.com/files/171300/VX-Search-13.8-Unquoted-Service-Path.html
|
||
|
CVE-2023-24674 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107
|
||
|
CVE-2023-24674 - https://medium.com/@cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107
|
||
|
CVE-2023-24675 - https://cupc4k3.medium.com/cve-2023-24674-uncovering-a-privilege-escalation-vulnerability-in-bludit-cms-dcf86c41107
|
||
|
CVE-2023-24684 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
||
|
CVE-2023-24685 - http://packetstormsecurity.com/files/172047/ChurchCRM-4.5.3-SQL-Injection.html
|
||
|
CVE-2023-24685 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
||
|
CVE-2023-24686 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
||
|
CVE-2023-24687 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
||
|
CVE-2023-24688 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
||
|
CVE-2023-24689 - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
|
||
|
CVE-2023-24690 - https://github.com/blakduk/Advisories/blob/main/ChurchCRM/README.md
|
||
|
CVE-2023-24698 - https://foswiki.org/Support/SecurityAlert-CVE-2023-24698
|
||
|
CVE-2023-24709 - http://packetstormsecurity.com/files/171783/Paradox-Security-Systems-IPR512-Denial-Of-Service.html
|
||
|
CVE-2023-24709 - https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512
|
||
|
CVE-2023-24709 - https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512
|
||
|
CVE-2023-24720 - https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss
|
||
|
CVE-2023-24721 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-24721/CVE-2023-24721.md
|
||
|
CVE-2023-24728 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24729 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24730 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24731 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24732 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-scrm.zip
|
||
|
CVE-2023-24733 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
||
|
CVE-2023-24734 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
||
|
CVE-2023-24735 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
||
|
CVE-2023-24736 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
||
|
CVE-2023-24737 - https://github.com/AetherBlack/CVE/tree/main/PMB
|
||
|
CVE-2023-2474 - https://vuldb.com/?id.227866
|
||
|
CVE-2023-24751 - https://github.com/strukturag/libde265/issues/379
|
||
|
CVE-2023-24752 - https://github.com/strukturag/libde265/issues/378
|
||
|
CVE-2023-24754 - https://github.com/strukturag/libde265/issues/382
|
||
|
CVE-2023-24755 - https://github.com/strukturag/libde265/issues/384
|
||
|
CVE-2023-24756 - https://github.com/strukturag/libde265/issues/380
|
||
|
CVE-2023-24757 - https://github.com/strukturag/libde265/issues/385
|
||
|
CVE-2023-24758 - https://github.com/strukturag/libde265/issues/383
|
||
|
CVE-2023-2476 - https://vuldb.com/?id.227868
|
||
|
CVE-2023-24762 - https://hackmd.io/@uuXne2y3RjOdpWM87fw6_A/HyPK04zho
|
||
|
CVE-2023-24763 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/06/xenforum.html
|
||
|
CVE-2023-24769 - https://www.edoardoottavianelli.it/CVE-2023-24769
|
||
|
CVE-2023-24769 - https://www.youtube.com/watch?v=TRTpRlkU3Hc
|
||
|
CVE-2023-24773 - https://github.com/funadmin/funadmin/issues/4
|
||
|
CVE-2023-24774 - https://github.com/funadmin/funadmin/issues/12
|
||
|
CVE-2023-24775 - https://github.com/funadmin/funadmin/issues/9
|
||
|
CVE-2023-24780 - https://github.com/funadmin/funadmin/issues/6
|
||
|
CVE-2023-24781 - https://github.com/funadmin/funadmin/issues/8
|
||
|
CVE-2023-24782 - https://github.com/funadmin/funadmin/issues/3
|
||
|
CVE-2023-24785 - https://sourceforge.net/p/peazip/tickets/734/
|
||
|
CVE-2023-24788 - http://packetstormsecurity.com/files/171804/NotrinosERP-0.7-SQL-Injection.html
|
||
|
CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.md
|
||
|
CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/CVE-2023-24788/CVE-2023-24788.py
|
||
|
CVE-2023-24788 - https://github.com/arvandy/CVE/blob/main/NotrinosERP/POC.md
|
||
|
CVE-2023-24797 - https://github.com/DrizzlingSun/D-link/blob/main/Dir882/1/1.md
|
||
|
CVE-2023-24798 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/2/2.md
|
||
|
CVE-2023-24799 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/1/1.md
|
||
|
CVE-2023-24800 - https://github.com/DrizzlingSun/D-link/blob/main/Dir878/3/3.md
|
||
|
CVE-2023-24804 - https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/
|
||
|
CVE-2023-24805 - https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
|
||
|
CVE-2023-24808 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf
|
||
|
CVE-2023-24815 - https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38
|
||
|
CVE-2023-24816 - https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7
|
||
|
CVE-2023-24824 - https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh
|
||
|
CVE-2023-2485 - https://gitlab.com/gitlab-org/gitlab/-/issues/407830
|
||
|
CVE-2023-2497 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-2507 - https://fluidattacks.com/advisories/maiden/
|
||
|
CVE-2023-25076 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731
|
||
|
CVE-2023-25081 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25082 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25083 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25084 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25085 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25086 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25087 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25088 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25089 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25090 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25091 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25092 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25093 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25094 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25095 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25096 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25097 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25098 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25099 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25100 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25101 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25102 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25103 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25104 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25105 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25106 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25107 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25108 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25109 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25110 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25111 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25112 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25113 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25114 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25115 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25116 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25117 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25118 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25119 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25120 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25121 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25122 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25123 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
||
|
CVE-2023-25135 - https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable
|
||
|
CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/13/1
|
||
|
CVE-2023-25136 - http://www.openwall.com/lists/oss-security/2023/02/22/1
|
||
|
CVE-2023-25136 - https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
|
||
|
CVE-2023-25136 - https://news.ycombinator.com/item?id=34711565
|
||
|
CVE-2023-25156 - https://huntr.dev/bounties/2b1a9be9-45e9-490b-8de0-26a492e79795/
|
||
|
CVE-2023-2516 - https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716
|
||
|
CVE-2023-25171 - https://huntr.dev/bounties/3b712cb6-3fa3-4f71-8562-7a7016c6262e
|
||
|
CVE-2023-25173 - https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
|
||
|
CVE-2023-25181 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
|
||
|
CVE-2023-25187 - http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html
|
||
|
CVE-2023-2519 - https://vuldb.com/?id.228010
|
||
|
CVE-2023-25194 - http://packetstormsecurity.com/files/173151/Apache-Druid-JNDI-Injection-Remote-Code-Execution.html
|
||
|
CVE-2023-25206 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/14/ws_productreviews.html
|
||
|
CVE-2023-25207 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/09/dpdfrance.html
|
||
|
CVE-2023-25210 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/1/1.md
|
||
|
CVE-2023-25211 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md
|
||
|
CVE-2023-25212 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/6/6.md
|
||
|
CVE-2023-25213 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/5/5.md
|
||
|
CVE-2023-25214 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/4/4.md
|
||
|
CVE-2023-25215 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/3/3.md
|
||
|
CVE-2023-25216 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md
|
||
|
CVE-2023-25217 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/10/10.md
|
||
|
CVE-2023-25218 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/8/8.md
|
||
|
CVE-2023-25219 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/11/11.md
|
||
|
CVE-2023-25220 - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/7/7.md
|
||
|
CVE-2023-25221 - https://github.com/strukturag/libde265/issues/388
|
||
|
CVE-2023-25222 - https://github.com/LibreDWG/libredwg/issues/615
|
||
|
CVE-2023-2523 - https://github.com/RCEraser/cve/blob/main/Weaver.md
|
||
|
CVE-2023-25231 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104
|
||
|
CVE-2023-25233 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113
|
||
|
CVE-2023-25234 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_1
|
||
|
CVE-2023-25235 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2
|
||
|
CVE-2023-25240 - https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions
|
||
|
CVE-2023-25260 - https://cves.at/posts/cve-2023-25260/writeup/
|
||
|
CVE-2023-25261 - https://cves.at/posts/cve-2023-25261/writeup/
|
||
|
CVE-2023-25262 - https://cves.at/posts/cve-2023-25262/writeup/
|
||
|
CVE-2023-25263 - https://cves.at/posts/cve-2023-25263/writeup/
|
||
|
CVE-2023-25264 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html
|
||
|
CVE-2023-25265 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html
|
||
|
CVE-2023-25266 - https://frycos.github.io/vulns4free/2023/01/24/0days-united-nations.html
|
||
|
CVE-2023-25267 - https://gist.github.com/Frycos/62fa664bacd19a85235be19c6e4d7599
|
||
|
CVE-2023-25279 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20In%20tools_AccountName
|
||
|
CVE-2023-25280 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/cmd%20Inject%20in%20pingV4Msg
|
||
|
CVE-2023-25281 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20cancelPing
|
||
|
CVE-2023-25282 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/Permanent%20DDOS%20vulnerability%20in%20emailInfo
|
||
|
CVE-2023-25283 - https://github.com/migraine-sudo/D_Link_Vuln/tree/main/stackoverflow%20%20in%20reserveDHCP_HostName_1.1.1.0
|
||
|
CVE-2023-25289 - https://www.exploit-db.com/exploits/51142
|
||
|
CVE-2023-25309 - https://cxsecurity.com/issue/WLB-2023050012
|
||
|
CVE-2023-25309 - https://packetstormsecurity.com/files/172185/Rollout-UI-0.5-Cross-Site-Scripting.html
|
||
|
CVE-2023-2531 - https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02
|
||
|
CVE-2023-25313 - https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw
|
||
|
CVE-2023-25330 - https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md
|
||
|
CVE-2023-25344 - https://github.com/node-swig/swig-templates/issues/89
|
||
|
CVE-2023-25344 - https://www.gem-love.com/2023/02/01/Swig%E6%A8%A1%E6%9D%BF%E5%BC%95%E6%93%8E0day%E6%8C%96%E6%8E%98-%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E5%92%8C%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96/
|
||
|
CVE-2023-25345 - https://github.com/node-swig/swig-templates/issues/88
|
||
|
CVE-2023-25346 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25346
|
||
|
CVE-2023-25347 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25347
|
||
|
CVE-2023-25348 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-25348
|
||
|
CVE-2023-25355 - https://seclists.org/fulldisclosure/2023/Mar/5
|
||
|
CVE-2023-25356 - https://seclists.org/fulldisclosure/2023/Mar/5
|
||
|
CVE-2023-25366 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25366.md
|
||
|
CVE-2023-25367 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25367.md
|
||
|
CVE-2023-25368 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md
|
||
|
CVE-2023-25369 - https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25369.md
|
||
|
CVE-2023-25394 - https://danrevah.github.io/2023/05/03/CVE-2023-25394-VideoStream-LPE/
|
||
|
CVE-2023-25395 - https://github.com/Am1ngl/ttt/tree/main/22
|
||
|
CVE-2023-25403 - https://github.com/CleverStupidDog/yf-exam/issues/2
|
||
|
CVE-2023-25428 - https://packetstormsecurity.com/files/172259/Soft-o-Free-Password-Manager-1.1.20-DLL-Hijacking.html
|
||
|
CVE-2023-25431 - https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md
|
||
|
CVE-2023-25433 - https://gitlab.com/libtiff/libtiff/-/issues/520
|
||
|
CVE-2023-25434 - https://gitlab.com/libtiff/libtiff/-/issues/519
|
||
|
CVE-2023-25435 - https://gitlab.com/libtiff/libtiff/-/issues/518
|
||
|
CVE-2023-25438 - https://packetstormsecurity.com/files/172052/MilleGPG5-5.9.2-Local-Privilege-Escalation.html
|
||
|
CVE-2023-25439 - https://packetstormsecurity.com/files/172556/FusionInvoice-2023-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-25440 - https://packetstormsecurity.com/files/172470/CiviCRM-5.59.alpha1-Cross-Site-Scripting.html
|
||
|
CVE-2023-2550 - https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b
|
||
|
CVE-2023-2551 - https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c
|
||
|
CVE-2023-2552 - https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32
|
||
|
CVE-2023-2553 - https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf
|
||
|
CVE-2023-2554 - https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b
|
||
|
CVE-2023-25572 - https://github.com/marmelab/react-admin/pull/8644
|
||
|
CVE-2023-25572 - https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v
|
||
|
CVE-2023-25582 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723
|
||
|
CVE-2023-25583 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723
|
||
|
CVE-2023-25585 - https://sourceware.org/bugzilla/show_bug.cgi?id=29892
|
||
|
CVE-2023-25586 - https://sourceware.org/bugzilla/show_bug.cgi?id=29855
|
||
|
CVE-2023-25588 - https://sourceware.org/bugzilla/show_bug.cgi?id=29677
|
||
|
CVE-2023-25614 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-25615 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-25616 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-25617 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-25618 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-2564 - https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461
|
||
|
CVE-2023-2566 - https://huntr.dev/bounties/47d6fc2a-989a-44eb-9cb7-ab4f8bd44496
|
||
|
CVE-2023-25690 - http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
|
||
|
CVE-2023-25717 - https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/
|
||
|
CVE-2023-25718 - https://cybir.com/2022/cve/connectwise-control-dns-spoofing-poc/
|
||
|
CVE-2023-25718 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity
|
||
|
CVE-2023-25719 - https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/
|
||
|
CVE-2023-25719 - https://www.huntress.com/blog/clearing-the-air-overblown-claims-of-vulnerabilities-exploits-severity
|
||
|
CVE-2023-25728 - https://bugzilla.mozilla.org/show_bug.cgi?id=1790345
|
||
|
CVE-2023-25729 - https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
|
||
|
CVE-2023-2573 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
|
||
|
CVE-2023-2573 - http://seclists.org/fulldisclosure/2023/May/4
|
||
|
CVE-2023-2573 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
||
|
CVE-2023-25732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1804564
|
||
|
CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
|
||
|
CVE-2023-25734 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
|
||
|
CVE-2023-2574 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
|
||
|
CVE-2023-2574 - http://seclists.org/fulldisclosure/2023/May/4
|
||
|
CVE-2023-2574 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
||
|
CVE-2023-25741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813376
|
||
|
CVE-2023-25743 - https://bugzilla.mozilla.org/show_bug.cgi?id=1800203
|
||
|
CVE-2023-25748 - https://bugzilla.mozilla.org/show_bug.cgi?id=1798798
|
||
|
CVE-2023-25749 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810705
|
||
|
CVE-2023-2575 - http://packetstormsecurity.com/files/172307/Advantech-EKI-15XX-Series-Command-Injection-Buffer-Overflow.html
|
||
|
CVE-2023-2575 - http://seclists.org/fulldisclosure/2023/May/4
|
||
|
CVE-2023-2575 - https://cyberdanube.com/en/multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
||
|
CVE-2023-25750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1814733
|
||
|
CVE-2023-25774 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743
|
||
|
CVE-2023-2579 - https://github.com/daniloalbuqrque/poc-cve-xss-inventory-press-plugin
|
||
|
CVE-2023-25810 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-wh8j-xr66-f296
|
||
|
CVE-2023-25811 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp
|
||
|
CVE-2023-25814 - https://github.com/metersphere/metersphere/security/advisories/GHSA-fwc3-5h55-mh2j
|
||
|
CVE-2023-2582 - https://www.tenable.com/security/research/tra-2023-18
|
||
|
CVE-2023-25826 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html
|
||
|
CVE-2023-2583 - https://huntr.dev/bounties/397ea68d-1e28-44ff-b830-c8883d067d96
|
||
|
CVE-2023-25848 - https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/
|
||
|
CVE-2023-2590 - https://huntr.dev/bounties/a4238a30-3ddb-4415-9055-e179c3d4dea7
|
||
|
CVE-2023-2591 - https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b
|
||
|
CVE-2023-2598 - https://www.openwall.com/lists/oss-security/2023/05/08/3
|
||
|
CVE-2023-2601 - http://packetstormsecurity.com/files/173732/WordPress-WP-Brutal-AI-Cross-Site-Request-Forgery-SQL-Injection.html
|
||
|
CVE-2023-26033 - https://github.com/gentoo/soko/security/advisories/GHSA-gp8g-jfq9-5q2g
|
||
|
CVE-2023-26034 - https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrx
|
||
|
CVE-2023-26035 - http://packetstormsecurity.com/files/175675/ZoneMinder-Snapshots-Command-Injection.html
|
||
|
CVE-2023-26043 - https://github.com/GeoNode/geonode/security/advisories/GHSA-mcmc-c59m-pqq8
|
||
|
CVE-2023-2605 - http://packetstormsecurity.com/files/173734/WordPress-WP-Brutal-AI-Cross-Site-Scripting.html
|
||
|
CVE-2023-2605 - https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb
|
||
|
CVE-2023-26067 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html
|
||
|
CVE-2023-26068 - http://packetstormsecurity.com/files/174763/Lexmark-Device-Embedded-Web-Server-Remote-Code-Execution.html
|
||
|
CVE-2023-26071 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2023-26072 - http://packetstormsecurity.com/files/171378/Shannon-Baseband-NrmmMsgCodec-Emergency-Number-List-Heap-Buffer-Overflow.html
|
||
|
CVE-2023-26073 - http://packetstormsecurity.com/files/171380/Shannon-Baseband-NrmmMsgCodec-Extended-Emergency-Number-List-Heap-Buffer-Overflow.html
|
||
|
CVE-2023-26074 - http://packetstormsecurity.com/files/171383/Shannon-Baseband-NrmmMsgCodec-Access-Category-Definitions-Heap-Buffer-Overflow.html
|
||
|
CVE-2023-26075 - http://packetstormsecurity.com/files/171387/Shannon-Baseband-NrmmMsgCodec-Intra-Object-Overflow.html
|
||
|
CVE-2023-26076 - http://packetstormsecurity.com/files/171400/Shannon-Baseband-NrSmPcoCodec-Intra-Object-Overflow.html
|
||
|
CVE-2023-26081 - https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x
|
||
|
CVE-2023-2609 - https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
|
||
|
CVE-2023-2610 - https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
|
||
|
CVE-2023-26102 - https://github.com/timdown/rangy/issues/478
|
||
|
CVE-2023-26102 - https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702
|
||
|
CVE-2023-26103 - https://security.snyk.io/vuln/SNYK-RUST-DENO-3315970
|
||
|
CVE-2023-26104 - https://gist.github.com/lirantal/637520812da06fffb91dd86d02ff6bde
|
||
|
CVE-2023-26104 - https://security.snyk.io/vuln/SNYK-JS-LITEWEBSERVER-3153703
|
||
|
CVE-2023-26105 - https://github.com/mde/utilities/issues/29
|
||
|
CVE-2023-26105 - https://security.snyk.io/vuln/SNYK-JS-UTILITIES-3184491
|
||
|
CVE-2023-26106 - https://security.snyk.io/vuln/SNYK-JS-DOTLENS-3227646
|
||
|
CVE-2023-26107 - https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969
|
||
|
CVE-2023-26109 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTHSERIALPORT-3311820
|
||
|
CVE-2023-26110 - https://security.snyk.io/vuln/SNYK-JS-NODEBLUETOOTH-3311821
|
||
|
CVE-2023-26111 - https://gist.github.com/lirantal/c80b28e7bee148dc287339cb483e42bc
|
||
|
CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NODESTATIC-3149928
|
||
|
CVE-2023-26111 - https://security.snyk.io/vuln/SNYK-JS-NUBOSOFTWARENODESTATIC-3149927
|
||
|
CVE-2023-26112 - https://security.snyk.io/vuln/SNYK-PYTHON-CONFIGOBJ-3252494
|
||
|
CVE-2023-26113 - https://github.com/kobezzza/Collection/issues/27
|
||
|
CVE-2023-26113 - https://security.snyk.io/vuln/SNYK-JS-COLLECTIONJS-3185148
|
||
|
CVE-2023-26114 - https://security.snyk.io/vuln/SNYK-JS-CODESERVER-3368148
|
||
|
CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-4058657
|
||
|
CVE-2023-26115 - https://security.snyk.io/vuln/SNYK-JS-WORDWRAP-3149973
|
||
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406320
|
||
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406322
|
||
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406321
|
||
|
CVE-2023-26116 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373044
|
||
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323
|
||
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325
|
||
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324
|
||
|
CVE-2023-26117 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045
|
||
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326
|
||
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328
|
||
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327
|
||
|
CVE-2023-26118 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046
|
||
|
CVE-2023-26119 - https://security.snyk.io/vuln/SNYK-JAVA-NETSOURCEFORGEHTMLUNIT-3252500
|
||
|
CVE-2023-2612 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
||
|
CVE-2023-2612 - https://ubuntu.com/security/CVE-2023-2612
|
||
|
CVE-2023-2612 - https://ubuntu.com/security/notices/USN-6127-1
|
||
|
CVE-2023-26120 - https://security.snyk.io/vuln/SNYK-JAVA-COMXUXUELI-3248764
|
||
|
CVE-2023-26121 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373062
|
||
|
CVE-2023-26122 - https://github.com/hacksparrow/safe-eval/issues/27
|
||
|
CVE-2023-26122 - https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064
|
||
|
CVE-2023-26123 - https://security.snyk.io/vuln/SNYK-UNMANAGED-RAYSAN5RAYLIB-5421188
|
||
|
CVE-2023-26125 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285
|
||
|
CVE-2023-26126 - https://gist.github.com/lirantal/dcb32c11ce87f5aafd2282b90b4dc998
|
||
|
CVE-2023-26126 - https://security.snyk.io/vuln/SNYK-JS-MSTATIC-3244915
|
||
|
CVE-2023-26127 - https://security.snyk.io/vuln/SNYK-JS-N158-3183746
|
||
|
CVE-2023-26128 - https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165
|
||
|
CVE-2023-26129 - https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876
|
||
|
CVE-2023-26130 - https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280
|
||
|
CVE-2023-26130 - https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194
|
||
|
CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONENGINE-3312111
|
||
|
CVE-2023-26131 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMXYPROTOALGERNONTHEMES-3312112
|
||
|
CVE-2023-26132 - https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763
|
||
|
CVE-2023-26133 - https://security.snyk.io/vuln/SNYK-JS-PROGRESSBARJS-3184152
|
||
|
CVE-2023-26134 - https://github.com/JPeer264/node-git-commit-info/issues/24
|
||
|
CVE-2023-26134 - https://security.snyk.io/vuln/SNYK-JS-GITCOMMITINFO-5740174
|
||
|
CVE-2023-26135 - https://github.com/brycebaril/node-flatnest/issues/4
|
||
|
CVE-2023-26135 - https://security.snyk.io/vuln/SNYK-JS-FLATNEST-3185149
|
||
|
CVE-2023-26136 - https://github.com/salesforce/tough-cookie/issues/282
|
||
|
CVE-2023-26136 - https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
|
||
|
CVE-2023-26137 - https://gist.github.com/dellalibera/666d67165830ded052a1ede2d2c0b02a
|
||
|
CVE-2023-26137 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665554
|
||
|
CVE-2023-26138 - https://gist.github.com/dellalibera/d2abd809f32ec6c61be1f41d80edf61b
|
||
|
CVE-2023-26138 - https://security.snyk.io/vuln/SNYK-UNMANAGED-DROGONFRAMEWORKDROGON-5665555
|
||
|
CVE-2023-26139 - https://gist.github.com/lelecolacola123/cc0d1e73780127aea9482c05f2ff3252
|
||
|
CVE-2023-26139 - https://security.snyk.io/vuln/SNYK-JS-UNDERSCOREKEYPATH-5416714
|
||
|
CVE-2023-2614 - https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6
|
||
|
CVE-2023-26140 - https://security.snyk.io/vuln/SNYK-JS-EXCALIDRAWEXCALIDRAW-5841658
|
||
|
CVE-2023-26141 - https://gist.github.com/keeganparr1/1dffd3c017339b7ed5371ed3d81e6b2a
|
||
|
CVE-2023-26141 - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107
|
||
|
CVE-2023-26142 - https://gist.github.com/dellalibera/9247769cc90ed96c0d72ddbcba88c65c
|
||
|
CVE-2023-26142 - https://security.snyk.io/vuln/SNYK-UNMANAGED-CROW-5665556
|
||
|
CVE-2023-26143 - https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318
|
||
|
CVE-2023-26144 - https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181
|
||
|
CVE-2023-26145 - https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca
|
||
|
CVE-2023-26145 - https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518
|
||
|
CVE-2023-26146 - https://gist.github.com/dellalibera/c53448135480cbe12257c4b413a90d20
|
||
|
CVE-2023-26146 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730766
|
||
|
CVE-2023-26147 - https://gist.github.com/dellalibera/2be265b56b7b3b00de1a777b9dec0c7b
|
||
|
CVE-2023-26147 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730768
|
||
|
CVE-2023-26148 - https://gist.github.com/dellalibera/65d136066fdd5ea4dddaadaa9b0ba90e
|
||
|
CVE-2023-26148 - https://security.snyk.io/vuln/SNYK-UNMANAGED-ITHEWEILIBHV-5730769
|
||
|
CVE-2023-26149 - https://security.snyk.io/vuln/SNYK-JS-QUILLMENTION-5921549
|
||
|
CVE-2023-2615 - https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a
|
||
|
CVE-2023-26150 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673435
|
||
|
CVE-2023-26151 - https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709
|
||
|
CVE-2023-26152 - https://gist.github.com/lirantal/1f7021703a2065ecaf9ec9e06a3a346d
|
||
|
CVE-2023-26152 - https://security.snyk.io/vuln/SNYK-JS-STATICSERVER-5722341
|
||
|
CVE-2023-26153 - https://gist.github.com/CalumHutton/b7aa1c2e71c8d4386463ac14f686901d
|
||
|
CVE-2023-26153 - https://security.snyk.io/vuln/SNYK-RUBY-GEOKITRAILS-5920323
|
||
|
CVE-2023-26155 - https://github.com/nrhirani/node-qpdf/issues/23
|
||
|
CVE-2023-26155 - https://security.snyk.io/vuln/SNYK-JS-NODEQPDF-5747918
|
||
|
CVE-2023-26156 - https://gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18
|
||
|
CVE-2023-26156 - https://security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539
|
||
|
CVE-2023-26157 - https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730
|
||
|
CVE-2023-26158 - https://security.snyk.io/vuln/SNYK-JS-MOCKJS-6051365
|
||
|
CVE-2023-26159 - https://github.com/follow-redirects/follow-redirects/issues/235
|
||
|
CVE-2023-26159 - https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137
|
||
|
CVE-2023-2616 - https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801
|
||
|
CVE-2023-2617 - https://github.com/opencv/opencv_contrib/pull/3480
|
||
|
CVE-2023-2620 - https://gitlab.com/gitlab-org/gitlab/-/issues/410433
|
||
|
CVE-2023-26213 - http://seclists.org/fulldisclosure/2023/Mar/2
|
||
|
CVE-2023-26213 - https://sec-consult.com/vulnerability-lab/advisory/os-command-injection-in-barracuda-cloudgen-wan/
|
||
|
CVE-2023-2624 - http://packetstormsecurity.com/files/174895/WordPress-KiviCare-3.2.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-26255 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md
|
||
|
CVE-2023-26256 - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26256.md
|
||
|
CVE-2023-2629 - https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01
|
||
|
CVE-2023-2630 - https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e
|
||
|
CVE-2023-26314 - https://www.openwall.com/lists/oss-security/2023/01/05/1
|
||
|
CVE-2023-26325 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-26326 - https://www.tenable.com/security/research/tra-2023-7
|
||
|
CVE-2023-2636 - http://packetstormsecurity.com/files/173815/WordPress-AN_Gradebook-5.0.1-SQL-Injection.html
|
||
|
CVE-2023-2636 - https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5
|
||
|
CVE-2023-26360 - http://packetstormsecurity.com/files/172079/Adobe-ColdFusion-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-26427 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26428 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26429 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26430 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26431 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26432 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26433 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26434 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26435 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26436 - http://packetstormsecurity.com/files/173083/OX-App-Suite-SSRF-Resource-Consumption-Command-Injection.html
|
||
|
CVE-2023-26438 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26439 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26440 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26441 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26442 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26443 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26445 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26446 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26447 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26448 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26449 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26450 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26451 - http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html
|
||
|
CVE-2023-26457 - https://launchpad.support.sap.com/#/notes/3281484
|
||
|
CVE-2023-26457 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-26458 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-26459 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-26460 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-26461 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-26469 - http://packetstormsecurity.com/files/174248/Jorani-Remote-Code-Execution.html
|
||
|
CVE-2023-26469 - https://github.com/Orange-Cyberdefense/CVE-repository/tree/master
|
||
|
CVE-2023-2647 - https://github.com/sunyixuan1228/cve/blob/main/weaver%20exec.md
|
||
|
CVE-2023-26475 - https://jira.xwiki.org/browse/XWIKI-20360
|
||
|
CVE-2023-2648 - https://github.com/sunyixuan1228/cve/blob/main/weaver.md
|
||
|
CVE-2023-26485 - https://github.com/github/cmark-gfm/security/advisories/GHSA-r8vr-c48j-fcc5
|
||
|
CVE-2023-26486 - https://github.com/vega/vega/security/advisories/GHSA-4vq7-882g-wcg4
|
||
|
CVE-2023-26487 - https://github.com/vega/vega/security/advisories/GHSA-w5m3-xh75-mp55
|
||
|
CVE-2023-2649 - https://github.com/xinzhihen06/ac23tenda/blob/main/tendaAC23.md
|
||
|
CVE-2023-26490 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3j2f-wf52-cjg7
|
||
|
CVE-2023-26492 - https://github.com/directus/directus/security/advisories/GHSA-j3rg-3rgm-537h
|
||
|
CVE-2023-26493 - https://securitylab.github.com/advisories/GHSL-2023-027_Engine_for_Cocos_Creator/
|
||
|
CVE-2023-26494 - https://securitylab.github.com/advisories/GHSL-2022-138_lorawan-stack/
|
||
|
CVE-2023-26510 - https://ghost.org/docs/security/
|
||
|
CVE-2023-26510 - https://gist.github.com/yurahod/2e11eabbe4b92ef1d44b08e37023ecfb
|
||
|
CVE-2023-26510 - https://gist.github.com/yurahod/828d5e6a077c12f3f74c6485d1c7f0e7
|
||
|
CVE-2023-2652 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md#2classesmasterphpfdelete_item
|
||
|
CVE-2023-2653 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Lost-and-Found-Information-System---Multiple-SQL-injections.md
|
||
|
CVE-2023-2653 - https://vuldb.com/?id.228781
|
||
|
CVE-2023-26556 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
||
|
CVE-2023-26557 - https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
|
||
|
CVE-2023-2656 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/AC-Repair-and-Services-System---SQL-injections.md
|
||
|
CVE-2023-2657 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#1xss-vulnerability-in-productsphp
|
||
|
CVE-2023-2658 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#2sql-injection-vulnerability-in-productsphp
|
||
|
CVE-2023-2658 - https://vuldb.com/?id.228800
|
||
|
CVE-2023-2659 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#3sql-injection-vulnerability-in-view_productphp
|
||
|
CVE-2023-2660 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#4sql-injection-vulnerability-in-view_categoriesphp
|
||
|
CVE-2023-2660 - https://vuldb.com/?id.228802
|
||
|
CVE-2023-26602 - http://packetstormsecurity.com/files/171137/ASUS-ASMB8-iKVM-1.14.51-SNMP-Remote-Root.html
|
||
|
CVE-2023-26602 - http://seclists.org/fulldisclosure/2023/Feb/15
|
||
|
CVE-2023-26602 - https://nwsec.de/NWSSA-002-2023.txt
|
||
|
CVE-2023-26604 - http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
|
||
|
CVE-2023-26604 - https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
|
||
|
CVE-2023-26609 - http://packetstormsecurity.com/files/171136/ABUS-Security-Camera-TVIP-20000-21150-LFI-Remote-Code-Execution.html
|
||
|
CVE-2023-26609 - http://seclists.org/fulldisclosure/2023/Feb/16
|
||
|
CVE-2023-26609 - https://nwsec.de/NWSSA-001-2023.txt
|
||
|
CVE-2023-2661 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Online-Computer-and-Laptop-Store---Multiple-vulnerabilities.md#5sql-injection-vulnerability-in-classesmasterphp
|
||
|
CVE-2023-26612 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo
|
||
|
CVE-2023-26613 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/excu_shell
|
||
|
CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1
|
||
|
CVE-2023-26615 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetMultipleActions
|
||
|
CVE-2023-26616 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/SetParentsControlInfo
|
||
|
CVE-2023-2662 - https://forum.xpdfreader.com/viewtopic.php?t=42505
|
||
|
CVE-2023-2663 - https://forum.xpdfreader.com/viewtopic.php?t=42421
|
||
|
CVE-2023-2664 - https://forum.xpdfreader.com/viewtopic.php?t=42422
|
||
|
CVE-2023-2666 - https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f
|
||
|
CVE-2023-2667 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2667.md
|
||
|
CVE-2023-2668 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2668.md
|
||
|
CVE-2023-2669 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2669.md
|
||
|
CVE-2023-26692 - http://packetstormsecurity.com/files/171787/ZCBS-ZBBS-ZPBS-4.14k-Cross-Site-Scripting.html
|
||
|
CVE-2023-2670 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2670.md
|
||
|
CVE-2023-2670 - https://vuldb.com/?id.228886
|
||
|
CVE-2023-2671 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2671.md
|
||
|
CVE-2023-2672 - https://github.com/tht1997/CVE_2023/blob/main/Lost%20and%20Found%20Information%20System/CVE-2023-2672.md
|
||
|
CVE-2023-26733 - https://github.com/10cksYiqiyinHangzhouTechnology/Security-Issue-Report-of-TinyTIFF/blob/main/README.md
|
||
|
CVE-2023-26733 - https://github.com/jkriege2/TinyTIFF/issues/19
|
||
|
CVE-2023-26735 - https://github.com/prometheus/blackbox_exporter/issues/1024
|
||
|
CVE-2023-2674 - https://huntr.dev/bounties/af73e913-730c-4245-88ce-26fc908d3644
|
||
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755
|
||
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955
|
||
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813
|
||
|
CVE-2023-26750 - https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351
|
||
|
CVE-2023-26756 - https://googleinformationsworld.blogspot.com/2023/04/revive-adserver-541-vulnerable-to-brute.html
|
||
|
CVE-2023-26758 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
||
|
CVE-2023-26759 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
||
|
CVE-2023-2676 - https://github.com/xinzhihen06/dxq-cve/blob/main/h3cr160.md
|
||
|
CVE-2023-26760 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
||
|
CVE-2023-26762 - https://www.swascan.com/it/security-advisory-sme-up-erp/
|
||
|
CVE-2023-26767 - https://github.com/liblouis/liblouis/issues/1292
|
||
|
CVE-2023-26768 - https://github.com/liblouis/liblouis/issues/1301
|
||
|
CVE-2023-26773 - https://packetstormsecurity.com/files/171686/Sales-Tracker-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-26774 - https://packetstormsecurity.com/files/171692/Sales-Tracker-Management-System-1.0-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2023-26775 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html
|
||
|
CVE-2023-26776 - http://packetstormsecurity.com/files/171705/Monitorr-1.7.6-Cross-Site-Scripting.html
|
||
|
CVE-2023-26777 - http://packetstormsecurity.com/files/171699/Uptime-Kuma-1.19.6-Cross-Site-Scripting.html
|
||
|
CVE-2023-26800 - https://github.com/winmt/my-vuls/tree/main/RG-EW1200
|
||
|
CVE-2023-26801 - https://github.com/winmt/my-vuls/tree/main/LB-LINK%20BL-AC1900%2C%20BL-WR9000%2C%20BL-X26%20and%20BL-LTE300%20Wireless%20Routers
|
||
|
CVE-2023-26802 - https://github.com/winmt/my-vuls/tree/main/DCN%20DCBI-Netlog-LAB
|
||
|
CVE-2023-26805 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/formIPMacBindModify.md
|
||
|
CVE-2023-26806 - https://github.com/Stevenbaga/fengsha/blob/main/W20E/SetSysTime.md
|
||
|
CVE-2023-26817 - https://github.com/PGYER/codefever/issues/140
|
||
|
CVE-2023-26820 - https://github.com/netptop/siteproxy/issues/67
|
||
|
CVE-2023-26822 - https://github.com/yzskyt/Vuln/blob/main/Go-RT-AC750/Go-RT-AC750.md
|
||
|
CVE-2023-26839 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26839
|
||
|
CVE-2023-26840 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26840
|
||
|
CVE-2023-26841 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26841
|
||
|
CVE-2023-26842 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842
|
||
|
CVE-2023-26843 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26843
|
||
|
CVE-2023-26848 - https://github.com/Am1ngl/ttt/tree/main/23
|
||
|
CVE-2023-26858 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/28/faqs.html
|
||
|
CVE-2023-26860 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/04/lgbudget.html
|
||
|
CVE-2023-26864 - https://friends-of-presta.github.io/security-advisories/modules/2023/01/17/smplredirectionsmanager.html
|
||
|
CVE-2023-26865 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/20/bdroppy.html
|
||
|
CVE-2023-26876 - http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html
|
||
|
CVE-2023-26876 - https://gist.github.com/rodnt/a190d14d1715890d8df19bad58b90693
|
||
|
CVE-2023-2690 - https://vuldb.com/?id.228971
|
||
|
CVE-2023-2691 - https://vuldb.com/?id.228972
|
||
|
CVE-2023-26912 - https://github.com/xenv/S-mall-ssm/issues/37
|
||
|
CVE-2023-26913 - https://wanheiqiyihu.top/2023/02/13/Evolucare-Ecsimaging-new-movie-php%E5%8F%8D%E5%B0%84%E6%80%A7xss/
|
||
|
CVE-2023-26918 - http://packetstormsecurity.com/files/171879/File-Replication-Pro-7.5.0-Insecure-Permissions-Privilege-Escalation.html
|
||
|
CVE-2023-26919 - https://github.com/javadelight/delight-nashorn-sandbox/issues/135
|
||
|
CVE-2023-26921 - https://github.com/closethe/AG550QCN_CommandInjection_ql_atfwd/blob/main/README.md
|
||
|
CVE-2023-26922 - https://github.com/varigit/matrix-gui-v2/issues/1
|
||
|
CVE-2023-26923 - https://github.com/musescore/MuseScore/issues/16346
|
||
|
CVE-2023-26925 - https://github.com/laotun-s/POC/blob/main/CVE-2023-26925.txt
|
||
|
CVE-2023-2693 - https://vuldb.com/?id.228974
|
||
|
CVE-2023-26934 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy
|
||
|
CVE-2023-26935 - https://github.com/huanglei3/xpdf_heapoverflow
|
||
|
CVE-2023-26936 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString
|
||
|
CVE-2023-26937 - https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring
|
||
|
CVE-2023-26938 - https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock
|
||
|
CVE-2023-26949 - https://github.com/keheying/onekeyadmin/issues/1
|
||
|
CVE-2023-26950 - https://github.com/keheying/onekeyadmin/issues/9
|
||
|
CVE-2023-26952 - https://github.com/keheying/onekeyadmin/issues/7
|
||
|
CVE-2023-26953 - https://github.com/keheying/onekeyadmin/issues/8
|
||
|
CVE-2023-26954 - https://github.com/keheying/onekeyadmin/issues/11
|
||
|
CVE-2023-26956 - https://github.com/keheying/onekeyadmin/issues/4
|
||
|
CVE-2023-26958 - https://medium.com/@shiva.infocop/stored-xss-park-ticketing-management-system-phpgurukul-893583dc2e20
|
||
|
CVE-2023-26959 - https://medium.com/@shiva.infocop/authentication-bypass-park-ticketing-management-system-phpgurukul-427045159c05
|
||
|
CVE-2023-2696 - https://vuldb.com/?id.228977
|
||
|
CVE-2023-26961 - https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3
|
||
|
CVE-2023-26966 - https://gitlab.com/libtiff/libtiff/-/issues/530
|
||
|
CVE-2023-26974 - https://github.com/overXsky/IrfanviewPoc
|
||
|
CVE-2023-26976 - https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/AC6/205_1
|
||
|
CVE-2023-26978 - https://github.com/Am1ngl/ttt/tree/main/28
|
||
|
CVE-2023-26984 - https://github.com/Peppermint-Lab/peppermint/tree/master
|
||
|
CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw
|
||
|
CVE-2023-26987 - https://docs.google.com/document/d/14DYoZfKN__As8gBXMFae7wChKJXpmbuUdMn2Gf803Lw/edit
|
||
|
CVE-2023-2699 - https://vuldb.com/?id.228980
|
||
|
CVE-2023-26991 - https://github.com/matthiaskramm/swftools/issues/196
|
||
|
CVE-2023-26998 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/
|
||
|
CVE-2023-26999 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/
|
||
|
CVE-2023-27000 - https://piotrryciak.com/posts/netscout-multiple-vulnerabilities/
|
||
|
CVE-2023-27008 - https://plantplants213607121.wordpress.com/2023/02/16/atutor-2-2-1-cross-site-scripting-via-the-token-body-parameter/
|
||
|
CVE-2023-27010 - https://packetstormsecurity.com/files/171301/Wondershare-Dr-Fone-12.9.6-Weak-Permissions-Privilege-Escalation.html
|
||
|
CVE-2023-27012 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/5/5.md
|
||
|
CVE-2023-27013 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/2/2.md
|
||
|
CVE-2023-27014 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/10/10.md
|
||
|
CVE-2023-27015 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/4/4.md
|
||
|
CVE-2023-27016 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/3/3.md
|
||
|
CVE-2023-27017 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/6/6.md
|
||
|
CVE-2023-27018 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/7/7.md
|
||
|
CVE-2023-27019 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/8/8.md
|
||
|
CVE-2023-27020 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/1/1.md
|
||
|
CVE-2023-27021 - https://github.com/DrizzlingSun/Tenda/blob/main/AC10/9/9.md
|
||
|
CVE-2023-27032 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/11/advancedpopupcreator.html
|
||
|
CVE-2023-27035 - https://forum.obsidian.md/t/embedded-web-pages-in-obsidian-canvas-can-use-sensitive-web-apis-without-the-users-permission-grant/54509
|
||
|
CVE-2023-27035 - https://github.com/fivex3/CVE-2023-27035
|
||
|
CVE-2023-27040 - https://www.exploit-db.com/exploits/50214
|
||
|
CVE-2023-27042 - https://github.com/hujianjie123/vuln/blob/main/Tenda/SetFirewallCfg/readme.md
|
||
|
CVE-2023-27054 - https://github.com/miroslavpejic85/mirotalk/issues/139
|
||
|
CVE-2023-27055 - https://github.com/StolidWaffle/AVer-PTZApp2
|
||
|
CVE-2023-27059 - https://github.com/ChurchCRM/CRM/issues/6450
|
||
|
CVE-2023-27061 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formWifiFilterRulesModify.md
|
||
|
CVE-2023-27062 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formPortalAuth.md
|
||
|
CVE-2023-27063 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formModifyDnsForward.md
|
||
|
CVE-2023-27064 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelDnsForward.md
|
||
|
CVE-2023-27065 - https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelWewifiPic.md
|
||
|
CVE-2023-27069 - https://www.edoardoottavianelli.it/CVE-2023-27069/
|
||
|
CVE-2023-27069 - https://www.youtube.com/watch?v=Ryuz1gymiw8
|
||
|
CVE-2023-27070 - https://www.edoardoottavianelli.it/CVE-2023-27070/
|
||
|
CVE-2023-27070 - https://www.youtube.com/watch?v=4WJqcseH5qk
|
||
|
CVE-2023-27073 - https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt
|
||
|
CVE-2023-27077 - https://github.com/B2eFly/Router/blob/main/360/360D901.md
|
||
|
CVE-2023-27078 - https://github.com/B2eFly/Router/blob/main/TPLINK/MR3020/1.md
|
||
|
CVE-2023-27079 - https://github.com/B2eFly/Router/blob/main/Tenda/G103/2.md
|
||
|
CVE-2023-27098 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098
|
||
|
CVE-2023-27100 - http://packetstormsecurity.com/files/171791/pfsenseCE-2.6.0-Protection-Bypass.html
|
||
|
CVE-2023-27102 - https://github.com/strukturag/libde265/issues/393
|
||
|
CVE-2023-27103 - https://github.com/strukturag/libde265/issues/394
|
||
|
CVE-2023-27107 - https://gist.github.com/smidtbx10/f8ff1c4977b7f54886c6a52e9ef4e816
|
||
|
CVE-2023-27114 - https://github.com/radareorg/radare2/issues/21363
|
||
|
CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1938
|
||
|
CVE-2023-27115 - https://github.com/WebAssembly/wabt/issues/1992
|
||
|
CVE-2023-27116 - https://github.com/WebAssembly/wabt/issues/1984
|
||
|
CVE-2023-27117 - https://github.com/WebAssembly/wabt/issues/1989
|
||
|
CVE-2023-27119 - https://github.com/WebAssembly/wabt/issues/1990
|
||
|
CVE-2023-27121 - https://www.mdsec.co.uk/2023/09/the-not-so-pleasant-password-manager/
|
||
|
CVE-2023-27130 - https://github.com/typecho/typecho/issues/1535
|
||
|
CVE-2023-27131 - https://github.com/typecho/typecho/issues/1536
|
||
|
CVE-2023-27132 - https://packetstormsecurity.com/files/174271
|
||
|
CVE-2023-27133 - https://packetstormsecurity.com/files/174272
|
||
|
CVE-2023-27135 - https://github.com/Am1ngl/ttt/tree/main/29
|
||
|
CVE-2023-27159 - https://gist.github.com/b33t1e/43b26c31e895baf7e7aea2dbf9743a9a
|
||
|
CVE-2023-27159 - https://gist.github.com/b33t1e/e9e8192317c111e7897e04d2f9bf5fdb
|
||
|
CVE-2023-27160 - https://gist.github.com/b33t1e/6172286862a4486b5888f3cbbdc6316d
|
||
|
CVE-2023-27161 - https://gist.github.com/b33t1e/5c067e0538a0b712dc3d59bd4b9a5952
|
||
|
CVE-2023-27162 - https://gist.github.com/b33t1e/6121210ebd9efd4f693c73b830d8ab08
|
||
|
CVE-2023-27163 - http://packetstormsecurity.com/files/174128/Request-Baskets-1.2.1-Server-Side-Request-Forgery.html
|
||
|
CVE-2023-27163 - http://packetstormsecurity.com/files/174129/Maltrail-0.53-Remote-Code-Execution.html
|
||
|
CVE-2023-27163 - https://gist.github.com/b33t1e/3079c10c88cad379fb166c389ce3b7b3
|
||
|
CVE-2023-27164 - https://gist.github.com/b33t1e/a1a0d81b1173d0d00de8f4e7958dd867
|
||
|
CVE-2023-27167 - https://packetstormsecurity.com/files/171523/Suprema-BioStar-2-2.8.16-SQL-Injection.html
|
||
|
CVE-2023-27179 - http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html
|
||
|
CVE-2023-2718 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins
|
||
|
CVE-2023-27191 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security
|
||
|
CVE-2023-27191 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27191/CVE%20detail.md
|
||
|
CVE-2023-27192 - https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security
|
||
|
CVE-2023-27192 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.md
|
||
|
CVE-2023-27193 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27193/CVE%20detail.md
|
||
|
CVE-2023-27225 - https://packetstormsecurity.com
|
||
|
CVE-2023-27229 - https://github.com/Am1ngl/ttt/tree/main/30
|
||
|
CVE-2023-27231 - https://github.com/Am1ngl/ttt/tree/main/31
|
||
|
CVE-2023-27232 - https://github.com/Am1ngl/ttt/tree/main/32
|
||
|
CVE-2023-27233 - https://gist.github.com/renanavs/dcb13bb1cd618ce7eb0c80290b837245
|
||
|
CVE-2023-27234 - https://github.com/Cherry-toto/jizhicms/issues/85
|
||
|
CVE-2023-27235 - https://github.com/Cherry-toto/jizhicms/issues/85
|
||
|
CVE-2023-2724 - http://packetstormsecurity.com/files/173131/Chrome-Internal-JavaScript-Object-Access-Via-Origin-Trials.html
|
||
|
CVE-2023-27249 - https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc
|
||
|
CVE-2023-27249 - https://github.com/keepinggg/poc/tree/main/poc_of_swfdump
|
||
|
CVE-2023-27249 - https://github.com/matthiaskramm/swftools/issues/197
|
||
|
CVE-2023-27253 - http://packetstormsecurity.com/files/173487/pfSense-Restore-RRD-Data-Command-Injection.html
|
||
|
CVE-2023-27263 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27264 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27265 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27266 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27267 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27268 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27269 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27270 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27271 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27290 - http://packetstormsecurity.com/files/171770/IBM-Instana-243-0-Missing-Authentication.html
|
||
|
CVE-2023-27292 - https://www.tenable.com/security/research/tra-2023-8
|
||
|
CVE-2023-27293 - https://www.tenable.com/security/research/tra-2023-8
|
||
|
CVE-2023-27294 - https://www.tenable.com/security/research/tra-2023-8
|
||
|
CVE-2023-27295 - https://www.tenable.com/security/research/tra-2023-8
|
||
|
CVE-2023-2730 - https://huntr.dev/bounties/6c6f5c26-d545-4e7b-82bb-1fe28006c885
|
||
|
CVE-2023-2731 - https://gitlab.com/libtiff/libtiff/-/issues/548
|
||
|
CVE-2023-27350 - http://packetstormsecurity.com/files/171982/PaperCut-MF-NG-Authentication-Bypass-Remote-Code-Execution.html
|
||
|
CVE-2023-27350 - http://packetstormsecurity.com/files/172022/PaperCut-NG-MG-22.0.4-Authentication-Bypass.html
|
||
|
CVE-2023-27350 - http://packetstormsecurity.com/files/172512/PaperCut-NG-MG-22.0.4-Remote-Code-Execution.html
|
||
|
CVE-2023-27350 - http://packetstormsecurity.com/files/172780/PaperCut-PaperCutNG-Authentication-Bypass.html
|
||
|
CVE-2023-27350 - https://news.sophos.com/en-us/2023/04/27/increased-exploitation-of-papercut-drawing-blood-around-the-internet/
|
||
|
CVE-2023-27372 - http://packetstormsecurity.com/files/171921/SPIP-Remote-Command-Execution.html
|
||
|
CVE-2023-27372 - http://packetstormsecurity.com/files/173044/SPIP-4.2.1-Remote-Code-Execution.html
|
||
|
CVE-2023-27379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1756
|
||
|
CVE-2023-2738 - https://github.com/RCEraser/cve/blob/main/tongda.md
|
||
|
CVE-2023-27380 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1780
|
||
|
CVE-2023-27390 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744
|
||
|
CVE-2023-27390 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744
|
||
|
CVE-2023-27395 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1735
|
||
|
CVE-2023-27396 - https://www.fa.omron.co.jp/product/vulnerability/OMSR-2023-003_ja.pdf
|
||
|
CVE-2023-27396 - https://www.ia.omron.com/product/vulnerability/OMSR-2023-003_en.pdf
|
||
|
CVE-2023-2744 - http://packetstormsecurity.com/files/175106/WordPress-WP-ERP-1.12.2-SQL-Injection.html
|
||
|
CVE-2023-2745 - http://packetstormsecurity.com/files/172426/WordPress-Core-6.2-XSS-CSRF-Directory-Traversal.html
|
||
|
CVE-2023-27479 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qxjg-jhgw-qhrv
|
||
|
CVE-2023-27482 - https://github.com/elttam/publications/blob/master/writeups/home-assistant/supervisor-authentication-bypass-advisory.md
|
||
|
CVE-2023-27482 - https://www.elttam.com/blog/pwnassistant/
|
||
|
CVE-2023-27487 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5375-pq35-hf2g
|
||
|
CVE-2023-27488 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-9g5w-hqr3-w2ph
|
||
|
CVE-2023-27491 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rp
|
||
|
CVE-2023-27492 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2
|
||
|
CVE-2023-27493 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q
|
||
|
CVE-2023-27496 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-j79q-2g66-2xv5
|
||
|
CVE-2023-27497 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27498 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27499 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27500 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27501 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27516 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754
|
||
|
CVE-2023-2752 - https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4
|
||
|
CVE-2023-27524 - http://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html
|
||
|
CVE-2023-27524 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
|
||
|
CVE-2023-2753 - https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628
|
||
|
CVE-2023-2756 - https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44
|
||
|
CVE-2023-27561 - https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9
|
||
|
CVE-2023-27561 - https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334
|
||
|
CVE-2023-27561 - https://github.com/opencontainers/runc/issues/3751
|
||
|
CVE-2023-27566 - https://github.com/openl2d/moc3ingbird
|
||
|
CVE-2023-27568 - http://packetstormsecurity.com/files/172257/Spryker-Commerce-OS-1.0-SQL-Injection.html
|
||
|
CVE-2023-27569 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/
|
||
|
CVE-2023-27570 - https://security.profileo.com/cve/eo_tags_2023-27569-27570/
|
||
|
CVE-2023-27571 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/
|
||
|
CVE-2023-27572 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-arris-dg3450-cable-gateway/
|
||
|
CVE-2023-2758 - https://www.tenable.com/security/research/tra-2023-21
|
||
|
CVE-2023-27581 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2023-27586 - https://github.com/Kozea/CairoSVG/security/advisories/GHSA-rwmf-w63j-p7gv
|
||
|
CVE-2023-27598 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-27599 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-27600 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-27601 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-27635 - https://bugs.debian.org/1031267
|
||
|
CVE-2023-27637 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html
|
||
|
CVE-2023-27638 - https://friends-of-presta.github.io/security-advisories/module/2023/03/21/tshirtecommerce_cwe-89.html
|
||
|
CVE-2023-27639 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html
|
||
|
CVE-2023-27640 - https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html
|
||
|
CVE-2023-27641 - https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD
|
||
|
CVE-2023-27643 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27643/CVE%20detail.md
|
||
|
CVE-2023-27645 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27645/CVE%20detail.md
|
||
|
CVE-2023-27647 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md
|
||
|
CVE-2023-27648 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27648/CVE%20detail.md
|
||
|
CVE-2023-27649 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27649/CVE%20detail.md
|
||
|
CVE-2023-2765 - https://github.com/eckert-lcc/cve/blob/main/Weaver%20oa.md
|
||
|
CVE-2023-2765 - https://vuldb.com/?id.229270
|
||
|
CVE-2023-27651 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27651/CVE%20detail.md
|
||
|
CVE-2023-27655 - https://forum.xpdfreader.com/viewtopic.php?t=42398
|
||
|
CVE-2023-27655 - https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2
|
||
|
CVE-2023-27655 - https://github.com/keepinggg/poc/tree/main/poc_of_xpdf
|
||
|
CVE-2023-2766 - https://github.com/8079048q/cve/blob/main/weaveroa.md
|
||
|
CVE-2023-2769 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Serviced-Providerd-Managementd-Systemd--d-SQLd-injections.md
|
||
|
CVE-2023-2770 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md
|
||
|
CVE-2023-27707 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-group/
|
||
|
CVE-2023-27709 - https://srpopty.github.io/2023/02/27/DedeCMS-V5.7.160-Backend-SQLi-story/
|
||
|
CVE-2023-2771 - https://github.com/tht1997/CVE_2023/blob/main/online_exam/kelasdosen.md
|
||
|
CVE-2023-27711 - https://github.com/typecho/typecho/issues/1539
|
||
|
CVE-2023-27711 - https://srpopty.github.io/2023/03/02/Typecho-V1.2.0-Backend-Reflected-XSS-cid/
|
||
|
CVE-2023-27718 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/1.md
|
||
|
CVE-2023-27719 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/2.md
|
||
|
CVE-2023-27720 - https://github.com/HolyTruth/DIR_878-1.30B08/blob/main/4.md
|
||
|
CVE-2023-27727 - https://github.com/nginx/njs/issues/617
|
||
|
CVE-2023-27728 - https://github.com/nginx/njs/issues/618
|
||
|
CVE-2023-27729 - https://github.com/nginx/njs/issues/619
|
||
|
CVE-2023-27730 - https://github.com/nginx/njs/issues/615
|
||
|
CVE-2023-27739 - https://threeshield.ca/easyxdm-2.5.20.html
|
||
|
CVE-2023-27742 - https://github.com/G37SYS73M/CVE-2023-27742
|
||
|
CVE-2023-27744 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||
|
CVE-2023-27745 - https://www.southrivertech.com/software/nextgen/titanftp/en/relnotes.pdf
|
||
|
CVE-2023-27754 - https://github.com/10cksYiqiyinHangzhouTechnology/vox2mesh_poc
|
||
|
CVE-2023-27775 - https://github.com/marcovntr/CVE/blob/main/2023/CVE-2023-27775/CVE-2023-27775.md
|
||
|
CVE-2023-27779 - https://docs.google.com/document/d/1kGzmc6AOCfRzJf9mDz4emkhQj84Y1XemmAMZjYK32-o/edit?usp=sharing
|
||
|
CVE-2023-27781 - https://github.com/tjko/jpegoptim/issues/132
|
||
|
CVE-2023-27783 - https://github.com/appneta/tcpreplay/issues/780
|
||
|
CVE-2023-27784 - https://github.com/appneta/tcpreplay/issues/787
|
||
|
CVE-2023-2779 - http://packetstormsecurity.com/files/173053/WordPress-Super-Socializer-7.13.52-Cross-Site-Scripting.html
|
||
|
CVE-2023-27796 - https://github.com/winmt/my-vuls/tree/main/RG-EW%20PRO%20Series
|
||
|
CVE-2023-2780 - https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689
|
||
|
CVE-2023-27801 - https://hackmd.io/@0dayResearch/DelDNSHnList
|
||
|
CVE-2023-27802 - https://hackmd.io/@0dayResearch/EditvsList
|
||
|
CVE-2023-27803 - https://hackmd.io/@0dayResearch/EdittriggerList
|
||
|
CVE-2023-27804 - https://hackmd.io/@0dayResearch/DelvsList
|
||
|
CVE-2023-27805 - https://hackmd.io/@0dayResearch/EditSTList
|
||
|
CVE-2023-27806 - https://hackmd.io/@0dayResearch/ipqos_lanip_dellist
|
||
|
CVE-2023-27807 - https://hackmd.io/@0dayResearch/Delstlist
|
||
|
CVE-2023-27808 - https://hackmd.io/@0dayResearch/DeltriggerList
|
||
|
CVE-2023-27810 - https://hackmd.io/@0dayResearch/ipqos_lanip_editlist
|
||
|
CVE-2023-27821 - https://github.com/luelueking/Databasir-1.0.7-vuln-poc
|
||
|
CVE-2023-27821 - https://github.com/vran-dev/databasir/issues/269
|
||
|
CVE-2023-27823 - https://packetstormsecurity.com/files/172276/Optoma-1080PSTX-Firmware-C02-Authentication-Bypass.html
|
||
|
CVE-2023-27826 - https://www.exploit-db.com/exploits/51311
|
||
|
CVE-2023-27830 - https://medium.com/nestedif/vulnerability-disclosure-privilege-escalation-tightvnc-8165208cce
|
||
|
CVE-2023-27842 - http://blog.tristaomarinho.com/extplorer-2-1-15-insecure-permissions-following-remote-code-execution/
|
||
|
CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842
|
||
|
CVE-2023-27842 - https://github.com/tristao-marinho/CVE-2023-27842/blob/main/README.md
|
||
|
CVE-2023-27843 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/25/askforaquote.html
|
||
|
CVE-2023-27847 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/23/xipblog.html
|
||
|
CVE-2023-27848 - https://github.com/omnitaint/Vulnerability-Reports/blob/9d65add2bca71ed6d6b2e281ee6790a12504ff8e/reports/broccoli-compass/report.md
|
||
|
CVE-2023-27849 - https://github.com/omnitaint/Vulnerability-Reports/blob/2211ea4712f24d20b7f223fb737910fdfb041edb/reports/rails-routes-to-json/report.md
|
||
|
CVE-2023-2787 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-2788 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27882 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1733
|
||
|
CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/cflow/stack-overflow/parser.c/README.md
|
||
|
CVE-2023-2789 - https://github.com/DaisyPo/fuzzing-vulncollect/files/11343936/poc-file.zip
|
||
|
CVE-2023-2789 - https://vuldb.com/?id.229373
|
||
|
CVE-2023-27890 - http://packetstormsecurity.com/files/171421/MyBB-Export-User-2.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-27892 - https://blog.inhq.net/posts/keepkey-CVE-2023-27892/
|
||
|
CVE-2023-27893 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27894 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27895 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27896 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-27897 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-2791 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-2792 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-2793 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27935 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1676
|
||
|
CVE-2023-2796 - http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2023-2797 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-27974 - https://flashpoint.io/blog/bitwarden-password-pilfering/
|
||
|
CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118
|
||
|
CVE-2023-2804 - https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675
|
||
|
CVE-2023-2808 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-28095 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-28096 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-28097 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-28098 - https://opensips.org/pub/audit-2022/opensips-audit-technical-report-full.pdf
|
||
|
CVE-2023-28100 - https://marc.info/?l=oss-security&m=167879021709955&w=2
|
||
|
CVE-2023-28102 - https://securitylab.github.com/advisories/GHSL-2022-094_discordrb/
|
||
|
CVE-2023-28106 - https://huntr.dev/bounties/fa77d780-9b23-404b-8c44-12108881d11a
|
||
|
CVE-2023-28115 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
|
||
|
CVE-2023-28121 - https://www.rcesecurity.com/2023/07/patch-diffing-cve-2023-28121-to-compromise-a-woocommerce/
|
||
|
CVE-2023-28128 - http://packetstormsecurity.com/files/172398/Ivanti-Avalanche-FileStoreConfig-Shell-Upload.html
|
||
|
CVE-2023-28130 - http://packetstormsecurity.com/files/173918/Checkpoint-Gaia-Portal-R81.10-Remote-Command-Execution.html
|
||
|
CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Aug/4
|
||
|
CVE-2023-28130 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-28131 - https://www.darkreading.com/endpoint/oauth-flaw-in-expo-platform-affects-hundreds-of-third-party-sites-apps
|
||
|
CVE-2023-2814 - https://vuldb.com/?id.229428
|
||
|
CVE-2023-28140 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-28141 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-28142 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-28143 - https://qualys.com/security-advisories
|
||
|
CVE-2023-28153 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-kiddoware-kids-place-parental-control-android-app/
|
||
|
CVE-2023-28159 - https://bugzilla.mozilla.org/show_bug.cgi?id=1783561
|
||
|
CVE-2023-28163 - https://bugzilla.mozilla.org/show_bug.cgi?id=1817768
|
||
|
CVE-2023-2817 - https://www.tenable.com/security/research/tra-2023-20,
|
||
|
CVE-2023-28180 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1679
|
||
|
CVE-2023-28248 - http://packetstormsecurity.com/files/172283/Windows-Kernel-CmpCleanupLightWeightPrepare-Use-After-Free.html
|
||
|
CVE-2023-28252 - http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html
|
||
|
CVE-2023-2826 - https://vuldb.com/?id.229612
|
||
|
CVE-2023-2827 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-28271 - http://packetstormsecurity.com/files/172298/Windows-Kernel-Uninitialized-Memory-Pointer-Disclosure.html
|
||
|
CVE-2023-28285 - http://packetstormsecurity.com/files/173127/Microsoft-Office-Remote-Code-Execution.html
|
||
|
CVE-2023-28285 - http://packetstormsecurity.com/files/173140/Microsoft-365-MSO-2305-Build-16.0.16501.20074-Remote-Code-Execution.html
|
||
|
CVE-2023-28288 - http://packetstormsecurity.com/files/173126/Microsoft-SharePoint-Enterprise-Server-2016-Spoofing.html
|
||
|
CVE-2023-28293 - http://packetstormsecurity.com/files/172300/Windows-Kernel-CmpDoReDoCreateKey-CmpDoReOpenTransKey-Out-Of-Bounds-Read.html
|
||
|
CVE-2023-28293 - http://packetstormsecurity.com/files/173135/Microsoft-Windows-11-22h2-Kernel-Privilege-Escalation.html
|
||
|
CVE-2023-2831 - https://mattermost.com/security-updates/
|
||
|
CVE-2023-2832 - https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb
|
||
|
CVE-2023-28343 - http://packetstormsecurity.com/files/171775/Altenergy-Power-Control-Software-C1.2.5-Command-Injection.html
|
||
|
CVE-2023-28343 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/os_command_injection.md
|
||
|
CVE-2023-28344 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28344 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28345 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28345 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28346 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28346 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28347 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28347 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28348 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28348 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28349 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28349 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28350 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28350 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28351 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28351 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28352 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28352 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28353 - https://research.nccgroup.com/2023/05/30/technical-advisory-multiple-vulnerabilities-in-faronics-insight/
|
||
|
CVE-2023-28353 - https://research.nccgroup.com/?research=Technical%20advisories
|
||
|
CVE-2023-28365 - https://community.ui.com/releases/Security-Advisory-Bulletin-031-031/8c85fc64-e9a8-4082-9ec4-56b14effd545
|
||
|
CVE-2023-2837 - https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17
|
||
|
CVE-2023-28379 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738
|
||
|
CVE-2023-2838 - https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f
|
||
|
CVE-2023-28381 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779
|
||
|
CVE-2023-2839 - https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f
|
||
|
CVE-2023-28391 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732
|
||
|
CVE-2023-28393 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1742
|
||
|
CVE-2023-2840 - https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257
|
||
|
CVE-2023-28428 - https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-68x8-9phf-j7jf
|
||
|
CVE-2023-28430 - https://securitylab.github.com/advisories/GHSL-2023-051_React_Native_OneSignal_SDK/
|
||
|
CVE-2023-28436 - https://tailscale.com/security-bulletins/#ts-2023-003
|
||
|
CVE-2023-2844 - https://huntr.dev/bounties/6644b36e-603d-4dbe-8ee2-5df8b8fb2e22
|
||
|
CVE-2023-28443 - https://github.com/directus/directus/commit/349536303983ccba68ecb3e4fb35315424011afc
|
||
|
CVE-2023-28443 - https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7
|
||
|
CVE-2023-28446 - https://github.com/denoland/deno/security/advisories/GHSA-vq67-rp93-65qf
|
||
|
CVE-2023-2845 - https://huntr.dev/bounties/ac10e81c-998e-4425-9d74-b985d9b0254c
|
||
|
CVE-2023-28450 - https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG
|
||
|
CVE-2023-28466 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
|
||
|
CVE-2023-28485 - http://packetstormsecurity.com/files/172649/Wekan-6.74-Cross-Site-Scripting.html
|
||
|
CVE-2023-28485 - https://wekan.github.io/hall-of-fame/filebleed/
|
||
|
CVE-2023-28488 - https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488
|
||
|
CVE-2023-28489 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
||
|
CVE-2023-28489 - http://seclists.org/fulldisclosure/2023/Jul/14
|
||
|
CVE-2023-2850 - https://github.com/NodeBB/NodeBB/commit/51096ad2345fb1d1380bec0a447113489ef6c359
|
||
|
CVE-2023-28501 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28502 - http://packetstormsecurity.com/files/171853/Rocket-Software-Unidata-8.2.4-Build-3003-Buffer-Overflow.html
|
||
|
CVE-2023-28502 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28503 - http://packetstormsecurity.com/files/171854/Rocket-Software-Unidata-udadmin_server-Authentication-Bypass.html
|
||
|
CVE-2023-28503 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28504 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28505 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28506 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28507 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28508 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28509 - https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/
|
||
|
CVE-2023-28528 - http://packetstormsecurity.com/files/172458/IBM-AIX-7.2-inscout-Privilege-Escalation.html
|
||
|
CVE-2023-2859 - https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba
|
||
|
CVE-2023-28613 - http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html
|
||
|
CVE-2023-28616 - https://advisories.stormshield.eu/2023-006
|
||
|
CVE-2023-28627 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-6589-x6f5-cgg9
|
||
|
CVE-2023-28628 - https://github.com/lambdaisland/uri/security/advisories/GHSA-cp4w-6x4w-v2h5
|
||
|
CVE-2023-2863 - https://www.youtube.com/watch?v=V0u9C5RVSic
|
||
|
CVE-2023-28637 - https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2
|
||
|
CVE-2023-28659 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-28660 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-28661 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-28662 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-28663 - https://www.tenable.com/security/research/tra-2023-2
|
||
|
CVE-2023-28664 - https://www.tenable.com/security/research/tra-2023-3
|
||
|
CVE-2023-28665 - https://www.tenable.com/security/research/tra-2023-3
|
||
|
CVE-2023-28666 - https://www.tenable.com/security/research/tra-2023-3
|
||
|
CVE-2023-28667 - https://www.tenable.com/security/research/tra-2023-7
|
||
|
CVE-2023-2870 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2870
|
||
|
CVE-2023-2871 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2871
|
||
|
CVE-2023-2872 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2872
|
||
|
CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
|
||
|
CVE-2023-28725 - https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
|
||
|
CVE-2023-2873 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2873
|
||
|
CVE-2023-2874 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2874
|
||
|
CVE-2023-28744 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739
|
||
|
CVE-2023-2875 - https://github.com/zeze-zeze/WindowsKernelVuln/blob/master/CVE-2023-2875
|
||
|
CVE-2023-28761 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-28762 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-28763 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-28764 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-28765 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-28770 - http://packetstormsecurity.com/files/172277/Zyxel-Chained-Remote-Code-Execution.html
|
||
|
CVE-2023-28771 - http://packetstormsecurity.com/files/172820/Zyxel-IKE-Packet-Decoder-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-28772 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
|
||
|
CVE-2023-28809 - http://packetstormsecurity.com/files/174506/Hikvision-Access-Control-Session-Hijacking.html
|
||
|
CVE-2023-2881 - https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416
|
||
|
CVE-2023-28848 - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-52hv-xw32-wf7f
|
||
|
CVE-2023-28850 - https://huntr.dev/bounties/5529f51e-e40f-46f1-887b-c9dbebab4f06/
|
||
|
CVE-2023-28853 - http://www.openwall.com/lists/oss-security/2023/07/06/6
|
||
|
CVE-2023-28853 - https://github.com/mastodon/mastodon/security/advisories/GHSA-38g9-pfm9-gfqv
|
||
|
CVE-2023-28868 - https://herolab.usd.de/en/security-advisories/usd-2022-0002/
|
||
|
CVE-2023-28869 - https://herolab.usd.de/en/security-advisories/usd-2022-0003/
|
||
|
CVE-2023-28870 - https://herolab.usd.de/en/security-advisories/usd-2022-0004/
|
||
|
CVE-2023-28871 - https://herolab.usd.de/en/security-advisories/usd-2022-0005/
|
||
|
CVE-2023-28872 - https://herolab.usd.de/en/security-advisories/usd-2022-0006/
|
||
|
CVE-2023-28873 - https://herolab.usd.de/en/security-advisories/usd-2022-0032/
|
||
|
CVE-2023-28874 - https://herolab.usd.de/en/security-advisories/usd-2022-0033/
|
||
|
CVE-2023-28875 - https://herolab.usd.de/security-advisories/usd-2022-0009/
|
||
|
CVE-2023-28876 - https://herolab.usd.de/security-advisories/usd-2022-0010/
|
||
|
CVE-2023-28879 - http://www.openwall.com/lists/oss-security/2023/04/12/4
|
||
|
CVE-2023-28879 - https://bugs.ghostscript.com/show_bug.cgi?id=706494
|
||
|
CVE-2023-28968 - https://www.juniper.net/documentation/us/en/software/jdpi/release-notes/jdpi-decoder-release-notes-october-2022/jdpi-decoder-release-notes-october-2022.pdf
|
||
|
CVE-2023-2900 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md
|
||
|
CVE-2023-29004 - https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv
|
||
|
CVE-2023-2901 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20User-GetGridJson%20has%20unauthorized%20access%20vulnerability.md
|
||
|
CVE-2023-2901 - https://vuldb.com/?id.229975
|
||
|
CVE-2023-29010 - https://github.com/Budibase/budibase/security/advisories/GHSA-9xg2-9mcv-985p
|
||
|
CVE-2023-29017 - https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d
|
||
|
CVE-2023-29017 - https://github.com/patriksimek/vm2/issues/515
|
||
|
CVE-2023-29017 - https://github.com/patriksimek/vm2/security/advisories/GHSA-7jxr-cg7f-gpgv
|
||
|
CVE-2023-2902 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The%20NFine%20rapid%20development%20platform%20Organize-GetTreeGridJson%20has%20unauthorized%20access%20vulnerability.md
|
||
|
CVE-2023-2902 - https://vuldb.com/?id.229976
|
||
|
CVE-2023-29020 - https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern
|
||
|
CVE-2023-29020 - https://owasp.org/www-community/attacks/csrf
|
||
|
CVE-2023-2903 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20Role-GetGridJson%20has%20unauthorized%20access%20vulnerability.md
|
||
|
CVE-2023-2903 - https://vuldb.com/?id.229977
|
||
|
CVE-2023-2904 - https://www.hidglobal.com/security-center
|
||
|
CVE-2023-29048 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html
|
||
|
CVE-2023-29049 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html
|
||
|
CVE-2023-2905 - https://takeonme.org/cves/CVE-2023-2905.html
|
||
|
CVE-2023-29050 - http://packetstormsecurity.com/files/176421/OX-App-Suite-7.10.6-XSS-Command-Execution-LDAP-Injection.html
|
||
|
CVE-2023-29051 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html
|
||
|
CVE-2023-29052 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html
|
||
|
CVE-2023-2906 - https://gitlab.com/wireshark/wireshark/-/issues/19229
|
||
|
CVE-2023-2906 - https://takeonme.org/cves/CVE-2023-2906.html
|
||
|
CVE-2023-2908 - https://gitlab.com/libtiff/libtiff/-/merge_requests/479
|
||
|
CVE-2023-29084 - http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html
|
||
|
CVE-2023-29085 - http://packetstormsecurity.com/files/172288/Shannon-Baseband-SIP-Status-Line-Stack-Buffer-Overflow.html
|
||
|
CVE-2023-29086 - http://packetstormsecurity.com/files/172293/Shannon-Baseband-SIP-Min-SE-Header-Stack-Buffer-Overflow.html
|
||
|
CVE-2023-29087 - http://packetstormsecurity.com/files/172295/Shannon-Baseband-SIP-Retry-After-Header-Heap-Buffer-Overflow.html
|
||
|
CVE-2023-29088 - http://packetstormsecurity.com/files/172289/Shannon-Baseband-SIP-Session-Expires-Header-Stack-Buffer-Overflow.html
|
||
|
CVE-2023-29089 - http://packetstormsecurity.com/files/172292/Shannon-Baseband-Negative-Size-Memcpy-Out-Of-Bounds-Read.html
|
||
|
CVE-2023-29090 - http://packetstormsecurity.com/files/172287/Shannon-Baseband-Via-Header-Decoder-Stack-Buffer-Overflow.html
|
||
|
CVE-2023-29091 - http://packetstormsecurity.com/files/172282/Shannon-Baseband-SIP-URI-Decoder-Stack-Buffer-Overflow.html
|
||
|
CVE-2023-29108 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29109 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29110 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29159 - https://github.com/encode/starlette/security/advisories/GHSA-v5gw-mw7f-84px
|
||
|
CVE-2023-29185 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29186 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29187 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29188 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29189 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-29199 - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c
|
||
|
CVE-2023-29199 - https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985
|
||
|
CVE-2023-29205 - https://jira.xwiki.org/browse/XWIKI-18568
|
||
|
CVE-2023-29209 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q
|
||
|
CVE-2023-29210 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x
|
||
|
CVE-2023-29211 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-w7v9-fc49-4qg4
|
||
|
CVE-2023-29212 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5f4-p5wv-2475
|
||
|
CVE-2023-29214 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-qx9h-c5v6-ghqh
|
||
|
CVE-2023-2923 - https://github.com/GleamingEyes/vul/blob/main/1.md
|
||
|
CVE-2023-2924 - https://github.com/RCEraser/cve/blob/main/SimField.md
|
||
|
CVE-2023-2925 - https://vuldb.com/?id.230079
|
||
|
CVE-2023-2927 - https://github.com/HuBenLab/HuBenVulList/blob/main/JiZhiCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md
|
||
|
CVE-2023-2928 - https://vuldb.com/?id.230083
|
||
|
CVE-2023-2934 - http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html
|
||
|
CVE-2023-2935 - http://packetstormsecurity.com/files/173196/Chrome-v8-internal-Object-SetPropertyWithAccessor-Type-Confusion.html
|
||
|
CVE-2023-2936 - http://packetstormsecurity.com/files/173197/Chrome-V8-Type-Confusion.html
|
||
|
CVE-2023-29374 - https://github.com/hwchase17/langchain/issues/1026
|
||
|
CVE-2023-29383 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
|
||
|
CVE-2023-29383 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
|
||
|
CVE-2023-29401 - https://github.com/gin-gonic/gin/issues/3555
|
||
|
CVE-2023-2942 - https://huntr.dev/bounties/dd56e7a0-9dff-48fc-bc59-9a22d91869eb
|
||
|
CVE-2023-2943 - https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9
|
||
|
CVE-2023-29439 - https://lourcode.kr/posts/CVE-2023-29439-Analysis?_s_id=cve
|
||
|
CVE-2023-2944 - https://huntr.dev/bounties/0d67dcb1-acc0-4d5d-bb69-a09d1bc9fa1d
|
||
|
CVE-2023-2945 - https://huntr.dev/bounties/62de71bd-333d-4593-91a5-534ef7f0c435
|
||
|
CVE-2023-29459 - http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html
|
||
|
CVE-2023-2946 - https://huntr.dev/bounties/e550f4b0-945c-4886-af7f-ee0dc30b2a08
|
||
|
CVE-2023-29465 - https://github.com/sagemath/FlintQS/issues/3
|
||
|
CVE-2023-2947 - https://huntr.dev/bounties/52534def-acab-4200-a79a-89ef4ce6a0b0
|
||
|
CVE-2023-29478 - https://github.com/Exopteron/BiblioRCE
|
||
|
CVE-2023-2948 - https://huntr.dev/bounties/2393e4d9-9e9f-455f-bf50-f20f77b0a64d
|
||
|
CVE-2023-29489 - https://blog.assetnote.io/2023/04/26/xss-million-websites-cpanel/
|
||
|
CVE-2023-2949 - https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4
|
||
|
CVE-2023-29491 - http://www.openwall.com/lists/oss-security/2023/04/19/11
|
||
|
CVE-2023-2950 - https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86
|
||
|
CVE-2023-29505 - https://excellium-services.com/cert-xlm-advisory/CVE-2023-29505
|
||
|
CVE-2023-29506 - https://jira.xwiki.org/browse/XWIKI-20335
|
||
|
CVE-2023-29510 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4v38-964c-xjmw
|
||
|
CVE-2023-29517 - https://jira.xwiki.org/browse/XWIKI-20324
|
||
|
CVE-2023-29519 - https://jira.xwiki.org/browse/XWIKI-20364
|
||
|
CVE-2023-29523 - https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x764-ff8r-9hpx
|
||
|
CVE-2023-29528 - https://jira.xwiki.org/browse/XWIKI-20348
|
||
|
CVE-2023-29532 - https://bugzilla.mozilla.org/show_bug.cgi?id=1806394
|
||
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816007
|
||
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816059
|
||
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821155
|
||
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821576
|
||
|
CVE-2023-29534 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821906
|
||
|
CVE-2023-29537 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823365
|
||
|
CVE-2023-2954 - https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d
|
||
|
CVE-2023-29541 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810191
|
||
|
CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1810793
|
||
|
CVE-2023-29542 - https://bugzilla.mozilla.org/show_bug.cgi?id=1815062
|
||
|
CVE-2023-29548 - https://bugzilla.mozilla.org/show_bug.cgi?id=1822754
|
||
|
CVE-2023-29562 - https://github.com/lzd521/IOT/tree/main/TP-Link%20WPA7510
|
||
|
CVE-2023-29566 - https://github.com/omnitaint/Vulnerability-Reports/blob/ec3645003c7f8996459b5b24c722474adc2d599f/reports/dawnsparks-node-tesseract/report.md
|
||
|
CVE-2023-29569 - https://github.com/cesanta/mjs/issues/239
|
||
|
CVE-2023-29569 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md
|
||
|
CVE-2023-29570 - https://github.com/cesanta/mjs/issues/240
|
||
|
CVE-2023-29570 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md
|
||
|
CVE-2023-29571 - https://github.com/cesanta/mjs/issues/241
|
||
|
CVE-2023-29571 - https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md
|
||
|
CVE-2023-29573 - https://github.com/axiomatic-systems/Bento4/issues/840
|
||
|
CVE-2023-29573 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4info/readme.md
|
||
|
CVE-2023-29574 - https://github.com/axiomatic-systems/Bento4/issues/841
|
||
|
CVE-2023-29574 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42avc/readme.md
|
||
|
CVE-2023-29575 - https://github.com/axiomatic-systems/Bento4/issues/842
|
||
|
CVE-2023-29575 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp42aac/readme.md
|
||
|
CVE-2023-29576 - https://github.com/axiomatic-systems/Bento4/issues/844
|
||
|
CVE-2023-29576 - https://github.com/z1r00/fuzz_vuln/blob/main/Bento4/mp4decrypt/sigv/readme.md
|
||
|
CVE-2023-29578 - https://github.com/TechSmith/mp4v2/issues/74
|
||
|
CVE-2023-29578 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/mp4property.cpp/readme.md
|
||
|
CVE-2023-29579 - https://github.com/yasm/yasm/issues/214
|
||
|
CVE-2023-29579 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/readmd.md
|
||
|
CVE-2023-29580 - https://github.com/yasm/yasm/issues/215
|
||
|
CVE-2023-29580 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/yasm_expr_create/readmd.md
|
||
|
CVE-2023-29581 - https://github.com/yasm/yasm/issues/216
|
||
|
CVE-2023-29581 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/segv/delete_Token/readme.md
|
||
|
CVE-2023-29582 - https://github.com/yasm/yasm/issues/217
|
||
|
CVE-2023-29582 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr1/readme.md
|
||
|
CVE-2023-29583 - https://github.com/yasm/yasm/issues/218
|
||
|
CVE-2023-29583 - https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/readme.md
|
||
|
CVE-2023-29584 - https://github.com/enzo1982/mp4v2/issues/30
|
||
|
CVE-2023-29584 - https://github.com/z1r00/fuzz_vuln/blob/main/mp4v2/heap-buffer-overflow/MP4GetVideoProfileLevel/readme.md
|
||
|
CVE-2023-29586 - https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html
|
||
|
CVE-2023-29623 - https://portswigger.net/web-security/cross-site-scripting/reflected
|
||
|
CVE-2023-29631 - https://friends-of-presta.github.io/security-advisories/modules/2023/03/13/jmsslider.html
|
||
|
CVE-2023-2964 - https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f
|
||
|
CVE-2023-29656 - https://ramihub.github.io/
|
||
|
CVE-2023-29657 - http://blog.tristaomarinho.com/extplorer-2-1-15-arbitrary-file-upload/
|
||
|
CVE-2023-29659 - https://github.com/strukturag/libheif/issues/794
|
||
|
CVE-2023-29665 - https://github.com/726232111/VulIoT/tree/main/D-Link/DIR823G%20V1.0.2B05/HNAP1/boSetPasswdSettings
|
||
|
CVE-2023-2968 - https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917
|
||
|
CVE-2023-29680 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62
|
||
|
CVE-2023-29680 - https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta
|
||
|
CVE-2023-29681 - https://medium.com/@0ta/tenda-n301-v6-cve-2023-29680-cve-2023-29681-a40f7ae6dc62
|
||
|
CVE-2023-29681 - https://www.youtube.com/watch?v=Xy9_hmpvvA4&ab_channel=0ta
|
||
|
CVE-2023-29689 - http://packetstormsecurity.com/files/174088/Pyro-CMS-3.9-Server-Side-Template-Injection.html
|
||
|
CVE-2023-29693 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/SetTftpUpgrad.md
|
||
|
CVE-2023-29696 - https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md
|
||
|
CVE-2023-2971 - https://starlabs.sg/advisories/23/23-2971/
|
||
|
CVE-2023-29712 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf
|
||
|
CVE-2023-29712 - https://labs.yarix.com/2023/05/vade-secure-gateway-multiple-xss-cve-2023-29712-cve-2023-29713-cve-2023-29714/
|
||
|
CVE-2023-29713 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf
|
||
|
CVE-2023-29714 - https://info.vadesecure.com/hubfs/Ressource%20Marketing%20Website/Datasheet/EN/Vade_Secure_DS_Gateway_EN.pdf
|
||
|
CVE-2023-2972 - https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef
|
||
|
CVE-2023-29722 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29722/CVE%20detail.md
|
||
|
CVE-2023-29724 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29724/CVE%20detail.md
|
||
|
CVE-2023-29726 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md
|
||
|
CVE-2023-29731 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29731/CVE%20detail.md
|
||
|
CVE-2023-29732 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29732/CVE%20detail.md
|
||
|
CVE-2023-29733 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md
|
||
|
CVE-2023-29734 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29734/CVE%20detail.md
|
||
|
CVE-2023-29735 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29735/CVE%20detail.md
|
||
|
CVE-2023-29736 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29736/CVE%20detail.md
|
||
|
CVE-2023-29738 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29738/CVE%20detail.md
|
||
|
CVE-2023-29738 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid
|
||
|
CVE-2023-29739 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid
|
||
|
CVE-2023-29740 - https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid
|
||
|
CVE-2023-29741 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29741/CVE%20detail.md
|
||
|
CVE-2023-29742 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29742/CVE%20detail.md
|
||
|
CVE-2023-29743 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29743/CVE%20detail.md
|
||
|
CVE-2023-29745 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29745/CVE%20detail.md
|
||
|
CVE-2023-29746 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29746/CVE%20detail.md
|
||
|
CVE-2023-29748 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29748/CVE%20detail.md
|
||
|
CVE-2023-29753 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29753/CVE%20detailed.md
|
||
|
CVE-2023-29756 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29756/CVE%20detailed.md
|
||
|
CVE-2023-29759 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29759/CVE%20detailed.md
|
||
|
CVE-2023-29766 - https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md
|
||
|
CVE-2023-29770 - https://github.com/sapplica/sentrifugo/issues/384
|
||
|
CVE-2023-2978 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
||
|
CVE-2023-2979 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
||
|
CVE-2023-2980 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
||
|
CVE-2023-29808 - https://packetstormsecurity.com/files/172145/Companymaps-8.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-29809 - https://packetstormsecurity.com/files/172146/Companymaps-8.0-SQL-Injection.html
|
||
|
CVE-2023-29809 - https://www.exploit-db.com/exploits/51422
|
||
|
CVE-2023-2981 - https://popalltheshells.medium.com/multiple-cves-affecting-pydio-cells-4-2-0-321e7e4712be
|
||
|
CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713
|
||
|
CVE-2023-29824 - https://github.com/scipy/scipy/issues/14713#issuecomment-1629468565
|
||
|
CVE-2023-29827 - https://github.com/mde/ejs/issues/720
|
||
|
CVE-2023-2983 - https://huntr.dev/bounties/6b2f33d3-2fd0-4d2d-ad7b-2c1e2417eeb1
|
||
|
CVE-2023-2984 - https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191
|
||
|
CVE-2023-29842 - http://packetstormsecurity.com/files/175105/ChurchCRM-4.5.4-SQL-Injection.html
|
||
|
CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.md
|
||
|
CVE-2023-29842 - https://github.com/arvandy/CVE/blob/main/CVE-2023-29842/CVE-2023-29842.py
|
||
|
CVE-2023-29847 - https://github.com/MegaTKC/AeroCMS/issues/11
|
||
|
CVE-2023-29848 - http://packetstormsecurity.com/files/171899/Bang-Resto-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-29849 - http://packetstormsecurity.com/files/171900/Bang-Resto-1.0-SQL-Injection.html
|
||
|
CVE-2023-29850 - https://github.com/slims/slims9_bulian/issues/186
|
||
|
CVE-2023-2986 - http://packetstormsecurity.com/files/172966/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html
|
||
|
CVE-2023-2986 - http://packetstormsecurity.com/files/173018/WordPress-Abandoned-Cart-Lite-For-WooCommerce-5.14.2-Authentication-Bypass.html
|
||
|
CVE-2023-2986 - https://github.com/Ayantaker/CVE-2023-2986
|
||
|
CVE-2023-2986 - https://github.com/TycheSoftwares/woocommerce-abandoned-cart/pull/885#issuecomment-1601813615
|
||
|
CVE-2023-29863 - https://medium.com/@waadalbyalii5/sql-injection-in-wsdl-file-c66fa00042f5
|
||
|
CVE-2023-2989 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
|
||
|
CVE-2023-2990 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
|
||
|
CVE-2023-29905 - https://hackmd.io/@0dayResearch/H1IFt1Jgn
|
||
|
CVE-2023-29906 - https://hackmd.io/@0dayResearch/rk1uu20Jh
|
||
|
CVE-2023-29907 - https://hackmd.io/@0dayResearch/rk-6aRRyn
|
||
|
CVE-2023-29908 - https://hackmd.io/@0dayResearch/Ski-S20J2
|
||
|
CVE-2023-29909 - https://hackmd.io/@0dayResearch/r1FC0AAy2
|
||
|
CVE-2023-2991 - https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
|
||
|
CVE-2023-29910 - https://hackmd.io/@0dayResearch/S1aGs1Jl2
|
||
|
CVE-2023-29911 - https://hackmd.io/@0dayResearch/SyTaRoCJn
|
||
|
CVE-2023-29912 - https://hackmd.io/@0dayResearch/S1TusiR1n
|
||
|
CVE-2023-29913 - https://hackmd.io/@0dayResearch/HyvnMn013
|
||
|
CVE-2023-29914 - https://hackmd.io/@0dayResearch/H1Cn2sAk3
|
||
|
CVE-2023-29915 - https://hackmd.io/@0dayResearch/HJBc2lyl2
|
||
|
CVE-2023-29916 - https://hackmd.io/@0dayResearch/rkpbC1Jgh
|
||
|
CVE-2023-29917 - https://hackmd.io/@0dayResearch/rJJzEg1e3
|
||
|
CVE-2023-29918 - https://docs.google.com/document/d/1JAhJOlfKKD5Y5zEKo0_8a3A-nQ7Dz_GIMmlXmOvXV48/edit?usp=sharing
|
||
|
CVE-2023-29919 - https://github.com/xiaosed/CVE-2023-29919/
|
||
|
CVE-2023-29931 - https://github.com/hhxsv5/laravel-s/issues/437
|
||
|
CVE-2023-29950 - https://github.com/matthiaskramm/swftools/issues/198
|
||
|
CVE-2023-29963 - https://github.com/superjock1988/debug/blob/main/s-cms_rce.md
|
||
|
CVE-2023-2998 - https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78
|
||
|
CVE-2023-29983 - https://packetstormsecurity.com/files/172075/CompanyMaps-8.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-29983 - https://www.exploit-db.com/exploits/51417
|
||
|
CVE-2023-29985 - https://liaorj.github.io/2023/03/17/admin-reports-date-from-has-sql-injection-vulnerability/#more
|
||
|
CVE-2023-29998 - https://labs.yarix.com/2023/07/gis3w-persistent-xss-in-g3wsuite-3-5-cve-2023-29998/
|
||
|
CVE-2023-30013 - http://packetstormsecurity.com/files/174799/TOTOLINK-Wireless-Routers-Remote-Command-Execution.html
|
||
|
CVE-2023-30013 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2
|
||
|
CVE-2023-30053 - https://github.com/Am1ngl/ttt/tree/main/160
|
||
|
CVE-2023-30054 - https://github.com/Am1ngl/ttt/tree/main/161
|
||
|
CVE-2023-30056 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html
|
||
|
CVE-2023-30057 - https://packetstormsecurity.com/files/172192/FICO-Origination-Manager-Decision-Module-4.8.1-XSS-Session-Hijacking.html
|
||
|
CVE-2023-30061 - https://github.com/Zarathustra-L/IoT_Vul/tree/main/D-Link/DIR-879
|
||
|
CVE-2023-3007 - https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/student-management-system/password_reset.md
|
||
|
CVE-2023-30082 - https://blog.manavparekh.com/2023/06/cve-2023-30082.html
|
||
|
CVE-2023-30082 - https://github.com/manavparekh/CVEs/blob/main/CVE-2023-30082/Steps%20to%20reproduce.txt
|
||
|
CVE-2023-30083 - https://github.com/libming/libming/issues/266
|
||
|
CVE-2023-30084 - https://github.com/libming/libming/issues/268
|
||
|
CVE-2023-30085 - https://github.com/libming/libming/issues/267
|
||
|
CVE-2023-30086 - https://gitlab.com/libtiff/libtiff/-/issues/538
|
||
|
CVE-2023-30087 - https://github.com/cesanta/mjs/issues/244
|
||
|
CVE-2023-30088 - https://github.com/cesanta/mjs/issues/243
|
||
|
CVE-2023-3009 - https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f
|
||
|
CVE-2023-30093 - https://www.edoardoottavianelli.it/CVE-2023-30093/
|
||
|
CVE-2023-30093 - https://www.youtube.com/watch?v=jZr2JhDd_S8
|
||
|
CVE-2023-30094 - https://www.edoardoottavianelli.it/CVE-2023-30094/
|
||
|
CVE-2023-30094 - https://www.youtube.com/watch?v=vOb9Fyg3iVo
|
||
|
CVE-2023-30095 - https://www.edoardoottavianelli.it/CVE-2023-30095/
|
||
|
CVE-2023-30095 - https://www.youtube.com/watch?v=2k7e9E0Cw0Y
|
||
|
CVE-2023-30096 - https://www.edoardoottavianelli.it/CVE-2023-30096/
|
||
|
CVE-2023-30096 - https://www.youtube.com/watch?v=ZA7R001kE2w
|
||
|
CVE-2023-30097 - https://www.edoardoottavianelli.it/CVE-2023-30097/
|
||
|
CVE-2023-30097 - https://www.youtube.com/watch?v=VAlbkvOm_DU
|
||
|
CVE-2023-30106 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip
|
||
|
CVE-2023-30111 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip
|
||
|
CVE-2023-30112 - https://www.sourcecodester.com/sites/default/files/download/oretnom23/php-mts_0.zip
|
||
|
CVE-2023-3012 - https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
|
||
|
CVE-2023-30123 - https://github.com/wuzhicms/wuzhicms/issues/205#issue-1635153937
|
||
|
CVE-2023-3013 - https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073
|
||
|
CVE-2023-30135 - https://github.com/DrizzlingSun/Tenda/blob/main/AC18/8/8.md
|
||
|
CVE-2023-30145 - http://packetstormsecurity.com/files/172593/Camaleon-CMS-2.7.0-Server-Side-Template-Injection.html
|
||
|
CVE-2023-30145 - https://github.com/paragbagul111/CVE-2023-30145
|
||
|
CVE-2023-30146 - https://github.com/L1-0/CVE-2023-30146
|
||
|
CVE-2023-30148 - https://security.friendsofpresta.org/modules/2023/10/10/opartmultihtmlblock.html
|
||
|
CVE-2023-30149 - https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html
|
||
|
CVE-2023-30150 - https://friends-of-presta.github.io/security-advisories/module/2023/06/06/leocustomajax.html
|
||
|
CVE-2023-3017 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0
|
||
|
CVE-2023-3018 - http://packetstormsecurity.com/files/172653/Lost-And-Found-Information-System-1.0-Broken-Access-Control-Privilege-Escalation.html
|
||
|
CVE-2023-3018 - https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d
|
||
|
CVE-2023-30184 - https://github.com/typecho/typecho/issues/1546
|
||
|
CVE-2023-30185 - https://github.com/c7w1n/CVE-2023-30185/blob/main/CVE-2023-30185.md
|
||
|
CVE-2023-30189 - https://friends-of-presta.github.io/security-advisories/modules/2023/04/27/posstaticblocks.html
|
||
|
CVE-2023-30191 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/17/cdesigner-89.html
|
||
|
CVE-2023-30192 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/11/possearchproducts.html
|
||
|
CVE-2023-30194 - https://friends-of-presta.github.io/security-advisories/modules/2023/05/09/posstaticfooter.html
|
||
|
CVE-2023-30198 - http://packetstormsecurity.com/files/173136/PrestaShop-Winbiz-Payment-Improper-Limitation.html
|
||
|
CVE-2023-3020 - https://huntr.dev/bounties/92cbe37c-33fa-43bf-8d5b-69aebf51d32c
|
||
|
CVE-2023-3021 - https://huntr.dev/bounties/9d289d3a-2931-4e94-b61c-449581736eff
|
||
|
CVE-2023-30222 - https://packetstormsecurity.com
|
||
|
CVE-2023-30223 - https://packetstormsecurity.com
|
||
|
CVE-2023-30237 - https://www.pentestpartners.com/security-blog/bullied-by-bugcrowd-over-kape-cyberghost-disclosure/
|
||
|
CVE-2023-30253 - https://www.swascan.com/security-advisory-dolibarr-17-0-0/
|
||
|
CVE-2023-30256 - http://packetstormsecurity.com/files/172542/Webkul-Qloapps-1.5.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-30256 - https://github.com/ahrixia/CVE-2023-30256
|
||
|
CVE-2023-30257 - https://github.com/stigward/PoCs-and-Exploits/tree/main/fiio_LPE_0day
|
||
|
CVE-2023-30257 - https://stigward.github.io/posts/fiio-m6-exploit/
|
||
|
CVE-2023-30258 - http://packetstormsecurity.com/files/175672/MagnusBilling-Remote-Command-Execution.html
|
||
|
CVE-2023-30258 - https://eldstal.se/advisories/230327-magnusbilling.html
|
||
|
CVE-2023-30259 - https://github.com/LibreCAD/LibreCAD/issues/1481
|
||
|
CVE-2023-3026 - https://huntr.dev/bounties/9bbcc127-1e69-4c88-b318-d2afef48eff0
|
||
|
CVE-2023-30264 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%202.md
|
||
|
CVE-2023-30267 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Reflected%20cross-site%20scripting(XSS).md
|
||
|
CVE-2023-30268 - https://github.com/HuBenLab/HuBenVulList/blob/main/CLTPHP6.0%20Improper%20Input%20Validation%202.md
|
||
|
CVE-2023-30285 - https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md
|
||
|
CVE-2023-30328 - https://github.com/rand0mIdas/randomideas/blob/main/ShimoVPN.md
|
||
|
CVE-2023-30328 - https://raw.githubusercontent.com/rand0mIdas/randomideas/main/ShimoVPN.md?token=GHSAT0AAAAAACA3WX4SPH2YYOCWGV6LLVSGZBIEKEQ
|
||
|
CVE-2023-30330 - https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0
|
||
|
CVE-2023-30330 - https://www.exploit-db.com/exploits/51404
|
||
|
CVE-2023-30331 - https://github.com/luelueking/Beetl-3.15.0-vuln-poc
|
||
|
CVE-2023-30347 - https://github.com/huzefa2212/CVE-2023-30347/blob/main/poc.txt
|
||
|
CVE-2023-30349 - https://github.com/jflyfox/jfinal_cms/issues/54
|
||
|
CVE-2023-30350 - http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html
|
||
|
CVE-2023-30362 - https://github.com/obgm/libcoap/issues/1063
|
||
|
CVE-2023-30363 - https://github.com/Tencent/vConsole/issues/616
|
||
|
CVE-2023-30367 - http://packetstormsecurity.com/files/173829/mRemoteNG-1.77.3.1784-NB-Sensitive-Information-Extraction.html
|
||
|
CVE-2023-30367 - https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper
|
||
|
CVE-2023-30368 - https://github.com/2205794866/Tenda/blob/main/AC5/1.md
|
||
|
CVE-2023-30369 - https://github.com/2205794866/Tenda/blob/main/AC15/3.md
|
||
|
CVE-2023-30370 - https://github.com/2205794866/Tenda/blob/main/AC15/7.md
|
||
|
CVE-2023-30371 - https://github.com/2205794866/Tenda/blob/main/AC15/4.md
|
||
|
CVE-2023-30372 - https://github.com/2205794866/Tenda/blob/main/AC15/10.md
|
||
|
CVE-2023-30373 - https://github.com/2205794866/Tenda/blob/main/AC15/8.md
|
||
|
CVE-2023-30375 - https://github.com/2205794866/Tenda/blob/main/AC15/1.md
|
||
|
CVE-2023-30376 - https://github.com/2205794866/Tenda/blob/main/AC15/9.md
|
||
|
CVE-2023-30378 - https://github.com/2205794866/Tenda/blob/main/AC15/5.md
|
||
|
CVE-2023-30380 - https://github.com/Howard512966/DedeCMS-v5.7.107-Directory-Traversal
|
||
|
CVE-2023-30399 - https://github.com/Yof3ng/IoT/blob/master/Garo/CVE-2023-30399.md
|
||
|
CVE-2023-30402 - https://github.com/yasm/yasm/issues/206
|
||
|
CVE-2023-30405 - https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html
|
||
|
CVE-2023-30415 - http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2023-30415 - https://robsware.github.io/2023/09/01/firstcve
|
||
|
CVE-2023-3044 - https://github.com/baker221/poc-xpdf
|
||
|
CVE-2023-30440 - https://www.ibm.com/support/pages/node/6997133
|
||
|
CVE-2023-30445 - https://www.ibm.com/support/pages/node/7010557
|
||
|
CVE-2023-30446 - https://www.ibm.com/support/pages/node/7010557
|
||
|
CVE-2023-30447 - https://www.ibm.com/support/pages/node/7010557
|
||
|
CVE-2023-30448 - https://www.ibm.com/support/pages/node/7010557
|
||
|
CVE-2023-30449 - https://www.ibm.com/support/pages/node/7010557
|
||
|
CVE-2023-30451 - http://packetstormsecurity.com/files/176274/TYPO3-11.5.24-Path-Traversal.html
|
||
|
CVE-2023-30453 - https://y-security.de/news-en/reminder-for-jira-cross-site-scripting-cve-2023-30453/index.html
|
||
|
CVE-2023-30454 - https://packetstormsecurity.com/files/172063/ebankIT-6-Cross-Site-Scripting.html
|
||
|
CVE-2023-30455 - https://packetstormsecurity.com/files/172064/ebankIT-6-Denial-Of-Service.html
|
||
|
CVE-2023-30456 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
||
|
CVE-2023-30456 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
|
||
|
CVE-2023-30459 - https://github.com/Toxich4/CVE-2023-30459
|
||
|
CVE-2023-30459 - https://smartptt.com
|
||
|
CVE-2023-30534 - https://github.com/Cacti/cacti/security/advisories/GHSA-77rf-774j-6h3p
|
||
|
CVE-2023-30544 - https://huntr.dev/bounties/1714df73-e639-4d64-ab25-ced82dad9f85/
|
||
|
CVE-2023-30547 - https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244
|
||
|
CVE-2023-30547 - https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m
|
||
|
CVE-2023-30550 - https://github.com/metersphere/metersphere/security/advisories/GHSA-j5cq-cpw2-gp2q
|
||
|
CVE-2023-3056 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%201.md
|
||
|
CVE-2023-3057 - https://github.com/HuBenLab/HuBenVulList/blob/main/YFCMF-TP6-3.0.4%20has%20a%20Remote%20Command%20Execution%20(RCE)%20vulnerability%202.md
|
||
|
CVE-2023-30577 - https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3
|
||
|
CVE-2023-30591 - https://starlabs.sg/advisories/23/23-30591/
|
||
|
CVE-2023-30613 - https://huntr.dev/bounties/c30d3503-600d-4d00-9571-98826a51f12c
|
||
|
CVE-2023-30620 - https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx
|
||
|
CVE-2023-30623 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2023-30625 - http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2023-30625 - https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server/
|
||
|
CVE-2023-30628 - https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx
|
||
|
CVE-2023-30628 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2023-3067 - https://huntr.dev/bounties/4772ceb7-1594-414d-9b20-5b82029da7b6
|
||
|
CVE-2023-3069 - https://huntr.dev/bounties/00544982-365a-476b-b5fe-42f02f11d367
|
||
|
CVE-2023-3070 - https://huntr.dev/bounties/e193068e-0b95-403a-8453-e015241b8f1b
|
||
|
CVE-2023-3071 - https://huntr.dev/bounties/3e8d5166-9bc6-46e7-94a8-cad52434a39e
|
||
|
CVE-2023-3073 - https://huntr.dev/bounties/a4d6a082-2ea8-49a5-8e48-6d39b5cc62e1
|
||
|
CVE-2023-30740 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-30741 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-30742 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-30743 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-30744 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-30769 - https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks
|
||
|
CVE-2023-30769 - https://www.halborn.com/disclosures
|
||
|
CVE-2023-30772 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
|
||
|
CVE-2023-30772 - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=06615d11cc78162dfd5116efb71f29eb29502d37
|
||
|
CVE-2023-30774 - https://gitlab.com/libtiff/libtiff/-/issues/463
|
||
|
CVE-2023-30775 - https://gitlab.com/libtiff/libtiff/-/issues/464
|
||
|
CVE-2023-30777 - https://patchstack.com/articles/reflected-xss-in-advanced-custom-fields-plugins-affecting-2-million-sites?_s_id=cve
|
||
|
CVE-2023-30787 - https://fluidattacks.com/advisories/napoli
|
||
|
CVE-2023-30788 - https://fluidattacks.com/advisories/napoli
|
||
|
CVE-2023-30789 - https://fluidattacks.com/advisories/napoli
|
||
|
CVE-2023-3079 - http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html
|
||
|
CVE-2023-3079 - http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html
|
||
|
CVE-2023-30790 - https://fluidattacks.com/advisories/napoli
|
||
|
CVE-2023-30799 - https://github.com/MarginResearch/FOISted
|
||
|
CVE-2023-30802 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
||
|
CVE-2023-30803 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
||
|
CVE-2023-30804 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
||
|
CVE-2023-30805 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
||
|
CVE-2023-30806 - https://aws.amazon.com/marketplace/pp/prodview-uujwjffddxzp4
|
||
|
CVE-2023-3083 - https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab
|
||
|
CVE-2023-3084 - https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a
|
||
|
CVE-2023-30858 - https://huntr.dev/bounties/444f2255-5085-466f-ba0e-5549fa8846a3/
|
||
|
CVE-2023-30859 - https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r
|
||
|
CVE-2023-3086 - https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20
|
||
|
CVE-2023-30860 - https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm
|
||
|
CVE-2023-30868 - http://packetstormsecurity.com/files/172730/WordPress-Tree-Page-View-1.6.7-Cross-Site-Scripting.html
|
||
|
CVE-2023-3090 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-3090 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-3094 - https://vuldb.com/?id.230670
|
||
|
CVE-2023-30945 - https://palantir.safebase.us/?tcuUid=e62e4dad-b39b-48ba-ba30-7b7c83406ad9
|
||
|
CVE-2023-30946 - https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3
|
||
|
CVE-2023-30948 - https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62
|
||
|
CVE-2023-30949 - https://palantir.safebase.us/?tcuUid=bbc1772c-e10a-45cc-b89f-48cc1a8b2cfc
|
||
|
CVE-2023-3095 - https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4
|
||
|
CVE-2023-30950 - https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a
|
||
|
CVE-2023-30951 - https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced
|
||
|
CVE-2023-30952 - https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4
|
||
|
CVE-2023-30955 - https://palantir.safebase.us/?tcuUid=0c3f6c33-4eb0-48b5-ab87-fe48c46a4170
|
||
|
CVE-2023-30956 - https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a
|
||
|
CVE-2023-30958 - https://palantir.safebase.us/?tcuUid=5764b094-d3c0-4380-90f2-234f36116c9b
|
||
|
CVE-2023-30959 - https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63
|
||
|
CVE-2023-3096 - https://github.com/i900008/vulndb/blob/main/kylinos_vul1.md
|
||
|
CVE-2023-30960 - https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b
|
||
|
CVE-2023-30961 - https://palantir.safebase.us/?tcuUid=2755c49f-2c30-459e-8bdf-f95ef3692da4
|
||
|
CVE-2023-30962 - https://palantir.safebase.us/?tcuUid=92dd599a-07e2-43a8-956a-9c9566794be0
|
||
|
CVE-2023-30963 - https://palantir.safebase.us/?tcuUid=3c6b63b7-fb67-4202-a94a-9c83515efb8a
|
||
|
CVE-2023-30967 - https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79
|
||
|
CVE-2023-30969 - https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7
|
||
|
CVE-2023-3097 - https://github.com/i900008/vulndb/blob/main/kylinos_vul2.md
|
||
|
CVE-2023-3099 - https://github.com/i900008/vulndb/blob/main/kylinos_vul4.md
|
||
|
CVE-2023-31059 - https://cybir.com/2023/cve/poc-repetier-server-140/
|
||
|
CVE-2023-31060 - https://cybir.com/2023/cve/poc-repetier-server-140/
|
||
|
CVE-2023-31061 - https://cybir.com/2023/cve/poc-repetier-server-140/
|
||
|
CVE-2023-31067 - http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html
|
||
|
CVE-2023-31067 - https://www.exploit-db.com/exploits/51679
|
||
|
CVE-2023-31068 - http://packetstormsecurity.com/files/174272/TSPlus-16.0.0.0-Insecure-Permissions.html
|
||
|
CVE-2023-31068 - https://www.exploit-db.com/exploits/51680
|
||
|
CVE-2023-31069 - http://packetstormsecurity.com/files/174271/TSPlus-16.0.0.0-Insecure-Credential-Storage.html
|
||
|
CVE-2023-31069 - https://www.exploit-db.com/exploits/51681
|
||
|
CVE-2023-3109 - https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123
|
||
|
CVE-2023-31096 - https://cschwarz1.github.io/posts/0x04/
|
||
|
CVE-2023-31102 - https://ds-security.com/post/integer-overflow-in-7-zip-cve-2023-31102/
|
||
|
CVE-2023-31128 - https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h
|
||
|
CVE-2023-31128 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2023-31132 - https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
|
||
|
CVE-2023-31137 - https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c
|
||
|
CVE-2023-3115 - https://gitlab.com/gitlab-org/gitlab/-/issues/414367
|
||
|
CVE-2023-3119 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md
|
||
|
CVE-2023-31192 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768
|
||
|
CVE-2023-31194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1745
|
||
|
CVE-2023-31194 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1745
|
||
|
CVE-2023-3120 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Service%20Provider%20Management%20System%20-%20multiple%20vulnerabilities.md
|
||
|
CVE-2023-31223 - https://excellium-services.com/cert-xlm-advisory/cve-2023-31223/
|
||
|
CVE-2023-31242 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1769
|
||
|
CVE-2023-31247 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1746
|
||
|
CVE-2023-31248 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
||
|
CVE-2023-31248 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-31272 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1765
|
||
|
CVE-2023-31275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1748
|
||
|
CVE-2023-3128 - https://github.com/grafana/bugbounty/security/advisories/GHSA-gxh2-6vvc-rrgp
|
||
|
CVE-2023-31285 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
|
||
|
CVE-2023-31285 - http://seclists.org/fulldisclosure/2023/May/14
|
||
|
CVE-2023-31286 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
|
||
|
CVE-2023-31286 - http://seclists.org/fulldisclosure/2023/May/14
|
||
|
CVE-2023-31287 - http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
|
||
|
CVE-2023-31287 - http://seclists.org/fulldisclosure/2023/May/14
|
||
|
CVE-2023-31292 - https://herolab.usd.de/en/security-advisories/usd-2022-0051/
|
||
|
CVE-2023-31293 - https://herolab.usd.de/en/security-advisories/usd-2022-0061/
|
||
|
CVE-2023-31294 - https://herolab.usd.de/en/security-advisories/usd-2022-0052/
|
||
|
CVE-2023-31295 - https://herolab.usd.de/en/security-advisories/usd-2022-0053/
|
||
|
CVE-2023-31296 - https://herolab.usd.de/en/security-advisories/usd-2022-0054/
|
||
|
CVE-2023-31297 - https://herolab.usd.de/en/security-advisories/usd-2022-0058/
|
||
|
CVE-2023-31298 - https://herolab.usd.de/en/security-advisories/usd-2022-0060/
|
||
|
CVE-2023-31299 - https://herolab.usd.de/en/security-advisories/usd-2022-0055/
|
||
|
CVE-2023-31300 - https://herolab.usd.de/en/security-advisories/usd-2022-0057/
|
||
|
CVE-2023-31301 - https://herolab.usd.de/en/security-advisories/usd-2022-0059/
|
||
|
CVE-2023-31302 - https://herolab.usd.de/en/security-advisories/usd-2022-0056/
|
||
|
CVE-2023-3134 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins
|
||
|
CVE-2023-31404 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-31405 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-31406 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-31407 - https://launchpad.support.sap.com/#/notes/3312892
|
||
|
CVE-2023-31407 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-31413 - https://www.elastic.co/community/security/
|
||
|
CVE-2023-31414 - https://www.elastic.co/community/security/
|
||
|
CVE-2023-31415 - https://www.elastic.co/community/security/
|
||
|
CVE-2023-31416 - https://www.elastic.co/community/security
|
||
|
CVE-2023-31417 - https://www.elastic.co/community/security
|
||
|
CVE-2023-31418 - https://www.elastic.co/community/security
|
||
|
CVE-2023-31419 - https://www.elastic.co/community/security
|
||
|
CVE-2023-3142 - https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5
|
||
|
CVE-2023-31421 - https://www.elastic.co/community/security
|
||
|
CVE-2023-31422 - https://www.elastic.co/community/security
|
||
|
CVE-2023-3143 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#11xss-vulnerability-in-adminpostsmanage_postphpcontent
|
||
|
CVE-2023-31433 - https://cves.at/posts/cve-2023-31433/writeup/
|
||
|
CVE-2023-31434 - https://cves.at/posts/cve-2023-31434/writeup/
|
||
|
CVE-2023-31435 - https://cves.at/posts/cve-2023-31435/writeup/
|
||
|
CVE-2023-31436 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
||
|
CVE-2023-31436 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
||
|
CVE-2023-31436 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-31436 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13
|
||
|
CVE-2023-31439 - https://github.com/systemd/systemd/pull/28885
|
||
|
CVE-2023-3144 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#10xss-vulnerability-in-adminpostsmanage_postphptitle
|
||
|
CVE-2023-31445 - https://blog.kscsc.online/cves/202331445/md.html
|
||
|
CVE-2023-31445 - https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure
|
||
|
CVE-2023-31445 - https://www.swiruhack.online/cves/202331445/md.html
|
||
|
CVE-2023-3145 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#9sql-injection-vulnerability-in-classesusersphppost
|
||
|
CVE-2023-3146 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#8sql-injection-vulnerability-in-admincategoriesmanage_categoryphp
|
||
|
CVE-2023-31465 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31465.md
|
||
|
CVE-2023-31466 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-31466.md
|
||
|
CVE-2023-31468 - http://packetstormsecurity.com/files/174268/Inosoft-VisiWin-7-2022-2.1-Insecure-Permissions-Privilege-Escalation.html
|
||
|
CVE-2023-31468 - https://www.exploit-db.com/exploits/51682
|
||
|
CVE-2023-3147 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-admincategoriesview_categoryphp
|
||
|
CVE-2023-31471 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Abuse_of_Functionality_leads_to_RCE.md
|
||
|
CVE-2023-31472 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Creation.md
|
||
|
CVE-2023-31473 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary_File_Read.md
|
||
|
CVE-2023-31475 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Buffer_Overflow.md
|
||
|
CVE-2023-31475 - https://justinapplegate.me/2023/glinet-CVE-2023-31475/
|
||
|
CVE-2023-31476 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/GL-MV1000_Arbitrary_File_Creation.md
|
||
|
CVE-2023-31477 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Path_Traversal.md
|
||
|
CVE-2023-31478 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/SSID_Key_Disclosure.md
|
||
|
CVE-2023-3148 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#6sql-injection-vulnerability-in-adminpostsmanage_postphp
|
||
|
CVE-2023-31483 - https://github.com/CauldronDevelopmentLLC/cbang/issues/115
|
||
|
CVE-2023-31489 - https://github.com/FRRouting/frr/issues/13098
|
||
|
CVE-2023-3149 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp
|
||
|
CVE-2023-31490 - https://github.com/FRRouting/frr/issues/13099
|
||
|
CVE-2023-31492 - http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html
|
||
|
CVE-2023-31497 - https://github.com/0xInfection/EPScalate
|
||
|
CVE-2023-31498 - https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832
|
||
|
CVE-2023-3150 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md
|
||
|
CVE-2023-31502 - https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD
|
||
|
CVE-2023-31505 - https://m3n0sd0n4ld.github.io/patoHackventuras/cve-2023-31505
|
||
|
CVE-2023-3151 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md
|
||
|
CVE-2023-3152 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#5sql-injection-vulnerability-in-adminpostsview_postphp
|
||
|
CVE-2023-31530 - https://github.com/leetsun/IoT/tree/main/Motorola-CX2L/CI4
|
||
|
CVE-2023-31543 - https://gist.github.com/adeadfed/ccc834440af354a5638f889bee34bafe
|
||
|
CVE-2023-31543 - https://github.com/bndr/pipreqs/pull/364
|
||
|
CVE-2023-31548 - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548
|
||
|
CVE-2023-31554 - https://forum.xpdfreader.com/viewtopic.php?t=42421
|
||
|
CVE-2023-31555 - https://github.com/podofo/podofo/issues/67
|
||
|
CVE-2023-31556 - https://github.com/podofo/podofo/issues/66
|
||
|
CVE-2023-31557 - https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748
|
||
|
CVE-2023-31566 - https://github.com/podofo/podofo/issues/70
|
||
|
CVE-2023-31567 - https://github.com/podofo/podofo/issues/71
|
||
|
CVE-2023-31568 - https://github.com/podofo/podofo/issues/72
|
||
|
CVE-2023-31587 - https://github.com/yanbushuang/CVE/blob/main/TendaAC5.md
|
||
|
CVE-2023-31594 - https://github.com/Yozarseef95/CVE-2023-31594
|
||
|
CVE-2023-31595 - https://github.com/Yozarseef95/CVE-2023-31595
|
||
|
CVE-2023-31607 - https://github.com/openlink/virtuoso-opensource/issues/1120
|
||
|
CVE-2023-31608 - https://github.com/openlink/virtuoso-opensource/issues/1123
|
||
|
CVE-2023-31609 - https://github.com/openlink/virtuoso-opensource/issues/1126
|
||
|
CVE-2023-31610 - https://github.com/openlink/virtuoso-opensource/issues/1118
|
||
|
CVE-2023-31611 - https://github.com/openlink/virtuoso-opensource/issues/1119
|
||
|
CVE-2023-31612 - https://github.com/openlink/virtuoso-opensource/issues/1125
|
||
|
CVE-2023-31613 - https://github.com/openlink/virtuoso-opensource/issues/1121
|
||
|
CVE-2023-31615 - https://github.com/openlink/virtuoso-opensource/issues/1124
|
||
|
CVE-2023-31616 - https://github.com/openlink/virtuoso-opensource/issues/1122
|
||
|
CVE-2023-31617 - https://github.com/openlink/virtuoso-opensource/issues/1127
|
||
|
CVE-2023-31618 - https://github.com/openlink/virtuoso-opensource/issues/1136
|
||
|
CVE-2023-31619 - https://github.com/openlink/virtuoso-opensource/issues/1133
|
||
|
CVE-2023-31620 - https://github.com/openlink/virtuoso-opensource/issues/1128
|
||
|
CVE-2023-31621 - https://github.com/openlink/virtuoso-opensource/issues/1130
|
||
|
CVE-2023-31622 - https://github.com/openlink/virtuoso-opensource/issues/1135
|
||
|
CVE-2023-31623 - https://github.com/openlink/virtuoso-opensource/issues/1131
|
||
|
CVE-2023-31624 - https://github.com/openlink/virtuoso-opensource/issues/1134
|
||
|
CVE-2023-31625 - https://github.com/openlink/virtuoso-opensource/issues/1132
|
||
|
CVE-2023-31626 - https://github.com/openlink/virtuoso-opensource/issues/1129
|
||
|
CVE-2023-31627 - https://github.com/openlink/virtuoso-opensource/issues/1140
|
||
|
CVE-2023-31628 - https://github.com/openlink/virtuoso-opensource/issues/1141
|
||
|
CVE-2023-31629 - https://github.com/openlink/virtuoso-opensource/issues/1139
|
||
|
CVE-2023-3163 - https://gitee.com/y_project/RuoYi/issues/I78DOR
|
||
|
CVE-2023-31630 - https://github.com/openlink/virtuoso-opensource/issues/1138
|
||
|
CVE-2023-31631 - https://github.com/openlink/virtuoso-opensource/issues/1137
|
||
|
CVE-2023-3164 - https://gitlab.com/libtiff/libtiff/-/issues/542
|
||
|
CVE-2023-3165 - https://vuldb.com/?id.231109
|
||
|
CVE-2023-31664 - https://github.com/adilkhan7/CVE-2023-31664
|
||
|
CVE-2023-31677 - https://github.com/zzh-newlearner/record/blob/main/luowice.md
|
||
|
CVE-2023-31678 - https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md
|
||
|
CVE-2023-31679 - https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md
|
||
|
CVE-2023-31689 - https://github.com/vedees/wcms/issues/15
|
||
|
CVE-2023-31698 - http://packetstormsecurity.com/files/172462/Bludit-CMS-3.14.1-Cross-Site-Scripting.html
|
||
|
CVE-2023-31698 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199
|
||
|
CVE-2023-31698 - https://github.com/bludit/bludit/issues/1509
|
||
|
CVE-2023-31699 - https://github.com/ChurchCRM/CRM/issues/6471
|
||
|
CVE-2023-31700 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md
|
||
|
CVE-2023-31701 - https://github.com/FirmRec/IoT-Vulns/blob/main/tp-link/postPlcJson/report.md
|
||
|
CVE-2023-31702 - http://packetstormsecurity.com/files/172545/eScan-Management-Console-14.0.1400.2281-SQL-Injection.html
|
||
|
CVE-2023-31703 - http://packetstormsecurity.com/files/172540/eScan-Management-Console-14.0.1400.2281-Cross-Site-Scripting.html
|
||
|
CVE-2023-31705 - https://github.com/d34dun1c02n/CVE-2023-31705
|
||
|
CVE-2023-31708 - https://github.com/weng-xianhu/eyoucms/issues/41
|
||
|
CVE-2023-31714 - https://www.exploit-db.com/exploits/51383
|
||
|
CVE-2023-31718 - https://youtu.be/VCQkEGntN04
|
||
|
CVE-2023-3172 - https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e
|
||
|
CVE-2023-31723 - https://github.com/DaisyPo/fuzzing-vulncollect/blob/main/yasm/SEGV/nasm-pp.c:4008%20in%20expand_mmac_params/README.md
|
||
|
CVE-2023-31723 - https://github.com/yasm/yasm/issues/220
|
||
|
CVE-2023-31724 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/SEGV/nasm-pp.c:3570%20in%20do_directive
|
||
|
CVE-2023-31724 - https://github.com/yasm/yasm/issues/222
|
||
|
CVE-2023-31725 - https://github.com/DaisyPo/fuzzing-vulncollect/tree/main/yasm/heap-use-after-free/nasm-pp.c:3878%20in%20expand_mmac_params
|
||
|
CVE-2023-31725 - https://github.com/yasm/yasm/issues/221
|
||
|
CVE-2023-31726 - https://github.com/J6451/CVE-2023-31726
|
||
|
CVE-2023-3173 - https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14
|
||
|
CVE-2023-31740 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31740/Linksys_E2000_RCE.pdf
|
||
|
CVE-2023-31741 - https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf
|
||
|
CVE-2023-31747 - https://packetstormsecurity.com/files/172464/Filmora-12-Build-1.0.0.7-Unquoted-Service-Path.html
|
||
|
CVE-2023-31748 - https://packetstormsecurity.com/files/172466/MobileTrans-4.0.11-Weak-Service-Permissions.html
|
||
|
CVE-2023-31753 - https://github.com/khmk2k/CVE-2023-31753/
|
||
|
CVE-2023-31754 - https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss
|
||
|
CVE-2023-31757 - https://github.com/sleepyvv/vul_report/blob/main/DedeCMS/XSS.md
|
||
|
CVE-2023-3176 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#7sql-injection-vulnerability-in-adminusermanage_userphp
|
||
|
CVE-2023-3177 - https://github.com/AnotherN/cvv/blob/main/imgs/Lost%20and%20Found%20Information%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-admininquiriesview_inquiryphp
|
||
|
CVE-2023-3177 - https://vuldb.com/?id.231151
|
||
|
CVE-2023-3184 - http://packetstormsecurity.com/files/172908/Sales-Tracker-Management-System-1.0-HTML-Injection.html
|
||
|
CVE-2023-3184 - https://github.com/ctflearner/Vulnerability/blob/main/Sales_Tracker_Management_System/stms.md
|
||
|
CVE-2023-31851 - https://github.com/CalfCrusher/CVE-2023-31851
|
||
|
CVE-2023-31852 - https://github.com/CalfCrusher/CVE-2023-31852
|
||
|
CVE-2023-31853 - https://github.com/CalfCrusher/CVE-2023-31853
|
||
|
CVE-2023-31856 - https://github.com/xiangbulala/CVE/blob/main/totlink.md
|
||
|
CVE-2023-3187 - http://packetstormsecurity.com/files/172909/Teachers-Record-Management-System-1.0-Validation-Bypass.html
|
||
|
CVE-2023-3187 - https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md
|
||
|
CVE-2023-31871 - https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7
|
||
|
CVE-2023-31873 - http://packetstormsecurity.com/files/172530/Gin-Markdown-Editor-0.7.4-Arbitrary-Code-Execution.html
|
||
|
CVE-2023-31874 - http://packetstormsecurity.com/files/172535/Yank-Note-3.52.1-Arbitrary-Code-Execution.html
|
||
|
CVE-2023-3188 - https://huntr.dev/bounties/0d0d526a-1c39-4e6a-b081-d3914468e495
|
||
|
CVE-2023-31893 - https://medium.com/@shooterRX/dns-recursion-leads-to-dos-attack-vivo-play-iptv-cve-2023-31893-b5ac45f38f
|
||
|
CVE-2023-3190 - https://huntr.dev/bounties/5562c4c4-0475-448f-a451-7c4666bc7180
|
||
|
CVE-2023-31902 - https://www.exploit-db.com/exploits/51010
|
||
|
CVE-2023-31902 - https://www.redpacketsecurity.com/mobile-mouse-code-execution/
|
||
|
CVE-2023-31903 - https://www.exploit-db.com/exploits/51052
|
||
|
CVE-2023-31904 - https://www.exploit-db.com/exploits/51015
|
||
|
CVE-2023-31907 - https://github.com/jerryscript-project/jerryscript/issues/5073
|
||
|
CVE-2023-31908 - https://github.com/jerryscript-project/jerryscript/issues/5067
|
||
|
CVE-2023-3191 - https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a
|
||
|
CVE-2023-31910 - https://github.com/jerryscript-project/jerryscript/issues/5076
|
||
|
CVE-2023-31913 - https://github.com/jerryscript-project/jerryscript/issues/5061
|
||
|
CVE-2023-31916 - https://github.com/jerryscript-project/jerryscript/issues/5062
|
||
|
CVE-2023-31918 - https://github.com/jerryscript-project/jerryscript/issues/5064
|
||
|
CVE-2023-31919 - https://github.com/jerryscript-project/jerryscript/issues/5069
|
||
|
CVE-2023-3192 - https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551
|
||
|
CVE-2023-31920 - https://github.com/jerryscript-project/jerryscript/issues/5070
|
||
|
CVE-2023-31921 - https://github.com/jerryscript-project/jerryscript/issues/5068
|
||
|
CVE-2023-31922 - https://github.com/bellard/quickjs/issues/178
|
||
|
CVE-2023-31940 - https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug7-SQL-Injection-page_id.md
|
||
|
CVE-2023-31972 - https://github.com/yasm/yasm/issues/209
|
||
|
CVE-2023-31973 - https://github.com/yasm/yasm/issues/207
|
||
|
CVE-2023-31974 - https://github.com/yasm/yasm/issues/208
|
||
|
CVE-2023-31979 - https://github.com/petewarden/catdoc/issues/9
|
||
|
CVE-2023-31981 - https://github.com/irontec/sngrep/issues/430
|
||
|
CVE-2023-31982 - https://github.com/irontec/sngrep/issues/431
|
||
|
CVE-2023-31983 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/2/Readme.md
|
||
|
CVE-2023-31985 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/3/Readme.md
|
||
|
CVE-2023-31986 - https://github.com/Erebua/CVE/blob/main/N300_BR-6428nS%20V4/4/Readme.md
|
||
|
CVE-2023-32019 - http://packetstormsecurity.com/files/173310/Windows-Kernel-KTM-Registry-Transactions-Non-Atomic-Outcomes.html
|
||
|
CVE-2023-32046 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-3206 - https://github.com/shulao2020/cve/blob/main/Flying%20Fish.md
|
||
|
CVE-2023-32068 - https://jira.xwiki.org/browse/XWIKI-20096
|
||
|
CVE-2023-32071 - https://jira.xwiki.org/browse/XWIKI-20340
|
||
|
CVE-2023-32073 - https://github.com/WWBN/AVideo/security/advisories/GHSA-2mhh-27v7-3vcx
|
||
|
CVE-2023-32111 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-32112 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-32113 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-32114 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-32115 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-3217 - http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html
|
||
|
CVE-2023-3218 - https://huntr.dev/bounties/94d50b11-20ca-46e3-9086-dd6836421675
|
||
|
CVE-2023-32183 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32183
|
||
|
CVE-2023-32184 - https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32184
|
||
|
CVE-2023-3219 - http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753339
|
||
|
CVE-2023-32205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1753341
|
||
|
CVE-2023-32207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
|
||
|
CVE-2023-32209 - https://bugzilla.mozilla.org/show_bug.cgi?id=1767194
|
||
|
CVE-2023-32211 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
|
||
|
CVE-2023-32212 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
|
||
|
CVE-2023-32233 - http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
|
||
|
CVE-2023-32233 - https://news.ycombinator.com/item?id=35879660
|
||
|
CVE-2023-3224 - https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87
|
||
|
CVE-2023-32243 - http://packetstormsecurity.com/files/172457/WordPress-Elementor-Lite-5.7.1-Arbitrary-Password-Reset.html
|
||
|
CVE-2023-3227 - https://huntr.dev/bounties/97ecf4b8-7eeb-4e39-917c-2660262ff9ba
|
||
|
CVE-2023-32271 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1774
|
||
|
CVE-2023-32275 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1753
|
||
|
CVE-2023-3228 - https://huntr.dev/bounties/0a7ee1fb-e693-4259-abf8-a2c3218c1647
|
||
|
CVE-2023-32284 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1750
|
||
|
CVE-2023-3229 - https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170
|
||
|
CVE-2023-3230 - https://huntr.dev/bounties/390643f0-106b-4424-835d-52610aefa4c7
|
||
|
CVE-2023-32307 - https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-rm4c-ccvf-ff9c
|
||
|
CVE-2023-32309 - https://github.com/facelessuser/pymdown-extensions/security/advisories/GHSA-jh85-wwv9-24hv
|
||
|
CVE-2023-32313 - https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
|
||
|
CVE-2023-32313 - https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
|
||
|
CVE-2023-32314 - https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac
|
||
|
CVE-2023-32314 - https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5
|
||
|
CVE-2023-32315 - http://packetstormsecurity.com/files/173607/Openfire-Authentication-Bypass-Remote-Code-Execution.html
|
||
|
CVE-2023-32317 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
|
||
|
CVE-2023-3232 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Broken%20Access%20Control.md
|
||
|
CVE-2023-32321 - https://github.com/ckan/ckan/blob/2a6080e61d5601fa0e2a0317afd6a8e9b7abf6dd/CHANGELOG.rst
|
||
|
CVE-2023-32322 - https://github.com/Ombi-app/Ombi/security/advisories/GHSA-28j3-84m7-gpjp
|
||
|
CVE-2023-32324 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7
|
||
|
CVE-2023-3233 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md
|
||
|
CVE-2023-3234 - https://github.com/HuBenLab/HuBenVulList/blob/main/CRMEB%20is%20vulnerable%20to%20deserialization.md
|
||
|
CVE-2023-3235 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%201.md
|
||
|
CVE-2023-3236 - https://github.com/HuBenLab/HuBenVulList/blob/main/MCCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF)%202.md
|
||
|
CVE-2023-3237 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20contains%20a%20weak%20default%20password%20which%20gives%20attackers%20to%20access%20backstage%20management%20system.md
|
||
|
CVE-2023-3238 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20is%20vulnerable%20to%20Server-side%20request%20forgery%20(SSRF).md
|
||
|
CVE-2023-3239 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20obtain%20the%20web%20directory%20path%20and%20other%20information%20leaked%20.md
|
||
|
CVE-2023-3240 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20download%20vulenrability%20via%20the%20filename.md
|
||
|
CVE-2023-3241 - https://github.com/HuBenLab/HuBenVulList/blob/main/OTCMS%20was%20discovered%20to%20contain%20an%20arbitrary%20file%20read%20vulenrability%20via%20the%20filename.md
|
||
|
CVE-2023-3243 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-3247 - https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw
|
||
|
CVE-2023-32486 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32487 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32488 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32489 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32490 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32491 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32492 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32493 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32494 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32495 - https://www.dell.com/support/kbdoc/en-us/000216717/dsa-2023-269-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities
|
||
|
CVE-2023-32521 - https://www.tenable.com/security/research/tra-2023-17
|
||
|
CVE-2023-32522 - https://www.tenable.com/security/research/tra-2023-17
|
||
|
CVE-2023-32541 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1759
|
||
|
CVE-2023-32560 - http://packetstormsecurity.com/files/174459/Ivanti-Avalance-Remote-Code-Execution.html
|
||
|
CVE-2023-32560 - http://packetstormsecurity.com/files/174698/Ivanti-Avalanche-MDM-Buffer-Overflow.html
|
||
|
CVE-2023-32571 - https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/
|
||
|
CVE-2023-32614 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1749
|
||
|
CVE-2023-32615 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1771
|
||
|
CVE-2023-32616 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837
|
||
|
CVE-2023-32629 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-32632 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1767
|
||
|
CVE-2023-32634 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755
|
||
|
CVE-2023-32645 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1752
|
||
|
CVE-2023-32653 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1802
|
||
|
CVE-2023-32664 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1795
|
||
|
CVE-2023-32676 - https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
|
||
|
CVE-2023-32679 - https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c
|
||
|
CVE-2023-3269 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/07/28/1
|
||
|
CVE-2023-3269 - http://www.openwall.com/lists/oss-security/2023/08/25/4
|
||
|
CVE-2023-32698 - https://github.com/goreleaser/nfpm/security/advisories/GHSA-w7jw-q4fg-qc4c
|
||
|
CVE-2023-32699 - https://github.com/metersphere/metersphere/security/advisories/GHSA-qffq-8gf8-mhq7
|
||
|
CVE-2023-32707 - http://packetstormsecurity.com/files/174602/Splunk-Enterprise-Account-Takeover.html
|
||
|
CVE-2023-32707 - http://packetstormsecurity.com/files/175386/Splunk-edit_user-Capability-Privilege-Escalation.html
|
||
|
CVE-2023-32741 - http://packetstormsecurity.com/files/175654/WordPress-Contact-Form-To-Any-API-1.1.2-SQL-Injection.html
|
||
|
CVE-2023-32749 - http://packetstormsecurity.com/files/172645/Pydio-Cells-4.1.2-Privilege-Escalation.html
|
||
|
CVE-2023-32749 - http://seclists.org/fulldisclosure/2023/May/18
|
||
|
CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
||
|
CVE-2023-32749 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-003/-pydio-cells-unauthorised-role-assignments
|
||
|
CVE-2023-32750 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-005/
|
||
|
CVE-2023-32750 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
||
|
CVE-2023-32751 - https://www.redteam-pentesting.de/advisories/rt-sa-2023-004/
|
||
|
CVE-2023-32751 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
||
|
CVE-2023-3276 - https://vuldb.com/?id.231626
|
||
|
CVE-2023-32767 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-014.txt
|
||
|
CVE-2023-32781 - http://packetstormsecurity.com/files/176677/PRTG-Authenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-32784 - https://github.com/keepassxreboot/keepassxc/discussions/9433
|
||
|
CVE-2023-32784 - https://github.com/vdohney/keepass-password-dumper
|
||
|
CVE-2023-32784 - https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/
|
||
|
CVE-2023-3279 - https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635
|
||
|
CVE-2023-32832 - http://packetstormsecurity.com/files/175662/Android-mtk_jpeg-Driver-Race-Condition-Privilege-Escalation.html
|
||
|
CVE-2023-32837 - http://packetstormsecurity.com/files/175665/mtk-jpeg-Driver-Out-Of-Bounds-Read-Write.html
|
||
|
CVE-2023-3291 - https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5
|
||
|
CVE-2023-3294 - https://huntr.dev/bounties/9d308ebb-4289-411f-ac22-990383d98932
|
||
|
CVE-2023-32961 - https://lourcode.kr/posts/CVE-2023-32961-Analysis/
|
||
|
CVE-2023-3304 - https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17
|
||
|
CVE-2023-3305 - https://github.com/sleepyvv/vul_report/blob/main/C-data/BrokenAccessControl.md
|
||
|
CVE-2023-3307 - https://github.com/ctflearner/Vulnerability/blob/main/MINICAL/minical.md
|
||
|
CVE-2023-3308 - https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md
|
||
|
CVE-2023-3309 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309
|
||
|
CVE-2023-3311 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3311
|
||
|
CVE-2023-3313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403
|
||
|
CVE-2023-33131 - http://packetstormsecurity.com/files/173361/Microsoft-365-MSO-2306-Build-16.0.16529.20100-Remote-Code-Execution.html
|
||
|
CVE-2023-3314 - https://kcm.trellix.com/corporate/index?page=content&id=SB10403
|
||
|
CVE-2023-33140 - http://packetstormsecurity.com/files/173064/Microsoft-OneNote-2305-Build-16.0.16501.20074-Spoofing.html
|
||
|
CVE-2023-33148 - http://packetstormsecurity.com/files/173591/Microsoft-Office-365-18.2305.1222.0-Remote-Code-Execution.html
|
||
|
CVE-2023-3316 - https://research.jfrog.com/vulnerabilities/libtiff-nullderef-dos-xray-522144/
|
||
|
CVE-2023-3318 - https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318
|
||
|
CVE-2023-33185 - https://github.com/django-ses/django-ses/blob/3d627067935876487f9938310d5e1fbb249a7778/CVE/001-cert-url-signature-verification.md
|
||
|
CVE-2023-33190 - https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62
|
||
|
CVE-2023-33194 - https://github.com/craftcms/cms/security/advisories/GHSA-3wxg-w96j-8hq9
|
||
|
CVE-2023-33195 - https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x
|
||
|
CVE-2023-33196 - https://github.com/craftcms/cms/security/advisories/GHSA-cjmm-x9x9-m2w5
|
||
|
CVE-2023-33197 - https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr
|
||
|
CVE-2023-3320 - http://packetstormsecurity.com/files/173048/WordPress-WP-Sticky-Social-1.0.1-CSRF-Cross-Site-Scripting.html
|
||
|
CVE-2023-33203 - https://bugzilla.suse.com/show_bug.cgi?id=1210685
|
||
|
CVE-2023-33203 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
|
||
|
CVE-2023-33237 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-33238 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-33239 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-33241 - https://github.com/fireblocks-labs/safeheron-gg20-exploit-poc
|
||
|
CVE-2023-33241 - https://www.fireblocks.com/blog/gg18-and-gg20-paillier-key-vulnerability-technical-report/
|
||
|
CVE-2023-33242 - https://github.com/fireblocks-labs/zengo-lindell17-exploit-poc
|
||
|
CVE-2023-33242 - https://www.fireblocks.com/blog/lindell17-abort-vulnerability-technical-report/
|
||
|
CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses
|
||
|
CVE-2023-33243 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2022-004/-starface-authentication-with-password-hash-possible
|
||
|
CVE-2023-33246 - http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html
|
||
|
CVE-2023-33253 - https://github.com/Toxich4/CVE-2023-33253
|
||
|
CVE-2023-33255 - http://packetstormsecurity.com/files/172644/Papaya-Medical-Viewer-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-33263 - https://packetstormsecurity.com/files/172560/WFTPD-3.25-Credential-Disclosure.html
|
||
|
CVE-2023-33268 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33268.md
|
||
|
CVE-2023-33269 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33269.md
|
||
|
CVE-2023-33270 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33270.md
|
||
|
CVE-2023-33271 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33271.md
|
||
|
CVE-2023-33272 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33272.md
|
||
|
CVE-2023-33273 - https://github.com/l4rRyxz/CVE-Disclosures/blob/main/CVE-2023-33273.md
|
||
|
CVE-2023-33274 - https://gist.github.com/pedromonteirobb/a0584095b46141702c8cae0f3f1b6759
|
||
|
CVE-2023-33276 - https://www.syss.de/en/responsible-disclosure-policy
|
||
|
CVE-2023-33276 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-016.txt
|
||
|
CVE-2023-33277 - https://www.syss.de/en/responsible-disclosure-policy
|
||
|
CVE-2023-33277 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt
|
||
|
CVE-2023-33284 - https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html
|
||
|
CVE-2023-33288 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
|
||
|
CVE-2023-33289 - https://gist.github.com/6en6ar/b118888dc739e8979038f24c8ac33611
|
||
|
CVE-2023-33291 - http://packetstormsecurity.com/files/172476/eBankIT-6-Arbitrary-OTP-Generation.html
|
||
|
CVE-2023-33335 - https://inf0seq.github.io/cve/2023/05/03/Cross-Site-scripting-(XSS)-in-Sophos-iView.html
|
||
|
CVE-2023-33336 - https://inf0seq.github.io/cve/2023/04/30/Cross-site-scripting-(XSS)-in-Sophos-Web-Appliance-4.1.1-0.9.html
|
||
|
CVE-2023-33356 - https://github.com/Thecosy/IceCMS/issues/8
|
||
|
CVE-2023-33359 - https://github.com/Piwigo/Piwigo/issues/1908
|
||
|
CVE-2023-3338 - https://seclists.org/oss-sec/2023/q2/276
|
||
|
CVE-2023-33383 - http://packetstormsecurity.com/files/173954/Shelly-PRO-4PM-0.11.0-Authentication-Bypass.html
|
||
|
CVE-2023-33383 - https://www.exploitsecurity.io/post/cve-2023-33383-authentication-bypass-via-an-out-of-bounds-read-vulnerability
|
||
|
CVE-2023-33386 - https://github.com/b1ackc4t/MarsCTF/issues/10
|
||
|
CVE-2023-33387 - https://www.tuv.com/landingpage/de/schwachstelle/
|
||
|
CVE-2023-33408 - https://github.com/Thirukrishnan/CVE-2023-33408
|
||
|
CVE-2023-33409 - https://github.com/Thirukrishnan/CVE-2023-33409
|
||
|
CVE-2023-33410 - https://github.com/Thirukrishnan/CVE-2023-33410
|
||
|
CVE-2023-3342 - http://packetstormsecurity.com/files/173434/WordPress-User-Registration-3.0.2-Arbitrary-File-Upload.html
|
||
|
CVE-2023-33440 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html
|
||
|
CVE-2023-33443 - https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras/
|
||
|
CVE-2023-3346 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-007_en.pdf
|
||
|
CVE-2023-33478 - https://github.com/remoteclinic/RemoteClinic/issues/22
|
||
|
CVE-2023-33479 - https://github.com/remoteclinic/RemoteClinic/issues/23
|
||
|
CVE-2023-33480 - https://github.com/remoteclinic/RemoteClinic/issues/24
|
||
|
CVE-2023-33485 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/5
|
||
|
CVE-2023-33486 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3
|
||
|
CVE-2023-33487 - https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/4
|
||
|
CVE-2023-33496 - https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md
|
||
|
CVE-2023-33510 - https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/
|
||
|
CVE-2023-33518 - https://github.com/emoncms/emoncms/issues/1856
|
||
|
CVE-2023-33534 - https://rodelllemit.medium.com/cve-2023-33534-account-takeover-through-csrf-vulnerability-461de6f1b696
|
||
|
CVE-2023-33537 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/1/TL-WR940N_TL-WR841N_TL-WR740N_userRpm_FixMapCfgRpm.md
|
||
|
CVE-2023-33538 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/3/TL-WR940N_TL-WR841N_userRpm_WlanNetworkRpm_Command_Injection.md
|
||
|
CVE-2023-33544 - https://github.com/hawtio/hawtio/issues/2832
|
||
|
CVE-2023-33546 - https://github.com/janino-compiler/janino/issues/201
|
||
|
CVE-2023-33553 - https://github.com/0xfml/poc/blob/main/PLANET/WDRT-1800AX.md
|
||
|
CVE-2023-33556 - https://github.com/Am1ngl/ttt/tree/main/37
|
||
|
CVE-2023-33558 - https://github.com/ninj4c0d3r/OcoMon-Research/commit/6357def478b11119270b89329fceb115f12c69fc
|
||
|
CVE-2023-33568 - https://www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dump/
|
||
|
CVE-2023-33570 - https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490
|
||
|
CVE-2023-33580 - http://packetstormsecurity.com/files/173030/Student-Study-Center-Management-System-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-33580 - https://www.exploit-db.com/exploits/51528
|
||
|
CVE-2023-33584 - http://packetstormsecurity.com/files/172718/Enrollment-System-Project-1.0-Authentication-Bypass-SQL-Injection.html
|
||
|
CVE-2023-33584 - https://packetstormsecurity.com/files/cve/CVE-2023-33584
|
||
|
CVE-2023-33584 - https://www.exploit-db.com/exploits/51501
|
||
|
CVE-2023-33592 - http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html
|
||
|
CVE-2023-33595 - https://github.com/python/cpython/issues/103824
|
||
|
CVE-2023-33621 - https://justinapplegate.me/2023/glinet-CVE-2023-33621/
|
||
|
CVE-2023-33625 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/cmd%20injection/README.md
|
||
|
CVE-2023-33625 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/cmd%20injection
|
||
|
CVE-2023-33626 - https://github.com/naihsin/IoT/blob/main/D-Link/DIR-600/overflow/README.md
|
||
|
CVE-2023-33626 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-600/overflow
|
||
|
CVE-2023-33627 - https://hackmd.io/@0dayResearch/UpdateSnat
|
||
|
CVE-2023-33628 - https://hackmd.io/@0dayResearch/DelvsList_R300
|
||
|
CVE-2023-33629 - https://hackmd.io/@0dayResearch/r1UjggZfh
|
||
|
CVE-2023-33630 - https://hackmd.io/@0dayResearch/HkUA31-Mh
|
||
|
CVE-2023-33631 - https://hackmd.io/@0dayResearch/DelSTList
|
||
|
CVE-2023-33632 - https://hackmd.io/@0dayResearch/r1N7fg-fn
|
||
|
CVE-2023-33633 - https://hackmd.io/@0dayResearch/UpdateWanParams
|
||
|
CVE-2023-33634 - https://hackmd.io/@0dayResearch/r1g5bl-Mn
|
||
|
CVE-2023-33635 - https://hackmd.io/@0dayResearch/UpdateMacClone
|
||
|
CVE-2023-33636 - https://hackmd.io/@0dayResearch/HyX6mgWz2
|
||
|
CVE-2023-33637 - https://hackmd.io/@0dayResearch/r1azLeWz3
|
||
|
CVE-2023-33638 - https://hackmd.io/@0dayResearch/ryyALdiV3
|
||
|
CVE-2023-33639 - https://hackmd.io/@0dayResearch/Bk2hvYkH3
|
||
|
CVE-2023-33640 - https://hackmd.io/@0dayResearch/S1twOtyrh
|
||
|
CVE-2023-33641 - https://hackmd.io/@0dayResearch/SycYkOj42
|
||
|
CVE-2023-33642 - https://hackmd.io/@0dayResearch/Skg0zOsVh
|
||
|
CVE-2023-33643 - https://hackmd.io/@0dayResearch/S1N5bdsE2
|
||
|
CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1164
|
||
|
CVE-2023-33656 - https://github.com/emqx/nanomq/issues/1165#issuecomment-1515667127
|
||
|
CVE-2023-33657 - https://github.com/emqx/nanomq/issues/1165#issue-1668648319
|
||
|
CVE-2023-33658 - https://github.com/emqx/nanomq/issues/1153
|
||
|
CVE-2023-33659 - https://github.com/emqx/nanomq/issues/1154
|
||
|
CVE-2023-33660 - https://github.com/emqx/nanomq/issues/1155
|
||
|
CVE-2023-33661 - https://github.com/ChurchCRM/CRM/issues/6474
|
||
|
CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N1/README.md
|
||
|
CVE-2023-33669 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N1
|
||
|
CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N3/README.md
|
||
|
CVE-2023-33670 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N3
|
||
|
CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N4/README.md
|
||
|
CVE-2023-33671 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N4
|
||
|
CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N2/README.md
|
||
|
CVE-2023-33672 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N2
|
||
|
CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N6/README.md
|
||
|
CVE-2023-33673 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N6
|
||
|
CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/blob/main/AC8V4.0/N5/README.md
|
||
|
CVE-2023-33675 - https://github.com/DDizzzy79/Tenda-CVE/tree/main/AC8V4.0/N5
|
||
|
CVE-2023-3368 - https://starlabs.sg/advisories/23/23-3368/
|
||
|
CVE-2023-33684 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5771.php
|
||
|
CVE-2023-33690 - https://github.com/lane711/sonicjs/pull/183
|
||
|
CVE-2023-33690 - https://youtu.be/6ZuwA9CkQLg
|
||
|
CVE-2023-33693 - https://github.com/tsingsee/EasyPlayerPro-Win/pull/24
|
||
|
CVE-2023-33716 - https://github.com/enzo1982/mp4v2/issues/36
|
||
|
CVE-2023-33717 - https://github.com/enzo1982/mp4v2/issues/37
|
||
|
CVE-2023-33718 - https://github.com/enzo1982/mp4v2/issues/37
|
||
|
CVE-2023-33719 - https://github.com/enzo1982/mp4v2/issues/37
|
||
|
CVE-2023-33720 - https://github.com/enzo1982/mp4v2/issues/36
|
||
|
CVE-2023-33733 - https://github.com/c53elyas/CVE-2023-33733
|
||
|
CVE-2023-33740 - https://github.com/zzh-newlearner/record/blob/main/luowice_warning.md
|
||
|
CVE-2023-33741 - https://github.com/zzh-newlearner/record/blob/main/macrovideo_share.md
|
||
|
CVE-2023-33742 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
||
|
CVE-2023-33743 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
||
|
CVE-2023-33744 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
||
|
CVE-2023-33745 - http://packetstormsecurity.com/files/173764/RoomCast-TA-2400-Cleartext-Private-Key-Improper-Access-Control.html
|
||
|
CVE-2023-33747 - http://packetstormsecurity.com/files/172768/CloudPanel-2.2.2-Privilege-Escalation-Path-Traversal.html
|
||
|
CVE-2023-33747 - https://github.com/EagleTube/CloudPanel
|
||
|
CVE-2023-33754 - https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md
|
||
|
CVE-2023-33757 - https://github.com/twignet/splicecom
|
||
|
CVE-2023-33758 - https://github.com/twignet/splicecom
|
||
|
CVE-2023-33759 - https://github.com/twignet/splicecom
|
||
|
CVE-2023-33760 - https://github.com/twignet/splicecom
|
||
|
CVE-2023-33761 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33761
|
||
|
CVE-2023-33763 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33763
|
||
|
CVE-2023-33764 - https://github.com/rauschecker/CVEs/tree/main/CVE-2023-33764
|
||
|
CVE-2023-33778 - https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef
|
||
|
CVE-2023-33780 - https://github.com/invernyx/smartcars-3-bugs/security/advisories/GHSA-hx8p-f8h7-5h78
|
||
|
CVE-2023-33781 - https://github.com/s0tr/CVE-2023-33781
|
||
|
CVE-2023-33782 - https://github.com/s0tr/CVE-2023-33782
|
||
|
CVE-2023-33785 - https://github.com/anhdq201/netbox/issues/8
|
||
|
CVE-2023-33786 - https://github.com/anhdq201/netbox/issues/2
|
||
|
CVE-2023-33787 - https://github.com/anhdq201/netbox/issues/6
|
||
|
CVE-2023-33788 - https://github.com/anhdq201/netbox/issues/3
|
||
|
CVE-2023-33789 - https://github.com/anhdq201/netbox/issues/7
|
||
|
CVE-2023-33790 - https://github.com/anhdq201/netbox/issues/9
|
||
|
CVE-2023-33791 - https://github.com/anhdq201/netbox/issues/4
|
||
|
CVE-2023-33792 - https://github.com/anhdq201/netbox/issues/10
|
||
|
CVE-2023-33793 - https://github.com/anhdq201/netbox/issues/1
|
||
|
CVE-2023-33794 - https://github.com/anhdq201/netbox/issues/5
|
||
|
CVE-2023-33795 - https://github.com/anhdq201/netbox/issues/15
|
||
|
CVE-2023-33796 - https://github.com/anhdq201/netbox/issues/16
|
||
|
CVE-2023-33797 - https://github.com/anhdq201/netbox/issues/12
|
||
|
CVE-2023-33798 - https://github.com/anhdq201/netbox/issues/13
|
||
|
CVE-2023-33799 - https://github.com/anhdq201/netbox/issues/14
|
||
|
CVE-2023-3380 - https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md
|
||
|
CVE-2023-33800 - https://github.com/anhdq201/netbox/issues/11
|
||
|
CVE-2023-33817 - https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5
|
||
|
CVE-2023-33829 - http://packetstormsecurity.com/files/172588/SCM-Manager-1.60-Cross-Site-Scripting.html
|
||
|
CVE-2023-33829 - https://github.com/n3gox/Stored-XSS-on-SCM-Manager-1.60
|
||
|
CVE-2023-33849 - https://www.ibm.com/support/pages/node/7001687
|
||
|
CVE-2023-3385 - https://gitlab.com/gitlab-org/gitlab/-/issues/416161
|
||
|
CVE-2023-33863 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
|
||
|
CVE-2023-33863 - http://seclists.org/fulldisclosure/2023/Jun/2
|
||
|
CVE-2023-33863 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
|
||
|
CVE-2023-33864 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
|
||
|
CVE-2023-33864 - http://seclists.org/fulldisclosure/2023/Jun/2
|
||
|
CVE-2023-33864 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
|
||
|
CVE-2023-33865 - http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html
|
||
|
CVE-2023-33865 - http://seclists.org/fulldisclosure/2023/Jun/2
|
||
|
CVE-2023-33865 - https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt
|
||
|
CVE-2023-33866 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1757
|
||
|
CVE-2023-33873 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
||
|
CVE-2023-33876 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1796
|
||
|
CVE-2023-3389 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-3390 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-33919 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
||
|
CVE-2023-33919 - http://seclists.org/fulldisclosure/2023/Jul/14
|
||
|
CVE-2023-33920 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
||
|
CVE-2023-33920 - http://seclists.org/fulldisclosure/2023/Jul/14
|
||
|
CVE-2023-33921 - http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html
|
||
|
CVE-2023-33921 - http://seclists.org/fulldisclosure/2023/Jul/14
|
||
|
CVE-2023-3393 - https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914
|
||
|
CVE-2023-3394 - https://huntr.dev/bounties/84bf3e85-cdeb-4b8d-9ea4-74156dbda83f
|
||
|
CVE-2023-33956 - https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2
|
||
|
CVE-2023-33968 - https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr
|
||
|
CVE-2023-33969 - https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9
|
||
|
CVE-2023-33970 - https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286
|
||
|
CVE-2023-33971 - https://github.com/pluginsGLPI/formcreator/security/advisories/GHSA-777g-3848-8r3g
|
||
|
CVE-2023-33977 - https://huntr.dev/bounties/6aea9a26-e29a-467b-aa5a-f767f0c2ec96/
|
||
|
CVE-2023-3398 - https://huntr.dev/bounties/aa087215-80e1-433d-b870-650705630e69
|
||
|
CVE-2023-33984 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33985 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33986 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33987 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33988 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33989 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33990 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33991 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-33992 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-3401 - https://gitlab.com/gitlab-org/gitlab/-/issues/416252
|
||
|
CVE-2023-34039 - http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html
|
||
|
CVE-2023-34039 - http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html
|
||
|
CVE-2023-34044 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html
|
||
|
CVE-2023-34045 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html
|
||
|
CVE-2023-34046 - https://www.vmware.com/security/advisories/VMSA-2023-0022.html
|
||
|
CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/10/27/3
|
||
|
CVE-2023-34059 - http://www.openwall.com/lists/oss-security/2023/11/26/1
|
||
|
CVE-2023-34092 - https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67
|
||
|
CVE-2023-34093 - https://github.com/strapi/strapi/commit/2fa8f30371bfd1db44c15e5747860ee5789096de
|
||
|
CVE-2023-34093 - https://github.com/strapi/strapi/releases/tag/v4.10.8
|
||
|
CVE-2023-34093 - https://github.com/strapi/strapi/security/advisories/GHSA-chmr-rg2f-9jmf
|
||
|
CVE-2023-34096 - http://packetstormsecurity.com/files/172822/Thruk-Monitoring-Web-Interface-3.06-Path-Traversal.html
|
||
|
CVE-2023-34096 - https://galogetlatorre.blogspot.com/2023/06/cve-2023-34096-path-traversal-thruk.html
|
||
|
CVE-2023-34096 - https://github.com/galoget/Thruk-CVE-2023-34096
|
||
|
CVE-2023-34096 - https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h
|
||
|
CVE-2023-34096 - https://www.exploit-db.com/exploits/51509
|
||
|
CVE-2023-34097 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833
|
||
|
CVE-2023-34102 - https://github.com/avo-hq/avo/security/advisories/GHSA-86h2-2g4g-29qx
|
||
|
CVE-2023-34103 - https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39
|
||
|
CVE-2023-34105 - https://github.com/ossrs/srs/security/advisories/GHSA-vpr5-779c-cx62
|
||
|
CVE-2023-34111 - https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr
|
||
|
CVE-2023-34111 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2023-34112 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2023-34124 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
||
|
CVE-2023-34127 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
||
|
CVE-2023-34132 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
||
|
CVE-2023-34133 - http://packetstormsecurity.com/files/174571/Sonicwall-GMS-9.9.9320-Remote-Code-Execution.html
|
||
|
CVE-2023-34151 - https://github.com/ImageMagick/ImageMagick/issues/6341
|
||
|
CVE-2023-34152 - https://github.com/ImageMagick/ImageMagick/issues/6339
|
||
|
CVE-2023-34153 - https://github.com/ImageMagick/ImageMagick/issues/6338
|
||
|
CVE-2023-34188 - https://github.com/cesanta/mongoose/pull/2197
|
||
|
CVE-2023-34198 - https://advisories.stormshield.eu/2023-019
|
||
|
CVE-2023-34204 - https://github.com/imapsync/imapsync/issues/399
|
||
|
CVE-2023-34205 - https://github.com/moov-io/signedxml/issues/23
|
||
|
CVE-2023-3421 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751
|
||
|
CVE-2023-34213 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-34214 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-34215 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-34216 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-34217 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
|
||
|
CVE-2023-3423 - https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139
|
||
|
CVE-2023-34235 - https://github.com/strapi/strapi/releases/tag/v4.10.8
|
||
|
CVE-2023-34235 - https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f
|
||
|
CVE-2023-34251 - https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5
|
||
|
CVE-2023-34253 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/
|
||
|
CVE-2023-34259 - https://seclists.org/fulldisclosure/2023/Jul/15
|
||
|
CVE-2023-34260 - https://seclists.org/fulldisclosure/2023/Jul/15
|
||
|
CVE-2023-34261 - https://seclists.org/fulldisclosure/2023/Jul/15
|
||
|
CVE-2023-3431 - https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c
|
||
|
CVE-2023-34312 - https://github.com/vi3t1/qq-tim-elevation
|
||
|
CVE-2023-34317 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
|
||
|
CVE-2023-34319 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-3432 - https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51
|
||
|
CVE-2023-34346 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764
|
||
|
CVE-2023-34353 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1776
|
||
|
CVE-2023-34354 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1781
|
||
|
CVE-2023-34356 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778
|
||
|
CVE-2023-3436 - https://forum.xpdfreader.com/viewtopic.php?t=42618
|
||
|
CVE-2023-34362 - http://packetstormsecurity.com/files/172883/MOVEit-Transfer-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2023-34362 - http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html
|
||
|
CVE-2023-34365 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763
|
||
|
CVE-2023-34366 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758
|
||
|
CVE-2023-34366 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1758
|
||
|
CVE-2023-34367 - http://blog.pi3.com.pl/?p=850
|
||
|
CVE-2023-34367 - https://portswigger.net/daily-swig/blind-tcp-ip-hijacking-is-resurrected-for-windows-7
|
||
|
CVE-2023-3438 - https://kcm.trellix.com/corporate/index?page=content&id=SB10404
|
||
|
CVE-2023-3439 - http://www.openwall.com/lists/oss-security/2023/07/02/1
|
||
|
CVE-2023-3439 - https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269
|
||
|
CVE-2023-34407 - https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/
|
||
|
CVE-2023-34408 - https://huntr.dev/bounties/c6119106-1a5c-464c-94dd-ee7c5d0bece0/
|
||
|
CVE-2023-34409 - https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/
|
||
|
CVE-2023-34426 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1766
|
||
|
CVE-2023-34434 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-34448 - https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/
|
||
|
CVE-2023-3445 - https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070
|
||
|
CVE-2023-34452 - https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc
|
||
|
CVE-2023-34457 - https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4
|
||
|
CVE-2023-34467 - https://jira.xwiki.org/browse/XWIKI-20333
|
||
|
CVE-2023-34468 - http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html
|
||
|
CVE-2023-34488 - https://github.com/emqx/nanomq/issues/1181
|
||
|
CVE-2023-34494 - https://github.com/emqx/nanomq/issues/1180
|
||
|
CVE-2023-34553 - https://ashallen.net/wireless-smart-lock-vulnerability-disclosure
|
||
|
CVE-2023-34561 - https://www.youtube.com/watch?v=DMxucOWfLPc
|
||
|
CVE-2023-34561 - https://www.youtube.com/watch?v=ev0VXbiduuQ
|
||
|
CVE-2023-34561 - https://www.youtube.com/watch?v=kAeJvY6BBps
|
||
|
CVE-2023-34563 - https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-34563/EN.md
|
||
|
CVE-2023-34565 - https://github.com/grayfullbuster0804/netbox/issues/1
|
||
|
CVE-2023-34566 - https://hackmd.io/@0dayResearch/rk8hQf5rh
|
||
|
CVE-2023-34567 - https://hackmd.io/@0dayResearch/H1xUqzfHh
|
||
|
CVE-2023-34568 - https://hackmd.io/@0dayResearch/ryR8IzMH2
|
||
|
CVE-2023-34569 - https://hackmd.io/@0dayResearch/HymuzffSh
|
||
|
CVE-2023-34570 - https://hackmd.io/@0dayResearch/S1eI91_l2
|
||
|
CVE-2023-34571 - https://hackmd.io/@0dayResearch/S1GcUxzSn
|
||
|
CVE-2023-34581 - https://packetstormsecurity.com/files/172559/Service-Provider-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2023-34581 - https://vulners.com/packetstorm/PACKETSTORM:172559
|
||
|
CVE-2023-34581 - https://www.exploit-db.com/exploits/51482
|
||
|
CVE-2023-34598 - https://github.com/maddsec/CVE-2023-34598
|
||
|
CVE-2023-34599 - https://github.com/maddsec/CVE-2023-34599
|
||
|
CVE-2023-34602 - https://github.com/jeecgboot/jeecg-boot/issues/4983
|
||
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/48/
|
||
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/49/
|
||
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/50/
|
||
|
CVE-2023-34609 - https://sourceforge.net/p/flexjson/bugs/51/
|
||
|
CVE-2023-34610 - https://github.com/jdereg/json-io/issues/169
|
||
|
CVE-2023-34611 - https://github.com/bolerio/mjson/issues/40
|
||
|
CVE-2023-34612 - https://github.com/phax/ph-commons/issues/35
|
||
|
CVE-2023-34613 - https://github.com/maddingo/sojo/issues/15
|
||
|
CVE-2023-34614 - https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij
|
||
|
CVE-2023-34615 - https://github.com/billdavidson/JSONUtil/issues/10
|
||
|
CVE-2023-34616 - https://github.com/InductiveComputerScience/pbJson/issues/2
|
||
|
CVE-2023-34617 - https://github.com/owlike/genson/issues/191
|
||
|
CVE-2023-34620 - https://github.com/hjson/hjson-java/issues/24
|
||
|
CVE-2023-34623 - https://github.com/trajano/jtidy/issues/4
|
||
|
CVE-2023-34624 - https://github.com/amplafi/htmlcleaner/issues/13
|
||
|
CVE-2023-34625 - https://packetstormsecurity.com/2307-exploits/mojobox14-replay.txt
|
||
|
CVE-2023-34625 - https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock
|
||
|
CVE-2023-34634 - http://packetstormsecurity.com/files/173825/GreenShot-1.2.10-Arbitrary-Code-Execution.html
|
||
|
CVE-2023-34634 - http://packetstormsecurity.com/files/174222/Greenshot-1.3.274-Deserialization-Command-Execution.html
|
||
|
CVE-2023-34634 - https://greenshot.atlassian.net/browse/BUG-3061
|
||
|
CVE-2023-34634 - https://www.exploit-db.com/exploits/51633
|
||
|
CVE-2023-34635 - http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html
|
||
|
CVE-2023-34635 - https://www.exploit-db.com/exploits/51610
|
||
|
CVE-2023-34644 - https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/
|
||
|
CVE-2023-34645 - https://github.com/jflyfox/jfinal_cms/issues/57
|
||
|
CVE-2023-3465 - https://vuldb.com/?id.232711
|
||
|
CVE-2023-34654 - https://github.com/ae6e361b/taocms-XSS
|
||
|
CVE-2023-34666 - https://www.exploit-db.com/exploits/49204
|
||
|
CVE-2023-3469 - https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca
|
||
|
CVE-2023-34723 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
|
||
|
CVE-2023-34723 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
|
||
|
CVE-2023-34724 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
|
||
|
CVE-2023-34724 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
|
||
|
CVE-2023-34725 - http://packetstormsecurity.com/files/174553/TECHView-LA5570-Wireless-Gateway-1.0.19_T53-Traversal-Privilege-Escalation.html
|
||
|
CVE-2023-34725 - https://www.exploitsecurity.io/post/cve-2023-34723-cve-2023-34724-cve-2023-34725
|
||
|
CVE-2023-34733 - https://github.com/zj3t/Automotive-vulnerabilities/tree/main/VW/jetta2021
|
||
|
CVE-2023-34734 - https://github.com/prismbreak/vulnerabilities/issues/3
|
||
|
CVE-2023-34735 - https://github.com/prismbreak/vulnerabilities/issues/4
|
||
|
CVE-2023-34736 - https://github.com/prismbreak/vulnerabilities/issues/5
|
||
|
CVE-2023-34750 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34751 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34752 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34753 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34754 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34755 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34756 - https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
|
||
|
CVE-2023-34758 - https://github.com/advisories/GHSA-8jxm-xp43-qh3q
|
||
|
CVE-2023-34758 - https://github.com/tangent65536/Slivjacker
|
||
|
CVE-2023-3479 - https://huntr.dev/bounties/6ac5cf87-6350-4645-8930-8f2876427723
|
||
|
CVE-2023-34795 - https://github.com/brechtsanders/xlsxio/issues/121
|
||
|
CVE-2023-34800 - https://github.com/Tyaoo/IoT-Vuls/blob/main/dlink/Go-RT-AC750/vul.md
|
||
|
CVE-2023-34830 - https://medium.com/@ray.999/cve-2023-34830-reflected-xss-on-i-doit-open-v24-and-below-ad58036f5407
|
||
|
CVE-2023-34832 - http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html
|
||
|
CVE-2023-34834 - https://www.exploit-db.com/exploits/51542
|
||
|
CVE-2023-34845 - https://github.com/bludit/bludit/issues/1369#issuecomment-940806199
|
||
|
CVE-2023-34849 - https://github.com/cczzmm/IOT-POC/tree/main/Ikuai
|
||
|
CVE-2023-3486 - https://www.tenable.com/security/research/tra-2023-23
|
||
|
CVE-2023-34867 - https://github.com/jerryscript-project/jerryscript/issues/5084
|
||
|
CVE-2023-34868 - https://github.com/jerryscript-project/jerryscript/issues/5083
|
||
|
CVE-2023-34872 - https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399
|
||
|
CVE-2023-3490 - https://huntr.dev/bounties/4e60ebc1-e00f-48cb-b011-3cefce688ecd
|
||
|
CVE-2023-3491 - https://huntr.dev/bounties/043bd900-ac78-44d2-a340-84ddd0bc4a1d
|
||
|
CVE-2023-34916 - https://github.com/fuge/cms/issues/4
|
||
|
CVE-2023-34917 - https://github.com/fuge/cms/issues/3
|
||
|
CVE-2023-34924 - https://github.com/ChrisL0tus/CVE-2023-34924
|
||
|
CVE-2023-34927 - https://github.com/casdoor/casdoor/issues/1531
|
||
|
CVE-2023-34928 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34928.md
|
||
|
CVE-2023-34929 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34929.md
|
||
|
CVE-2023-34930 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34930.md
|
||
|
CVE-2023-34931 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md
|
||
|
CVE-2023-34932 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34932.md
|
||
|
CVE-2023-34933 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34933.md
|
||
|
CVE-2023-34934 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34934.md
|
||
|
CVE-2023-34935 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34935.md
|
||
|
CVE-2023-34936 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md
|
||
|
CVE-2023-34937 - https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md
|
||
|
CVE-2023-34939 - https://github.com/firsov/onlyoffice
|
||
|
CVE-2023-34939 - https://github.com/firsov/onlyoffice/blob/main/CVE-2023-34939-PoC.md
|
||
|
CVE-2023-34960 - http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html
|
||
|
CVE-2023-34982 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
||
|
CVE-2023-34994 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
|
||
|
CVE-2023-34998 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
|
||
|
CVE-2023-35001 - http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
|
||
|
CVE-2023-35001 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-35002 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760
|
||
|
CVE-2023-35016 - https://www.ibm.com/support/pages/node/7014397
|
||
|
CVE-2023-35019 - https://www.ibm.com/support/pages/node/7014397
|
||
|
CVE-2023-35055 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
|
||
|
CVE-2023-35056 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
|
||
|
CVE-2023-35057 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
|
||
|
CVE-2023-35057 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1821
|
||
|
CVE-2023-35088 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-3511 - https://gitlab.com/gitlab-org/gitlab/-/issues/416961
|
||
|
CVE-2023-35110 - https://github.com/grobmeier/jjson/issues/2
|
||
|
CVE-2023-35116 - https://github.com/FasterXML/jackson-databind/issues/3972
|
||
|
CVE-2023-35124 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1775
|
||
|
CVE-2023-35126 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825
|
||
|
CVE-2023-35126 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825
|
||
|
CVE-2023-3513 - https://starlabs.sg/advisories/23/23-3513/
|
||
|
CVE-2023-3514 - https://starlabs.sg/advisories/23/23-3514/
|
||
|
CVE-2023-3515 - https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053
|
||
|
CVE-2023-35153 - https://jira.xwiki.org/browse/XWIKI-20365
|
||
|
CVE-2023-35155 - https://jira.xwiki.org/browse/XWIKI-20370
|
||
|
CVE-2023-35156 - https://jira.xwiki.org/browse/XWIKI-20341
|
||
|
CVE-2023-35157 - https://jira.xwiki.org/browse/XWIKI-20339
|
||
|
CVE-2023-35158 - https://jira.xwiki.org/browse/XWIKI-20352
|
||
|
CVE-2023-35160 - https://jira.xwiki.org/browse/XWIKI-20343
|
||
|
CVE-2023-35162 - https://jira.xwiki.org/browse/XWIKI-20342
|
||
|
CVE-2023-35169 - https://github.com/Webklex/php-imap/security/advisories/GHSA-47p7-xfcc-4pv9
|
||
|
CVE-2023-3519 - http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html
|
||
|
CVE-2023-35193 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
|
||
|
CVE-2023-35194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
|
||
|
CVE-2023-3520 - https://huntr.dev/bounties/f3b277bb-91db-419e-bcc4-fe0b055d2551
|
||
|
CVE-2023-3521 - https://huntr.dev/bounties/76a3441d-7f75-4a8d-a7a0-95a7f5456eb0
|
||
|
CVE-2023-3523 - https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac
|
||
|
CVE-2023-3526 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
|
||
|
CVE-2023-3526 - http://seclists.org/fulldisclosure/2023/Aug/12
|
||
|
CVE-2023-3528 - https://vuldb.com/?id.233252
|
||
|
CVE-2023-3531 - https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414
|
||
|
CVE-2023-3532 - https://huntr.dev/bounties/ebd2428a-e2cb-480e-ba37-dd89ad62cf1b
|
||
|
CVE-2023-3533 - https://starlabs.sg/advisories/23/23-3533/
|
||
|
CVE-2023-35356 - http://packetstormsecurity.com/files/174115/Microsoft-Windows-Kernel-Arbitrary-Read.html
|
||
|
CVE-2023-35356 - http://packetstormsecurity.com/files/174118/Microsoft-Windows-Kernel-Security-Descriptor-Use-After-Free.html
|
||
|
CVE-2023-35356 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html
|
||
|
CVE-2023-35357 - http://packetstormsecurity.com/files/174116/Microsoft-Windows-Kernel-Unsafe-Reference.html
|
||
|
CVE-2023-35358 - http://packetstormsecurity.com/files/174117/Microsoft-Windows-Kernel-Unsafe-Reference.html
|
||
|
CVE-2023-35359 - http://packetstormsecurity.com/files/174528/Microsoft-Windows-Privilege-Escalation.html
|
||
|
CVE-2023-3537 - https://vuldb.com/?id.233289
|
||
|
CVE-2023-35382 - http://packetstormsecurity.com/files/174450/Microsoft-Windows-Kernel-Use-After-Free.html
|
||
|
CVE-2023-35386 - http://packetstormsecurity.com/files/174567/Microsoft-Windows-Kernel-Integer-Overflow-Out-Of-Bounds-Read.html
|
||
|
CVE-2023-3545 - https://starlabs.sg/advisories/23/23-3545/
|
||
|
CVE-2023-3551 - https://huntr.dev/bounties/cf8878ff-6cd9-49be-b313-7ac2a94fc7f7
|
||
|
CVE-2023-3552 - https://huntr.dev/bounties/aeb2f43f-0602-4ac6-9685-273e87ff4ded
|
||
|
CVE-2023-3553 - https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870
|
||
|
CVE-2023-3559 - https://vuldb.com/?id.233353
|
||
|
CVE-2023-35633 - http://packetstormsecurity.com/files/176451/Microsoft-Windows-Registry-Predefined-Keys-Privilege-Escalation.html
|
||
|
CVE-2023-3565 - https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530
|
||
|
CVE-2023-3566 - https://github.com/ctflearner/Vulnerability/blob/main/WALLABAG/NAME-LIMIT.md
|
||
|
CVE-2023-3566 - https://youtu.be/ouwud0PlHkE
|
||
|
CVE-2023-35668 - https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd
|
||
|
CVE-2023-3567 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-3567 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-3568 - https://huntr.dev/bounties/f3782eb1-049b-4998-aac4-d9798ec1c123
|
||
|
CVE-2023-3569 - http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
|
||
|
CVE-2023-3569 - http://seclists.org/fulldisclosure/2023/Aug/12
|
||
|
CVE-2023-35695 - https://www.tenable.com/security/research/tra-2023-17
|
||
|
CVE-2023-35719 - https://www.manageengine.com/products/self-service-password/kb/our-response-to-CVE-2023-35719.html
|
||
|
CVE-2023-3574 - https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6
|
||
|
CVE-2023-3575 - https://www.onvio.nl/nieuws/research-day-discovering-vulnerabilities-in-wordpress-plugins
|
||
|
CVE-2023-35759 - http://packetstormsecurity.com/files/176978/WhatsUp-Gold-2022-22.1.0-Build-39-Cross-Site-Scripting.html
|
||
|
CVE-2023-35788 - http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
|
||
|
CVE-2023-35788 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7
|
||
|
CVE-2023-3579 - https://github.com/nightcloudos/cve/blob/main/CSRF.md
|
||
|
CVE-2023-35799 - https://advisories.stormshield.eu/2023-022/
|
||
|
CVE-2023-3580 - https://huntr.dev/bounties/4eed53ca-06c2-43aa-aea8-c03ea5f13ce4
|
||
|
CVE-2023-35800 - https://advisories.stormshield.eu/2023-021/
|
||
|
CVE-2023-35808 - http://packetstormsecurity.com/files/174300/SugarCRM-12.2.0-Shell-Upload.html
|
||
|
CVE-2023-35808 - http://seclists.org/fulldisclosure/2023/Aug/26
|
||
|
CVE-2023-35809 - http://packetstormsecurity.com/files/174301/SugarCRM-12.2.0-Bean-Manipulation.html
|
||
|
CVE-2023-35810 - http://packetstormsecurity.com/files/174302/SugarCRM-12.2.0-PHP-Object-Injection.html
|
||
|
CVE-2023-35810 - http://seclists.org/fulldisclosure/2023/Aug/28
|
||
|
CVE-2023-35811 - http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html
|
||
|
CVE-2023-35811 - http://seclists.org/fulldisclosure/2023/Aug/29
|
||
|
CVE-2023-35818 - https://espressif.com
|
||
|
CVE-2023-35839 - https://github.com/noear/solon/issues/145
|
||
|
CVE-2023-35861 - https://blog.freax13.de/cve/cve-2023-35861
|
||
|
CVE-2023-35863 - https://ctrl-c.club/~blue/nfsdk.html
|
||
|
CVE-2023-35866 - https://medium.com/@cybercitizen.tech/keepassxc-vulnerability-cve-2023-35866-dc7d447c4903
|
||
|
CVE-2023-35870 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-35871 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-35872 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-35873 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-35874 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-35885 - https://github.com/datackmy/FallingSkies-CVE-2023-35885
|
||
|
CVE-2023-35885 - https://www.datack.my/fallingskies-cloudpanel-0-day/
|
||
|
CVE-2023-35925 - https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp
|
||
|
CVE-2023-35932 - https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q
|
||
|
CVE-2023-35937 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r
|
||
|
CVE-2023-35941 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55
|
||
|
CVE-2023-35942 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4
|
||
|
CVE-2023-35943 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-mc6h-6j9x-v3gq
|
||
|
CVE-2023-35944 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g
|
||
|
CVE-2023-35945 - https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r
|
||
|
CVE-2023-35965 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
|
||
|
CVE-2023-35966 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
|
||
|
CVE-2023-35967 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788
|
||
|
CVE-2023-35968 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788
|
||
|
CVE-2023-35985 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834
|
||
|
CVE-2023-3599 - https://github.com/movonow/demo/blob/main/click_fees.md
|
||
|
CVE-2023-3607 - https://github.com/mohdkey/cve/blob/main/kodbox.md
|
||
|
CVE-2023-36085 - http://packetstormsecurity.com/files/176991/SISQUAL-WFM-7.1.319.103-Host-Header-Injection.html
|
||
|
CVE-2023-36085 - https://github.com/omershaik0/Handmade_Exploits/tree/main/SISQUALWFM-Host-Header-Injection-CVE-2023-36085
|
||
|
CVE-2023-3609 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-3609 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-36093 - https://github.com/weng-xianhu/eyoucms/issues/44
|
||
|
CVE-2023-36095 - http://langchain.com
|
||
|
CVE-2023-36109 - https://github.com/Limesss/CVE-2023-36109/tree/main
|
||
|
CVE-2023-36118 - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html
|
||
|
CVE-2023-36118 - https://www.chtsecurity.com/news/4ffbe017-70e1-4789-bfe6-4d6fb0d1a0b7
|
||
|
CVE-2023-36119 - https://nvd.nist.gov/vuln/detail/CVE-2023-0527
|
||
|
CVE-2023-36121 - https://www.chtsecurity.com/news/0a4743a5-491e-4685-95ee-df8316ab5284
|
||
|
CVE-2023-36121 - https://www.exploit-db.com/exploits/51449
|
||
|
CVE-2023-36123 - https://github.com/9Bakabaka/CVE-2023-36123
|
||
|
CVE-2023-36143 - https://github.com/leonardobg/CVE-2023-36143
|
||
|
CVE-2023-36144 - https://github.com/leonardobg/CVE-2023-36144
|
||
|
CVE-2023-36146 - https://github.com/leonardobg/CVE-2023-36146/#readme
|
||
|
CVE-2023-36158 - https://cyberredteam.tech/posts/cve-2023-36158/
|
||
|
CVE-2023-36158 - https://github.com/unknown00759/CVE-2023-36158/blob/main/CVE-2023-36158.md
|
||
|
CVE-2023-36159 - https://cyberredteam.tech/posts/cve-2023-36159/
|
||
|
CVE-2023-36162 - https://github.com/779789571/zzcms/blob/main/README.md
|
||
|
CVE-2023-36163 - http://packetstormsecurity.com/files/173366/BuildaGate5-Cross-Site-Scripting.html
|
||
|
CVE-2023-3617 - https://github.com/movonow/demo/blob/main/kruxton.md
|
||
|
CVE-2023-36177 - https://oxnan.com/posts/Snapcast_jsonrpc_rce
|
||
|
CVE-2023-36183 - https://github.com/OpenImageIO/oiio/issues/3871
|
||
|
CVE-2023-36184 - https://medium.com/@Beosin_com/critical-vulnerability-in-move-vm-can-cause-total-network-shutdown-and-potential-hard-fork-in-sui-49d0d942801c
|
||
|
CVE-2023-3620 - https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9
|
||
|
CVE-2023-36210 - https://www.exploit-db.com/exploits/51499
|
||
|
CVE-2023-36211 - https://www.exploit-db.com/exploits/51502
|
||
|
CVE-2023-36212 - https://packetstormsecurity.com/files/172687/Total-CMS-1.7.4-Shell-Upload.html
|
||
|
CVE-2023-36212 - https://www.exploit-db.com/exploits/51500
|
||
|
CVE-2023-36213 - https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html
|
||
|
CVE-2023-36213 - https://www.exploit-db.com/exploits/51504
|
||
|
CVE-2023-36217 - https://www.exploit-db.com/exploits/51520
|
||
|
CVE-2023-36220 - https://packetstormsecurity.com/files/172967/Textpattern-CMS-4.8.8-Command-Injection.html
|
||
|
CVE-2023-36239 - https://github.com/libming/libming/issues/273
|
||
|
CVE-2023-36243 - https://github.com/noirotm/flvmeta/issues/19
|
||
|
CVE-2023-3625 - https://github.com/MoeMion233/cve/blob/main/1.md
|
||
|
CVE-2023-36250 - https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md
|
||
|
CVE-2023-36252 - https://www.zeroscience.mk/en/vulnerabilities/
|
||
|
CVE-2023-36255 - https://trovent.github.io/security-advisories/TRSA-2303-01/TRSA-2303-01.txt
|
||
|
CVE-2023-36255 - https://trovent.io/security-advisory-2303-01/
|
||
|
CVE-2023-36256 - https://www.exploit-db.com/exploits/51511
|
||
|
CVE-2023-36256 - https://www.hackersnotes.com/blog/pentest/online-examination-system-project-1-0-cross-site-request-forgery-csrf/
|
||
|
CVE-2023-3626 - https://github.com/MoeMion233/cve/blob/main/2.md
|
||
|
CVE-2023-36266 - http://packetstormsecurity.com/files/173809/Keeper-Security-Desktop-16.10.2-Browser-Extension-16.5.4-Password-Dumper.html
|
||
|
CVE-2023-3627 - https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1
|
||
|
CVE-2023-36271 - https://github.com/LibreDWG/libredwg/issues/681#BUG2
|
||
|
CVE-2023-36272 - https://github.com/LibreDWG/libredwg/issues/681#BUG1
|
||
|
CVE-2023-36273 - https://github.com/LibreDWG/libredwg/issues/677#BUG1
|
||
|
CVE-2023-36274 - https://github.com/LibreDWG/libredwg/issues/677#BUG2
|
||
|
CVE-2023-36306 - https://www.exploit-db.com/exploits/51643
|
||
|
CVE-2023-36308 - https://github.com/disintegration/imaging/issues/165
|
||
|
CVE-2023-36344 - https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html
|
||
|
CVE-2023-36345 - https://youtu.be/KxjsEqNWU9E
|
||
|
CVE-2023-36345 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
||
|
CVE-2023-36346 - http://packetstormsecurity.com/files/173280/Sales-Of-Cashier-Goods-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-36346 - https://www.youtube.com/watch?v=bbbA-q1syrA
|
||
|
CVE-2023-36346 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
||
|
CVE-2023-36347 - https://www.youtube.com/watch?v=7qaIeE2cyO4
|
||
|
CVE-2023-36347 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
||
|
CVE-2023-36348 - http://packetstormsecurity.com/files/173278/POS-Codekop-2.0-Shell-Upload.html
|
||
|
CVE-2023-36348 - https://www.youtube.com/watch?v=Ge0zqY0sGiQ
|
||
|
CVE-2023-36348 - https://yuyudhn.github.io/pos-codekop-vulnerability/
|
||
|
CVE-2023-3635 - https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/
|
||
|
CVE-2023-36354 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md
|
||
|
CVE-2023-36355 - http://packetstormsecurity.com/files/173294/TP-Link-TL-WR940N-4-Buffer-Overflow.html
|
||
|
CVE-2023-36357 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/5/TL-WR941ND_TL-WR940N_TL-WR841N_userRpm_LocalManageControlRpm.md
|
||
|
CVE-2023-36359 - https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/8/TP-Link%20TL-WR940N%20TL-WR841N%20TL-WR941ND%20wireless%20router%20userRpmQoSRuleListRpm%20buffer%20read%20out-of-bounds%20vulnerability.md
|
||
|
CVE-2023-36375 - https://packetstormsecurity.com
|
||
|
CVE-2023-36376 - https://packetstormsecurity.com
|
||
|
CVE-2023-3638 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05
|
||
|
CVE-2023-36403 - http://packetstormsecurity.com/files/176209/Windows-Kernel-Race-Conditions.html
|
||
|
CVE-2023-36404 - http://packetstormsecurity.com/files/176110/Windows-Kernel-Information-Disclosure.html
|
||
|
CVE-2023-3643 - https://drive.google.com/file/d/1RXmDUAjqZvWSvHUrfRerz7My6M3KX7YG/view
|
||
|
CVE-2023-36463 - https://github.com/jucktnich/meldekarten-generator/security/advisories/GHSA-f2gp-85cr-vgj7
|
||
|
CVE-2023-36472 - https://github.com/strapi/strapi/security/advisories/GHSA-v8gg-4mq2-88q4
|
||
|
CVE-2023-36542 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-36546 - https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/
|
||
|
CVE-2023-36576 - http://packetstormsecurity.com/files/175659/Windows-Kernel-Containerized-Registry-Escape.html
|
||
|
CVE-2023-36618 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html
|
||
|
CVE-2023-36618 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/
|
||
|
CVE-2023-36619 - https://packetstormsecurity.com/files/174704/Atos-Unify-OpenScape-Code-Execution-Missing-Authentication.html
|
||
|
CVE-2023-36619 - https://sec-consult.com/vulnerability-lab/advisory/authenticated-remote-code-execution-missing-authentication-atos-unify-openscape/
|
||
|
CVE-2023-36620 - https://seclists.org/fulldisclosure/2023/Jul/12
|
||
|
CVE-2023-36621 - https://seclists.org/fulldisclosure/2023/Jul/12
|
||
|
CVE-2023-36622 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-012.txt
|
||
|
CVE-2023-36622 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013
|
||
|
CVE-2023-36623 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-013.txt
|
||
|
CVE-2023-36623 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013
|
||
|
CVE-2023-36624 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-004.txt
|
||
|
CVE-2023-36624 - https://www.syss.de/pentest-blog/root-zugang-zu-smarthome-server-loxone-miniserver-go-gen-2-syss-2023-004/-012/-013
|
||
|
CVE-2023-36629 - https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hunting-for-android-privilege-escalation-with-a-32-line-fuzzer/
|
||
|
CVE-2023-36629 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-007_Xiaomi_Redmi_10sNote-1.txt
|
||
|
CVE-2023-36630 - https://github.com/yunaranyancat/poc-dump/blob/main/cloudpanel/README.md
|
||
|
CVE-2023-36631 - https://www.bencteux.fr/posts/malwarebytes_wfc/
|
||
|
CVE-2023-36632 - https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py
|
||
|
CVE-2023-3665 - https://kcm.trellix.com/corporate/index?page=content&id=SB10405
|
||
|
CVE-2023-36656 - https://github.com/jaegertracing/jaeger-ui/security/advisories/GHSA-vv24-rm95-q56r
|
||
|
CVE-2023-36665 - https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665
|
||
|
CVE-2023-36669 - https://kratosdefense.com
|
||
|
CVE-2023-36670 - https://kratosdefense.com
|
||
|
CVE-2023-36672 - https://mullvad.net/de/blog/2023/8/9/response-to-tunnelcrack-vulnerability-disclosure/
|
||
|
CVE-2023-3672 - https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa
|
||
|
CVE-2023-3673 - https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9
|
||
|
CVE-2023-36803 - http://packetstormsecurity.com/files/175109/Microsoft-Windows-Kernel-Out-Of-Bounds-Reads-Memory-Disclosure.html
|
||
|
CVE-2023-36806 - https://herolab.usd.de/security-advisories/usd-2023-0020/
|
||
|
CVE-2023-36809 - https://huntr.dev/bounties/c6eeb346-fa99-4d41-bc40-b68f8d689223/
|
||
|
CVE-2023-36812 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html
|
||
|
CVE-2023-36812 - https://github.com/OpenTSDB/opentsdb/commit/07c4641471c6f5c2ab5aab615969e97211eb50d9
|
||
|
CVE-2023-36813 - https://github.com/kanboard/kanboard/security/advisories/GHSA-9gvq-78jp-jxcx
|
||
|
CVE-2023-36815 - https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w
|
||
|
CVE-2023-36816 - https://github.com/Bubka/2FAuth/security/advisories/GHSA-cwhq-2mcq-pp9q
|
||
|
CVE-2023-36820 - https://github.com/micronaut-projects/micronaut-security/security/advisories/GHSA-qw22-8w9r-864h
|
||
|
CVE-2023-36821 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96
|
||
|
CVE-2023-36822 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7
|
||
|
CVE-2023-36828 - https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g
|
||
|
CVE-2023-36844 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
||
|
CVE-2023-36844 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
|
||
|
CVE-2023-36845 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
||
|
CVE-2023-36845 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
|
||
|
CVE-2023-36845 - http://packetstormsecurity.com/files/176969/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
|
||
|
CVE-2023-36846 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
||
|
CVE-2023-36847 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
|
||
|
CVE-2023-36864 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797
|
||
|
CVE-2023-36864 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1797
|
||
|
CVE-2023-3687 - https://vuldb.com/?id.234233
|
||
|
CVE-2023-36874 - http://packetstormsecurity.com/files/174843/Microsoft-Error-Reporting-Local-Privilege-Elevation.html
|
||
|
CVE-2023-36884 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-36887 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1747
|
||
|
CVE-2023-36917 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-36918 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-36919 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-3692 - https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12
|
||
|
CVE-2023-36921 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-36922 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-36924 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-36925 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
CVE-2023-36936 - https://packetstormsecurity.com
|
||
|
CVE-2023-36939 - https://packetstormsecurity.com
|
||
|
CVE-2023-36940 - https://packetstormsecurity.com
|
||
|
CVE-2023-36941 - https://packetstormsecurity.com
|
||
|
CVE-2023-36942 - https://packetstormsecurity.com
|
||
|
CVE-2023-36947 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/UploadCustomModule.md
|
||
|
CVE-2023-36950 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/loginauth.md
|
||
|
CVE-2023-36954 - https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_3.md
|
||
|
CVE-2023-3696 - https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467
|
||
|
CVE-2023-36968 - https://okankurtulus.com.tr/2023/06/21/food-ordering-system-v1-0-authenticated-sql-injection/
|
||
|
CVE-2023-36969 - https://okankurtulus.com.tr/2023/06/26/cms-made-simple-v2-2-17-file-upload-remote-code-execution-rce-authenticated/
|
||
|
CVE-2023-36970 - https://okankurtulus.com.tr/2023/06/27/cms-made-simple-v2-2-17-stored-cross-site-scripting-xss-authenticated/
|
||
|
CVE-2023-37049 - https://github.com/Num-Nine/CVE/issues/1
|
||
|
CVE-2023-37070 - https://github.com/InfoSecWarrior/Offensive-Payloads/blob/main/Cross-Site-Scripting-XSS-Payloads.txt
|
||
|
CVE-2023-3710 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-3711 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-3712 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-37139 - https://github.com/chakra-core/ChakraCore/issues/6884
|
||
|
CVE-2023-37140 - https://github.com/chakra-core/ChakraCore/issues/6885
|
||
|
CVE-2023-37141 - https://github.com/chakra-core/ChakraCore/issues/6886
|
||
|
CVE-2023-37142 - https://github.com/chakra-core/ChakraCore/issues/6887
|
||
|
CVE-2023-37143 - https://github.com/chakra-core/ChakraCore/issues/6888
|
||
|
CVE-2023-37144 - https://github.com/DaDong-G/Vulnerability_info/blob/main/ac10_command_injection/Readme.md
|
||
|
CVE-2023-37145 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/1/Readme.md
|
||
|
CVE-2023-37146 - https://github.com/DaDong-G/Vulnerability_info/tree/main/TOTOLINK/lr350/2
|
||
|
CVE-2023-37148 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/3/README.md
|
||
|
CVE-2023-37149 - https://github.com/DaDong-G/Vulnerability_info/blob/main/TOTOLINK/lr350/4/README.md
|
||
|
CVE-2023-37150 - https://www.chtsecurity.com/news/57fd2fe6-11d9-421d-9087-88b4d5090452
|
||
|
CVE-2023-37151 - https://www.exploit-db.com/exploits/51431
|
||
|
CVE-2023-37152 - https://github.com/Trinity-SYT-SECURITY/arbitrary-file-upload-RCE/blob/main/Online%20Art%20gallery%20project%201.0.md
|
||
|
CVE-2023-37152 - https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20
|
||
|
CVE-2023-37152 - https://www.exploit-db.com/exploits/51524
|
||
|
CVE-2023-37153 - https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/KodExplorer4.51.03.md
|
||
|
CVE-2023-37153 - https://www.chtsecurity.com/news/13a86b33-7e49-4167-9682-7ff3f51cbcba%20
|
||
|
CVE-2023-37164 - https://www.exploit-db.com/exploits/51529
|
||
|
CVE-2023-37165 - https://www.exploit-db.com/exploits/51450
|
||
|
CVE-2023-37170 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_1
|
||
|
CVE-2023-37171 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_2
|
||
|
CVE-2023-37172 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_3
|
||
|
CVE-2023-37173 - https://github.com/kafroc/Vuls/tree/main/TOTOLINK/A3300R/cmdi_4
|
||
|
CVE-2023-37174 - https://github.com/gpac/gpac/issues/2505
|
||
|
CVE-2023-37177 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
||
|
CVE-2023-37192 - https://satoshihunter1.blogspot.com/2023/06/the-bitcoin-app-is-vulnerable-to-hackers.html
|
||
|
CVE-2023-37192 - https://www.youtube.com/watch?v=oEl4M1oZim0
|
||
|
CVE-2023-37201 - https://bugzilla.mozilla.org/show_bug.cgi?id=1826002
|
||
|
CVE-2023-37202 - https://bugzilla.mozilla.org/show_bug.cgi?id=1834711
|
||
|
CVE-2023-37205 - https://bugzilla.mozilla.org/show_bug.cgi?id=1704420
|
||
|
CVE-2023-37206 - https://bugzilla.mozilla.org/show_bug.cgi?id=1813299
|
||
|
CVE-2023-37207 - https://bugzilla.mozilla.org/show_bug.cgi?id=1816287
|
||
|
CVE-2023-37208 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837675
|
||
|
CVE-2023-37210 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821886
|
||
|
CVE-2023-3725 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-3725 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3
|
||
|
CVE-2023-37261 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2
|
||
|
CVE-2023-37262 - https://github.com/cc-tweaked/CC-Tweaked/security/advisories/GHSA-7p4w-mv69-2wm2
|
||
|
CVE-2023-37263 - https://github.com/strapi/strapi/security/advisories/GHSA-m284-85mf-cgrc
|
||
|
CVE-2023-37264 - https://github.com/tektoncd/pipeline/security/advisories/GHSA-w2h3-vvvq-3m53
|
||
|
CVE-2023-37268 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-868r-97g5-r9g4
|
||
|
CVE-2023-37269 - http://packetstormsecurity.com/files/173520/WinterCMS-1.2.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-37270 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-934w-qj9p-3qcx
|
||
|
CVE-2023-37279 - https://github.com/contribsys/faktory/security/advisories/GHSA-x4hh-vjm7-g2jv
|
||
|
CVE-2023-37298 - https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83
|
||
|
CVE-2023-37298 - https://github.com/laurent22/joplin/releases/tag/v2.11.5
|
||
|
CVE-2023-37299 - https://github.com/laurent22/joplin/commit/9e90d9016daf79b5414646a93fd369aedb035071
|
||
|
CVE-2023-37299 - https://github.com/laurent22/joplin/releases/tag/v2.11.5
|
||
|
CVE-2023-37302 - https://phabricator.wikimedia.org/T339111
|
||
|
CVE-2023-37304 - https://phabricator.wikimedia.org/T323651
|
||
|
CVE-2023-37305 - https://phabricator.wikimedia.org/T326952
|
||
|
CVE-2023-37306 - https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle
|
||
|
CVE-2023-37307 - http://packetstormsecurity.com/files/176975/MISP-2.4.171-Cross-Site-Scripting.html
|
||
|
CVE-2023-3732 - http://packetstormsecurity.com/files/174223/Chrome-IPCZ-FragmentDescriptors-Missing-Validation.html
|
||
|
CVE-2023-37361 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=32305
|
||
|
CVE-2023-37456 - https://bugzilla.mozilla.org/show_bug.cgi?id=1795496
|
||
|
CVE-2023-37460 - https://github.com/codehaus-plexus/plexus-archiver/security/advisories/GHSA-wh3p-fphp-9h2m
|
||
|
CVE-2023-37461 - https://github.com/metersphere/metersphere/security/advisories/GHSA-xfr9-jgfp-fx3v
|
||
|
CVE-2023-37463 - https://github.com/github/cmark-gfm/security/advisories/GHSA-w4qg-3vf7-m9x5
|
||
|
CVE-2023-37466 - https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5
|
||
|
CVE-2023-37474 - http://packetstormsecurity.com/files/173822/Copyparty-1.8.2-Directory-Traversal.html
|
||
|
CVE-2023-37474 - https://github.com/9001/copyparty/security/advisories/GHSA-pxfv-7rr3-2qjg
|
||
|
CVE-2023-37475 - https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45
|
||
|
CVE-2023-37477 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5
|
||
|
CVE-2023-37478 - https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7
|
||
|
CVE-2023-3752 - https://vuldb.com/?id.234422
|
||
|
CVE-2023-37543 - https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed
|
||
|
CVE-2023-37569 - http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html
|
||
|
CVE-2023-37581 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-37596 - https://github.com/sahiloj/CVE-2023-37596/blob/main/README.md
|
||
|
CVE-2023-37597 - https://github.com/sahiloj/CVE-2023-37597/blob/main/README.md
|
||
|
CVE-2023-37598 - https://github.com/sahiloj/CVE-2023-37598
|
||
|
CVE-2023-37600 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html
|
||
|
CVE-2023-37601 - https://packetstormsecurity.com/files/173146/Office-Suite-Premium-10.9.1.42602-Local-File-Inclusion.html
|
||
|
CVE-2023-37602 - https://www.exploit-db.com/exploits/51564
|
||
|
CVE-2023-37605 - https://medium.com/@david_42/complex-password-vs-buffer-overflow-and-the-winner-is-decbc56db5e3
|
||
|
CVE-2023-37607 - https://github.com/CQURE/CVEs/blob/main/CVE-2023-37607/README.md
|
||
|
CVE-2023-37608 - https://github.com/CQURE/CVEs/tree/main/CVE-2023-37608
|
||
|
CVE-2023-3761 - https://vuldb.com/?id.234446
|
||
|
CVE-2023-3761 - https://youtu.be/bMJwSCps0Lc
|
||
|
CVE-2023-37611 - https://rodelllemit.medium.com/stored-xss-in-neo-cms-8-3-3-9bd1cb973c5b
|
||
|
CVE-2023-37627 - https://gist.github.com/1337kid/d3e7702bd19cc9355a6b3f153eb2fe8e
|
||
|
CVE-2023-37628 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37628
|
||
|
CVE-2023-37629 - http://packetstormsecurity.com/files/173656/Online-Piggery-Management-System-1.0-Shell-Upload.html
|
||
|
CVE-2023-37629 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37629
|
||
|
CVE-2023-37630 - https://github.com/1337kid/Piggery_CMS_multiple_vulns_PoC/tree/main/CVE-2023-37630
|
||
|
CVE-2023-37644 - https://github.com/matthiaskramm/swftools/issues/202
|
||
|
CVE-2023-37649 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/
|
||
|
CVE-2023-3765 - https://huntr.dev/bounties/4be5fd63-8a0a-490d-9ee1-f33dc768ed76
|
||
|
CVE-2023-37650 - https://www.ghostccamm.com/blog/multi_cockpit_vulns/
|
||
|
CVE-2023-37679 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html
|
||
|
CVE-2023-37679 - https://www.ihteam.net/advisory/mirth-connect
|
||
|
CVE-2023-37683 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37683.txt
|
||
|
CVE-2023-37684 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37684.txt
|
||
|
CVE-2023-37685 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37685.txt
|
||
|
CVE-2023-37686 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37686.txt
|
||
|
CVE-2023-37687 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37687.txt
|
||
|
CVE-2023-37688 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37688.txt
|
||
|
CVE-2023-37689 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37689.txt
|
||
|
CVE-2023-37690 - https://github.com/rt122001/CVES/blob/main/CVE-2023-37690.txt
|
||
|
CVE-2023-37692 - https://okankurtulus.com.tr/2023/07/24/october-cms-v3-4-4-stored-cross-site-scripting-xss-authenticated/
|
||
|
CVE-2023-37710 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetWirelessRepeat
|
||
|
CVE-2023-37711 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/saveParentControlInfo
|
||
|
CVE-2023-37712 - https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/fromSetIpBind
|
||
|
CVE-2023-37714 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromRouteStatic/report.md
|
||
|
CVE-2023-37715 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fmL7ProtForm/reprot.md
|
||
|
CVE-2023-37716 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromNatStaticSetting/report.md
|
||
|
CVE-2023-37717 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromDhcpListClient/repot.md
|
||
|
CVE-2023-37718 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeClientFilter/report.md
|
||
|
CVE-2023-37719 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromP2pListFilter/report.md
|
||
|
CVE-2023-3772 - http://www.openwall.com/lists/oss-security/2023/08/10/1
|
||
|
CVE-2023-3772 - https://bugzilla.redhat.com/show_bug.cgi?id=2218943
|
||
|
CVE-2023-37721 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeMacFilter/report.md
|
||
|
CVE-2023-37722 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromSafeUrlFilter/report.md
|
||
|
CVE-2023-37723 - https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/fromqossetting/report.md
|
||
|
CVE-2023-37728 - http://icewarp.com
|
||
|
CVE-2023-3773 - https://bugzilla.redhat.com/show_bug.cgi?id=2218944
|
||
|
CVE-2023-37732 - https://github.com/yasm/yasm/issues/233
|
||
|
CVE-2023-37734 - https://medium.com/@jraiv02/cve-2023-37734-buffer-overflow-in-mp3-audio-converter-318fd8271911
|
||
|
CVE-2023-37734 - https://www.exploit-db.com/exploits/10374
|
||
|
CVE-2023-37748 - https://github.com/miniupnp/ngiflib/issues/25
|
||
|
CVE-2023-37758 - https://hackmd.io/@pSgS7xsnS5a4K7Y0yiB43g/rJr8oNn_n
|
||
|
CVE-2023-37759 - https://packetstormsecurity.com/files/174240/Crypto-Currency-Tracker-CCT-9.5-Add-Administrator.html
|
||
|
CVE-2023-3776 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-3776 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-37765 - https://github.com/gpac/gpac/issues/2515
|
||
|
CVE-2023-37766 - https://github.com/gpac/gpac/issues/2516
|
||
|
CVE-2023-37767 - https://github.com/gpac/gpac/issues/2514
|
||
|
CVE-2023-3777 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-3777 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-37770 - https://github.com/grame-cncm/faust/issues/922
|
||
|
CVE-2023-37785 - https://github.com/CrownZTX/cve-description
|
||
|
CVE-2023-37786 - https://github.com/CrownZTX/reflectedxss1
|
||
|
CVE-2023-37787 - https://github.com/CrownZTX/storedXSS
|
||
|
CVE-2023-37790 - https://packetstormsecurity.com/files/173508/Clarity-PPM-14.3.0.298-Cross-Site-Scripting.html
|
||
|
CVE-2023-37791 - https://github.com/naihsin/IoT/tree/main/D-Link/DIR-619L/overflow
|
||
|
CVE-2023-37793 - https://github.com/PwnYouLin/IOT_vul/blob/main/wayos/2/readme.md
|
||
|
CVE-2023-37794 - https://github.com/PwnYouLin/IOT_vul/tree/main/wayos/1
|
||
|
CVE-2023-37798 - https://www.cyderes.com/blog/cve-2023-37798-stored-cross-site-scripting-in-vanderbilt-redcap/
|
||
|
CVE-2023-3782 - https://research.jfrog.com/vulnerabilities/okhttp-client-brotli-dos/
|
||
|
CVE-2023-3783 - https://seclists.org/fulldisclosure/2023/Jul/38
|
||
|
CVE-2023-3783 - https://www.vulnerability-lab.com/get_content.php?id=2321
|
||
|
CVE-2023-37831 - https://github.com/strik3r0x1/Vulns/blob/main/User%20enumeration%20-%20Elenos.md
|
||
|
CVE-2023-37832 - https://github.com/strik3r0x1/Vulns/blob/main/Lack%20of%20resources%20and%20rate%20limiting%20-%20Elenos.md
|
||
|
CVE-2023-37833 - https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to%20access%20Traps%20configurations.md
|
||
|
CVE-2023-37836 - https://github.com/thorfdbg/libjpeg/issues/87#BUG1
|
||
|
CVE-2023-37837 - https://github.com/thorfdbg/libjpeg/issues/87#BUG0
|
||
|
CVE-2023-3784 - https://seclists.org/fulldisclosure/2023/Jul/37
|
||
|
CVE-2023-3784 - https://www.vulnerability-lab.com/get_content.php?id=2317
|
||
|
CVE-2023-37849 - https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/
|
||
|
CVE-2023-3785 - https://seclists.org/fulldisclosure/2023/Jul/39
|
||
|
CVE-2023-3785 - https://www.vulnerability-lab.com/get_content.php?id=2285
|
||
|
CVE-2023-3786 - https://seclists.org/fulldisclosure/2023/Jul/40
|
||
|
CVE-2023-3786 - https://www.vulnerability-lab.com/get_content.php?id=2323
|
||
|
CVE-2023-3787 - https://seclists.org/fulldisclosure/2023/Jul/35
|
||
|
CVE-2023-3787 - https://vuldb.com/?id.235054
|
||
|
CVE-2023-3787 - https://www.vulnerability-lab.com/get_content.php?id=2276
|
||
|
CVE-2023-3788 - https://seclists.org/fulldisclosure/2023/Jul/34
|
||
|
CVE-2023-3788 - https://www.vulnerability-lab.com/get_content.php?id=2278
|
||
|
CVE-2023-3789 - https://seclists.org/fulldisclosure/2023/Jul/36
|
||
|
CVE-2023-3789 - https://www.vulnerability-lab.com/get_content.php?id=2286
|
||
|
CVE-2023-37895 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-3790 - https://seclists.org/fulldisclosure/2023/Jul/33
|
||
|
CVE-2023-3790 - https://www.vulnerability-lab.com/get_content.php?id=2274
|
||
|
CVE-2023-37900 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf
|
||
|
CVE-2023-37903 - https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4
|
||
|
CVE-2023-37907 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-9c9p-c3mg-hpjq
|
||
|
CVE-2023-37910 - https://jira.xwiki.org/browse/XWIKI-20334
|
||
|
CVE-2023-37915 - https://github.com/OpenDDS/OpenDDS/security/advisories/GHSA-v5pp-7prc-5xq9
|
||
|
CVE-2023-37916 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h
|
||
|
CVE-2023-37917 - https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r
|
||
|
CVE-2023-37918 - https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj
|
||
|
CVE-2023-37927 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
||
|
CVE-2023-37928 - https://bugprove.com/knowledge-hub/cve-2023-37927-and-cve-2023-37928-multiple-post-auth-blind-os-command-and-python-code-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
||
|
CVE-2023-37941 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
|
||
|
CVE-2023-37979 - http://packetstormsecurity.com/files/173983/WordPress-Ninja-Forms-3.6.25-Cross-Site-Scripting.html
|
||
|
CVE-2023-37988 - http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html
|
||
|
CVE-2023-3801 - https://vuldb.com/?id.235069
|
||
|
CVE-2023-3802 - https://vuldb.com/?id.235070
|
||
|
CVE-2023-38022 - https://jovanbulck.github.io/files/ccs19-tale.pdf
|
||
|
CVE-2023-38035 - http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html
|
||
|
CVE-2023-38043 - https://northwave-cybersecurity.com/vulnerability-notice/arbitrary-kernel-function-call-in-ivanti-secure-access-client
|
||
|
CVE-2023-3811 - https://vuldb.com/?id.235079
|
||
|
CVE-2023-38127 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808
|
||
|
CVE-2023-38127 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1808
|
||
|
CVE-2023-38128 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809
|
||
|
CVE-2023-38128 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809
|
||
|
CVE-2023-38139 - http://packetstormsecurity.com/files/174849/Microsoft-Windows-Kernel-Refcount-Overflow-Use-After-Free.html
|
||
|
CVE-2023-38140 - http://packetstormsecurity.com/files/175108/Microsoft-Windows-Kernel-Paged-Pool-Memory-Disclosure.html
|
||
|
CVE-2023-38141 - http://packetstormsecurity.com/files/175096/Microsoft-Windows-Kernel-Race-Condition-Memory-Corruption.html
|
||
|
CVE-2023-38146 - http://packetstormsecurity.com/files/176391/Themebleed-Windows-11-Themes-Arbitrary-Code-Execution.html
|
||
|
CVE-2023-38154 - http://packetstormsecurity.com/files/174568/Microsoft-Windows-Kernel-Recovery-Memory-Corruption.html
|
||
|
CVE-2023-3817 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-3819 - https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c
|
||
|
CVE-2023-38190 - https://herolab.usd.de/security-advisories/usd-2023-0014/
|
||
|
CVE-2023-38191 - https://herolab.usd.de/security-advisories/usd-2023-0012/
|
||
|
CVE-2023-38192 - https://herolab.usd.de/security-advisories/usd-2023-0011/
|
||
|
CVE-2023-38193 - https://herolab.usd.de/en/security-advisories/usd-2023-0015/
|
||
|
CVE-2023-38194 - https://herolab.usd.de/security-advisories/usd-2023-0013/
|
||
|
CVE-2023-3820 - https://huntr.dev/bounties/b00a38b6-d040-494d-bf46-38f46ac1a1db
|
||
|
CVE-2023-38203 - https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html
|
||
|
CVE-2023-3821 - https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa
|
||
|
CVE-2023-3822 - https://huntr.dev/bounties/2a3a13fe-2a9a-4d1a-8814-fd8ed1e3b1d5
|
||
|
CVE-2023-3823 - https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr
|
||
|
CVE-2023-3824 - https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv
|
||
|
CVE-2023-38252 - https://github.com/tats/w3m/issues/270
|
||
|
CVE-2023-38253 - https://github.com/tats/w3m/issues/271
|
||
|
CVE-2023-38286 - https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI
|
||
|
CVE-2023-3830 - https://vuldb.com/?id.235151
|
||
|
CVE-2023-38328 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2023-38334 - http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html
|
||
|
CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/42
|
||
|
CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-38334 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt
|
||
|
CVE-2023-38335 - http://packetstormsecurity.com/files/173695/Omnis-Studio-10.22.00-Library-Setting-Bypass.html
|
||
|
CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/41
|
||
|
CVE-2023-38335 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-38335 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt
|
||
|
CVE-2023-38346 - https://www.pentagrid.ch/en/blog/wind-river-vxworks-tarextract-directory-traversal-vulnerability/
|
||
|
CVE-2023-38351 - https://0dr3f.github.io/cve/
|
||
|
CVE-2023-38352 - https://0dr3f.github.io/cve/
|
||
|
CVE-2023-38353 - https://0dr3f.github.io/cve/
|
||
|
CVE-2023-38354 - https://0dr3f.github.io/cve/
|
||
|
CVE-2023-38355 - https://0dr3f.github.io/cve/
|
||
|
CVE-2023-38356 - https://0dr3f.github.io/cve/
|
||
|
CVE-2023-38357 - http://packetstormsecurity.com/files/173609/RWS-WorldServer-11.7.3-Session-Token-Enumeration.html
|
||
|
CVE-2023-38357 - http://seclists.org/fulldisclosure/2023/Jul/30
|
||
|
CVE-2023-38357 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-001/-session-token-enumeration-in-rws-worldserver
|
||
|
CVE-2023-38378 - https://news.ycombinator.com/item?id=36745664
|
||
|
CVE-2023-38378 - https://tortel.li/post/insecure-scope/
|
||
|
CVE-2023-38379 - https://news.ycombinator.com/item?id=36745664
|
||
|
CVE-2023-38379 - https://tortel.li/post/insecure-scope/
|
||
|
CVE-2023-38403 - https://github.com/esnet/iperf/issues/1542
|
||
|
CVE-2023-38408 - http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
|
||
|
CVE-2023-38408 - https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
|
||
|
CVE-2023-38408 - https://news.ycombinator.com/item?id=36790196
|
||
|
CVE-2023-38409 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12
|
||
|
CVE-2023-3843 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-3843 - https://vuldb.com/?id.235194
|
||
|
CVE-2023-38434 - https://github.com/cozis/xHTTP/issues/1
|
||
|
CVE-2023-38435 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-3844 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-3844 - https://vuldb.com/?id.235195
|
||
|
CVE-2023-3845 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-3846 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-3847 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-3848 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-38487 - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg
|
||
|
CVE-2023-3849 - http://packetstormsecurity.com/files/173691/mooDating-1.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-38495 - https://github.com/crossplane/crossplane/blob/ac8b24fe739c5d942ea885157148497f196c3dd3/security/ADA-security-audit-23.pdf
|
||
|
CVE-2023-38501 - http://packetstormsecurity.com/files/173821/Copyparty-1.8.6-Cross-Site-Scripting.html
|
||
|
CVE-2023-38501 - https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh
|
||
|
CVE-2023-38502 - https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf
|
||
|
CVE-2023-38507 - https://github.com/strapi/strapi/security/advisories/GHSA-24q2-59hm-rh9r
|
||
|
CVE-2023-3853 - https://vuldb.com/?id.235205
|
||
|
CVE-2023-38543 - https://northwave-cybersecurity.com/vulnerability-notice/denial-of-service-in-ivanti-secure-access-client-driver
|
||
|
CVE-2023-38573 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839
|
||
|
CVE-2023-38617 - https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html
|
||
|
CVE-2023-38633 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-38633 - https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/
|
||
|
CVE-2023-38646 - http://packetstormsecurity.com/files/174091/Metabase-Remote-Code-Execution.html
|
||
|
CVE-2023-38646 - http://packetstormsecurity.com/files/177138/Metabase-0.46.6-Remote-Code-Execution.html
|
||
|
CVE-2023-38666 - https://github.com/axiomatic-systems/Bento4/issues/784
|
||
|
CVE-2023-38669 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md
|
||
|
CVE-2023-38670 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md
|
||
|
CVE-2023-38671 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-003.md
|
||
|
CVE-2023-38672 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md
|
||
|
CVE-2023-38673 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md
|
||
|
CVE-2023-38674 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md
|
||
|
CVE-2023-38675 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md
|
||
|
CVE-2023-38676 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md
|
||
|
CVE-2023-38677 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md
|
||
|
CVE-2023-38678 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md
|
||
|
CVE-2023-38687 - https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq
|
||
|
CVE-2023-38688 - https://github.com/Xithrius/twitch-tui/security/advisories/GHSA-779w-xvpm-78jx
|
||
|
CVE-2023-38698 - https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3
|
||
|
CVE-2023-38701 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0120---2023-08-18
|
||
|
CVE-2023-38701 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6
|
||
|
CVE-2023-38702 - https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc
|
||
|
CVE-2023-3878 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2010.pdf
|
||
|
CVE-2023-38817 - https://ioctl.fail/echo-ac-writeup/
|
||
|
CVE-2023-3882 - https://vuldb.com/?id.235244
|
||
|
CVE-2023-38823 - https://github.com/nhtri2003gmail/CVE_report/blob/master/CVE-2023-38823.md
|
||
|
CVE-2023-38829 - https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E
|
||
|
CVE-2023-3883 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2015.pdf
|
||
|
CVE-2023-38831 - http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html
|
||
|
CVE-2023-38831 - https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/
|
||
|
CVE-2023-38836 - http://packetstormsecurity.com/files/175026/BoidCMS-2.0.0-Shell-Upload.html
|
||
|
CVE-2023-3884 - https://github.com/E1CHO/cve_hub/blob/main/Beauty%20Salon%20Management%20System/Beauty%20Salon%20Management%20System%20-%20vuln%2016.pdf
|
||
|
CVE-2023-38840 - https://github.com/bitwarden/clients/pull/5813
|
||
|
CVE-2023-38840 - https://github.com/markuta/bw-dump
|
||
|
CVE-2023-38840 - https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/
|
||
|
CVE-2023-38843 - https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1
|
||
|
CVE-2023-38844 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
||
|
CVE-2023-38861 - https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3
|
||
|
CVE-2023-38862 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject1
|
||
|
CVE-2023-38863 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject4
|
||
|
CVE-2023-38864 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject3
|
||
|
CVE-2023-38865 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject5
|
||
|
CVE-2023-38866 - https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject2
|
||
|
CVE-2023-3887 - https://vuldb.com/?id.235249
|
||
|
CVE-2023-38886 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38886_Dolibarr_RCE-1.pdf
|
||
|
CVE-2023-38888 - https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38888_Dolibarr_XSS.pdf
|
||
|
CVE-2023-38890 - https://github.com/akshadjoshi/CVE-2023-38890
|
||
|
CVE-2023-38891 - https://github.com/jselliott/CVE-2023-38891
|
||
|
CVE-2023-38902 - https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37
|
||
|
CVE-2023-38904 - https://www.exploit-db.com/exploits/51576
|
||
|
CVE-2023-38905 - https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642
|
||
|
CVE-2023-3891 - https://fluidattacks.com/advisories/aerosmith
|
||
|
CVE-2023-38910 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md
|
||
|
CVE-2023-38911 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-38911/Readme.md
|
||
|
CVE-2023-38912 - https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html
|
||
|
CVE-2023-38921 - https://github.com/FirmRec/IoT-Vulns/tree/main/netgear/upgrade_handler
|
||
|
CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727
|
||
|
CVE-2023-38943 - https://github.com/0x727/ShuiZe_0x727/issues/160
|
||
|
CVE-2023-38947 - https://gitee.com/CTF-hacker/pwn/issues/I7LH2N
|
||
|
CVE-2023-38948 - https://gitee.com/CTF-hacker/pwn/issues/I7LI4E
|
||
|
CVE-2023-3896 - https://github.com/vim/vim/issues/12528
|
||
|
CVE-2023-38960 - https://rodelllemit.medium.com/insecure-permissions-vulnerability-in-raidenftpd-v2-4-build-4005-2016-04-01-ea7389be3d33
|
||
|
CVE-2023-38961 - https://github.com/jerryscript-project/jerryscript/issues/5092
|
||
|
CVE-2023-38965 - http://packetstormsecurity.com/files/175077/Lost-And-Found-Information-System-1.0-Insecure-Direct-Object-Reference.html
|
||
|
CVE-2023-38969 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-add-books
|
||
|
CVE-2023-3897 - http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html
|
||
|
CVE-2023-38970 - https://panda002.hashnode.dev/badaso-version-297-has-an-xss-vulnerability-in-new-member
|
||
|
CVE-2023-38971 - https://panda002.hashnode.dev/badaso-version-297-has-xss-vulnerability-in-add-ranks
|
||
|
CVE-2023-38975 - https://github.com/qdrant/qdrant/issues/2268
|
||
|
CVE-2023-38996 - https://gist.github.com/RNPG/53b579da330ba896aa8dc2d901e5e400
|
||
|
CVE-2023-38997 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-38998 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-38999 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-3900 - https://gitlab.com/gitlab-org/gitlab/-/issues/418770
|
||
|
CVE-2023-39000 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39001 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39002 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39003 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39004 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39005 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39006 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39007 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39008 - https://logicaltrust.net/blog/2023/08/opnsense.html
|
||
|
CVE-2023-39010 - https://github.com/lessthanoptimal/BoofCV/issues/406
|
||
|
CVE-2023-39017 - https://github.com/quartz-scheduler/quartz/issues/943
|
||
|
CVE-2023-39026 - http://packetstormsecurity.com/files/174491/FileMage-Gateway-1.10.9-Local-File-Inclusion.html
|
||
|
CVE-2023-39026 - https://raindayzz.com/technicalblog/2023/08/20/FileMage-Vulnerability.html
|
||
|
CVE-2023-3904 - https://gitlab.com/gitlab-org/gitlab/-/issues/418226
|
||
|
CVE-2023-39063 - https://github.com/AndreGNogueira/CVE-2023-39063
|
||
|
CVE-2023-39070 - https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/
|
||
|
CVE-2023-39073 - https://gist.github.com/ph4nt0mbyt3/9456312e867c10de8f808250ec0b12d3
|
||
|
CVE-2023-39075 - https://blog.dhjeong.kr/posts/automotive/2023/12/how-to-fuzzing-realcars/
|
||
|
CVE-2023-39075 - https://blog.dhjeong.kr/posts/vuln/202307/renault-zoe/
|
||
|
CVE-2023-39075 - https://blog.jhyeon.dev/posts/vuln/202307/renault-zoe/
|
||
|
CVE-2023-39076 - https://blog.dhjeong.kr/posts/vuln/202307/gm-chevrolet/
|
||
|
CVE-2023-39076 - https://blog.jhyeon.dev/posts/vuln/202307/gm-chevrolet/
|
||
|
CVE-2023-39107 - https://www.ns-echo.com/posts/nomachine_afo.html
|
||
|
CVE-2023-39108 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_b.md
|
||
|
CVE-2023-39109 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_path_a.md
|
||
|
CVE-2023-39110 - https://github.com/zer0yu/CVE_Request/blob/master/rConfig/rConfig_%20ajaxGetFileByPath.md
|
||
|
CVE-2023-39113 - https://github.com/miniupnp/ngiflib/issues/27
|
||
|
CVE-2023-39114 - https://github.com/miniupnp/ngiflib/issues/29
|
||
|
CVE-2023-39115 - http://packetstormsecurity.com/files/173950/Campcodes-Online-Matrimonial-Website-System-3.3-Cross-Site-Scripting.html
|
||
|
CVE-2023-39115 - https://github.com/Raj789-sec/CVE-2023-39115
|
||
|
CVE-2023-39115 - https://www.exploit-db.com/exploits/51656
|
||
|
CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1
|
||
|
CVE-2023-39121 - https://github.com/safe-b/CVE/issues/1#issue-1817133689
|
||
|
CVE-2023-39122 - https://github.com/DojoSecurity/BMC-Control-M-Unauthenticated-SQL-Injection
|
||
|
CVE-2023-39125 - https://github.com/LMP88959/NTSC-CRT/issues/32
|
||
|
CVE-2023-39135 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
||
|
CVE-2023-39136 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
||
|
CVE-2023-39136 - https://github.com/ZipArchive/ZipArchive/issues/680
|
||
|
CVE-2023-39137 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
||
|
CVE-2023-39137 - https://github.com/brendan-duncan/archive/issues/266
|
||
|
CVE-2023-39138 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
||
|
CVE-2023-39139 - https://blog.ostorlab.co/zip-packages-exploitation.html
|
||
|
CVE-2023-3914 - https://gitlab.com/gitlab-org/gitlab/-/issues/418115
|
||
|
CVE-2023-39141 - https://gist.github.com/JafarAkhondali/528fe6c548b78f454911fb866b23f66e
|
||
|
CVE-2023-39143 - https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/
|
||
|
CVE-2023-39147 - http://packetstormsecurity.com/files/173878/Uvdesk-1.1.3-Shell-Upload.html
|
||
|
CVE-2023-39167 - https://seclists.org/fulldisclosure/2023/Nov/5
|
||
|
CVE-2023-39169 - https://seclists.org/fulldisclosure/2023/Nov/3
|
||
|
CVE-2023-3917 - https://gitlab.com/gitlab-org/gitlab/-/issues/417896
|
||
|
CVE-2023-39171 - https://seclists.org/fulldisclosure/2023/Nov/2
|
||
|
CVE-2023-39172 - https://seclists.org/fulldisclosure/2023/Nov/4
|
||
|
CVE-2023-3920 - https://gitlab.com/gitlab-org/gitlab/-/issues/417481
|
||
|
CVE-2023-39265 - http://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html
|
||
|
CVE-2023-3932 - https://gitlab.com/gitlab-org/gitlab/-/issues/417594
|
||
|
CVE-2023-39325 - https://go.dev/issue/63417
|
||
|
CVE-2023-39341 - https://www.sourcenext.com/support/i/2023/230718_01
|
||
|
CVE-2023-39350 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh
|
||
|
CVE-2023-39351 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq
|
||
|
CVE-2023-39352 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj
|
||
|
CVE-2023-39353 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f
|
||
|
CVE-2023-39354 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6
|
||
|
CVE-2023-39355 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h
|
||
|
CVE-2023-39356 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m
|
||
|
CVE-2023-39357 - https://github.com/Cacti/cacti/security/advisories/GHSA-6jhp-mgqg-fhqg
|
||
|
CVE-2023-39358 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj95-7xr8-9p7g
|
||
|
CVE-2023-39359 - https://github.com/Cacti/cacti/security/advisories/GHSA-q4wh-3f9w-836h
|
||
|
CVE-2023-39360 - https://github.com/Cacti/cacti/security/advisories/GHSA-gx8c-xvjh-9qh4
|
||
|
CVE-2023-39361 - https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg
|
||
|
CVE-2023-39362 - http://packetstormsecurity.com/files/175029/Cacti-1.2.24-Command-Injection.html
|
||
|
CVE-2023-39362 - https://github.com/Cacti/cacti/security/advisories/GHSA-g6ff-58cj-x3cp
|
||
|
CVE-2023-39364 - https://github.com/Cacti/cacti/security/advisories/GHSA-4pjv-rmrp-r59x
|
||
|
CVE-2023-39365 - https://github.com/Cacti/cacti/security/advisories/GHSA-v5w7-hww7-2f22
|
||
|
CVE-2023-39366 - https://github.com/Cacti/cacti/security/advisories/GHSA-rwhh-xxm6-vcrv
|
||
|
CVE-2023-39420 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/
|
||
|
CVE-2023-39421 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
||
|
CVE-2023-39422 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
||
|
CVE-2023-39423 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
||
|
CVE-2023-39424 - https://bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained
|
||
|
CVE-2023-39443 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
|
||
|
CVE-2023-39444 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
|
||
|
CVE-2023-39453 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1830
|
||
|
CVE-2023-3946 - https://kcm.trellix.com/corporate/index?page=content&id=SB10402
|
||
|
CVE-2023-39508 - http://seclists.org/fulldisclosure/2023/Jul/43
|
||
|
CVE-2023-39510 - https://github.com/Cacti/cacti/security/advisories/GHSA-24w4-4hp2-3j8h
|
||
|
CVE-2023-39511 - https://github.com/Cacti/cacti/security/advisories/GHSA-5hpr-4hhc-8q42
|
||
|
CVE-2023-39512 - https://github.com/Cacti/cacti/security/advisories/GHSA-vqcc-5v63-g9q7
|
||
|
CVE-2023-39513 - https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2
|
||
|
CVE-2023-39514 - https://github.com/Cacti/cacti/security/advisories/GHSA-6hrc-2cfc-8hm7
|
||
|
CVE-2023-39515 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
|
||
|
CVE-2023-39516 - https://github.com/Cacti/cacti/security/advisories/GHSA-r8qq-88g3-hmgv
|
||
|
CVE-2023-39520 - https://github.com/cryptomator/cryptomator/security/advisories/GHSA-62gx-54j7-mjh3
|
||
|
CVE-2023-39523 - https://github.com/nexB/scancode.io/security/advisories/GHSA-2ggp-cmvm-f62f
|
||
|
CVE-2023-39534 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-fcr6-x23w-94wp
|
||
|
CVE-2023-39542 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832
|
||
|
CVE-2023-39551 - https://www.chtsecurity.com/news/0dbe8e1d-0a6c-4604-9cf1-778ddc86a8c1
|
||
|
CVE-2023-39558 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39558.md
|
||
|
CVE-2023-39559 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-2023-39559.md
|
||
|
CVE-2023-39560 - https://github.com/Luci4n555/cve_ectouch
|
||
|
CVE-2023-39562 - https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8
|
||
|
CVE-2023-39562 - https://github.com/gpac/gpac/issues/2537
|
||
|
CVE-2023-39578 - https://panda002.hashnode.dev/a-stored-cross-site-scripting-xss-vulnerability-in-the-create-the-function-of-zenario-cms-v94
|
||
|
CVE-2023-39584 - https://www.gem-love.com/2023/07/25/hexo%E5%8D%9A%E5%AE%A2%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E5%92%8C%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/#undefined
|
||
|
CVE-2023-39598 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-39598-9598b92da49c
|
||
|
CVE-2023-39599 - https://github.com/desencrypt/CVE/blob/main/CVE-2023-39599/Readme.md
|
||
|
CVE-2023-39600 - https://icewarp.com
|
||
|
CVE-2023-39610 - https://github.com/zn9988/publications/tree/main/1.TP-Link%20Tapo%20C100%20-%20HTTP%20Denial-Of-Service
|
||
|
CVE-2023-39611 - https://medium.com/@arielbreisacher/my-chart-fx-7-software-investigation-journey-leading-to-a-directory-traversal-vulnerability-067cdcd3f2e9
|
||
|
CVE-2023-39612 - https://febin0x4e4a.wordpress.com/2023/09/15/xss-in-filebrowser-leads-to-admin-account-takeover-in-filebrowser/
|
||
|
CVE-2023-39612 - https://github.com/filebrowser/filebrowser/issues/2570
|
||
|
CVE-2023-39615 - https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
|
||
|
CVE-2023-39619 - https://gist.github.com/6en6ar/712a4c1eab0324f15e09232c77ea08f8
|
||
|
CVE-2023-39631 - https://github.com/langchain-ai/langchain/issues/8363
|
||
|
CVE-2023-39631 - https://github.com/pydata/numexpr/issues/442
|
||
|
CVE-2023-39639 - https://security.friendsofpresta.org/modules/2023/08/31/leoblog.html
|
||
|
CVE-2023-3964 - https://gitlab.com/gitlab-org/gitlab/-/issues/419857
|
||
|
CVE-2023-39641 - https://security.friendsofpresta.org/modules/2023/08/31/psaffiliate.html
|
||
|
CVE-2023-39642 - https://security.friendsofpresta.org/modules/2023/08/29/cartsguru.html
|
||
|
CVE-2023-39643 - https://security.friendsofpresta.org/modules/2023/08/29/xmlfeeds.html
|
||
|
CVE-2023-39654 - https://github.com/Leeyangee/leeya_bug/blob/main/%5BWarning%5DSQL%20Injection%20in%20abupy%20%3C=%20v0.4.0.md
|
||
|
CVE-2023-39659 - https://github.com/langchain-ai/langchain/issues/7700
|
||
|
CVE-2023-39660 - https://github.com/gventuri/pandas-ai/issues/399
|
||
|
CVE-2023-39661 - https://github.com/gventuri/pandas-ai/issues/410
|
||
|
CVE-2023-39662 - https://github.com/jerryjliu/llama_index/issues/7054
|
||
|
CVE-2023-39675 - https://blog.sorcery.ie/posts/simpleimportproduct_sqli/
|
||
|
CVE-2023-39676 - https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/
|
||
|
CVE-2023-39677 - https://blog.sorcery.ie/posts/myprestamodules_phpinfo/
|
||
|
CVE-2023-39681 - https://github.com/yanbochen97/CuppaCMS_RCE
|
||
|
CVE-2023-39683 - https://medium.com/@vificatem/cve-2023-39683-dom-xss-on-json-source-code-panel-in-zalify-easy-email-3fa08f3e0d49
|
||
|
CVE-2023-39685 - https://github.com/hjson/hjson-java/issues/27
|
||
|
CVE-2023-39695 - https://github.com/strik3r0x1/Vulns/blob/35fe4fb3d5945b5df2a87aab0cf9ec6137bcf976/Insufficient%20Session%20Expiration%20-%20Elenos.md
|
||
|
CVE-2023-39699 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
|
||
|
CVE-2023-3970 - https://vuldb.com/?id.235569
|
||
|
CVE-2023-39726 - https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50
|
||
|
CVE-2023-39741 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
|
||
|
CVE-2023-39741 - https://github.com/ckolivas/lrzip/issues/246
|
||
|
CVE-2023-39741 - https://github.com/huanglei3/lrzip_poc/tree/main/lrzip_heap_overflow
|
||
|
CVE-2023-39742 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
|
||
|
CVE-2023-39743 - https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
|
||
|
CVE-2023-39743 - https://github.com/huanglei3/lrzip-next-poc/tree/main
|
||
|
CVE-2023-39743 - https://github.com/pete4abw/lrzip-next/issues/132
|
||
|
CVE-2023-39777 - https://gist.github.com/GiongfNef/8fe658dce4c7fcf3a7b4e6387e50141c
|
||
|
CVE-2023-39785 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/2
|
||
|
CVE-2023-39786 - https://github.com/Xunflash/IOT/tree/main/Tenda_AC8_V4/3
|
||
|
CVE-2023-3979 - https://gitlab.com/gitlab-org/gitlab/-/issues/419972
|
||
|
CVE-2023-3980 - https://huntr.dev/bounties/6eb3cb9a-5c78-451f-ae76-0b1e62fe5e54
|
||
|
CVE-2023-3981 - https://huntr.dev/bounties/f5018226-0063-415d-9675-d7e30934ff78
|
||
|
CVE-2023-39810 - https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/
|
||
|
CVE-2023-3982 - https://huntr.dev/bounties/e5e889ee-5947-4c2a-a72e-9c90e2e2a845
|
||
|
CVE-2023-39827 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formAddMacfilterRule
|
||
|
CVE-2023-39828 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/formWifiBasicSet
|
||
|
CVE-2023-39829 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/A18/fromSetWirelessRepeat
|
||
|
CVE-2023-3983 - https://www.tenable.com/security/research/tra-2023-24
|
||
|
CVE-2023-39834 - https://github.com/Pbootcms/Pbootcms/issues/8
|
||
|
CVE-2023-3986 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/Stored%20XSS
|
||
|
CVE-2023-3987 - https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/SQL%20Injection
|
||
|
CVE-2023-39908 - https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/
|
||
|
CVE-2023-39909 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2023-39910 - https://news.ycombinator.com/item?id=37054862
|
||
|
CVE-2023-39928 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1831
|
||
|
CVE-2023-39945 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-2rq6-8j7x-frr9
|
||
|
CVE-2023-39946 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-j297-rg6j-m7hx
|
||
|
CVE-2023-39947 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-mf55-5747-c4pv
|
||
|
CVE-2023-39948 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-x9pj-vrgf-f68f
|
||
|
CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/issues/3236
|
||
|
CVE-2023-39949 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-3jv9-j9x3-95cg
|
||
|
CVE-2023-39951 - https://github.com/open-telemetry/opentelemetry-java-instrumentation/security/advisories/GHSA-hghr-r469-gfq6
|
||
|
CVE-2023-39964 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5
|
||
|
CVE-2023-39965 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555
|
||
|
CVE-2023-39966 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4
|
||
|
CVE-2023-39967 - https://github.com/wiremock/wiremock/security/advisories/GHSA-676j-xrv3-73vc
|
||
|
CVE-2023-39979 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
||
|
CVE-2023-39980 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
||
|
CVE-2023-39981 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
||
|
CVE-2023-39982 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
||
|
CVE-2023-39983 - https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230403-mxsecurity-series-multiple-vulnerabilities
|
||
|
CVE-2023-40013 - https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8
|
||
|
CVE-2023-40021 - https://github.com/oppia/oppia/security/advisories/GHSA-49jp-pjc3-2532
|
||
|
CVE-2023-40024 - https://github.com/nexB/scancode.io/security/advisories/GHSA-6xcx-gx7r-rccj
|
||
|
CVE-2023-40031 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
||
|
CVE-2023-40035 - https://github.com/craftcms/cms/security/advisories/GHSA-44wr-rmwq-3phw
|
||
|
CVE-2023-40036 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
||
|
CVE-2023-4004 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-4004 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-40044 - http://packetstormsecurity.com/files/174917/Progress-Software-WS_FTP-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-40044 - https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044
|
||
|
CVE-2023-40044 - https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044
|
||
|
CVE-2023-40044 - https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/
|
||
|
CVE-2023-40044 - https://www.theregister.com/2023/10/02/ws_ftp_update/
|
||
|
CVE-2023-4005 - https://huntr.dev/bounties/f0aacce1-79bc-4765-95f1-7e824433b9e4
|
||
|
CVE-2023-4007 - https://huntr.dev/bounties/e891dcbc-2092-49d3-9518-23e37187a5ea
|
||
|
CVE-2023-40085 - https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/ed6ee1f7eca7b33160e36ac6d730a9ef395ca4f1
|
||
|
CVE-2023-40121 - https://android.googlesource.com/platform/frameworks/base/+/3287ac2d2565dc96bf6177967f8e3aed33954253
|
||
|
CVE-2023-40123 - https://android.googlesource.com/platform/frameworks/base/+/7212a4bec2d2f1a74fa54a12a04255d6a183baa9
|
||
|
CVE-2023-40133 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40134 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40135 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40136 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40137 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40138 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40139 - https://android.googlesource.com/platform/frameworks/base/+/08becc8c600f14c5529115cc1a1e0c97cd503f33
|
||
|
CVE-2023-40163 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1836
|
||
|
CVE-2023-40164 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
||
|
CVE-2023-40166 - https://securitylab.github.com/advisories/GHSL-2023-092_Notepad__/
|
||
|
CVE-2023-40178 - https://github.com/node-saml/node-saml/security/advisories/GHSA-vx8m-6fhw-pccw
|
||
|
CVE-2023-40181 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8
|
||
|
CVE-2023-40186 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v
|
||
|
CVE-2023-40187 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f
|
||
|
CVE-2023-40188 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq
|
||
|
CVE-2023-4019 - https://wpscan.com/vulnerability/0d323b07-c6e7-4aba-85bc-64659ad0c85d
|
||
|
CVE-2023-40194 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833
|
||
|
CVE-2023-40238 - https://binarly.io/posts/finding_logofail_the_dangers_of_image_parsing_during_system_boot/index.html
|
||
|
CVE-2023-40274 - https://github.com/getzola/zola/issues/2257
|
||
|
CVE-2023-40283 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-40283 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-40291 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
|
||
|
CVE-2023-40292 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
|
||
|
CVE-2023-40293 - https://autohack.in/2023/07/26/dude-its-my-car-how-to-develop-intimacy-with-your-car/
|
||
|
CVE-2023-40305 - https://savannah.gnu.org/bugs/index.php?64503
|
||
|
CVE-2023-4033 - https://huntr.dev/bounties/5312d6f8-67a5-4607-bd47-5e19966fa321
|
||
|
CVE-2023-40361 - https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md
|
||
|
CVE-2023-40362 - https://github.com/ally-petitt/CVE-2023-40362
|
||
|
CVE-2023-4039 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
|
||
|
CVE-2023-40459 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
||
|
CVE-2023-40461 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
||
|
CVE-2023-40462 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
||
|
CVE-2023-40463 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
||
|
CVE-2023-40464 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
||
|
CVE-2023-40465 - https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006/#sthash.6KUVtE6w.dpbs
|
||
|
CVE-2023-4047 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839073
|
||
|
CVE-2023-4051 - https://bugzilla.mozilla.org/show_bug.cgi?id=1821884
|
||
|
CVE-2023-40519 - https://medium.com/munchy-bytes/security-disclosure-of-vulnerabilities-cve-2023-40519-2fc319737dfa
|
||
|
CVE-2023-4052 - https://bugzilla.mozilla.org/show_bug.cgi?id=1824420
|
||
|
CVE-2023-4053 - https://bugzilla.mozilla.org/show_bug.cgi?id=1839079
|
||
|
CVE-2023-4054 - https://bugzilla.mozilla.org/show_bug.cgi?id=1840777
|
||
|
CVE-2023-40567 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp
|
||
|
CVE-2023-40569 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp
|
||
|
CVE-2023-40574 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw
|
||
|
CVE-2023-40575 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v
|
||
|
CVE-2023-40576 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2
|
||
|
CVE-2023-40586 - https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h
|
||
|
CVE-2023-40589 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x
|
||
|
CVE-2023-40590 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4
|
||
|
CVE-2023-40610 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-f678-j579-4xf5
|
||
|
CVE-2023-40660 - http://www.openwall.com/lists/oss-security/2023/12/13/2
|
||
|
CVE-2023-40660 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
|
||
|
CVE-2023-40661 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
|
||
|
CVE-2023-40748 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40749 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40750 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40751 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40752 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40753 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40754 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40755 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40756 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40757 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40758 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40759 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40760 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40761 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40762 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40763 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40764 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40765 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40766 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40767 - https://medium.com/@mfortinsec/multiple-vulnerabilities-in-phpjabbers-part-3-40fc3565982f
|
||
|
CVE-2023-40779 - https://medium.com/@muthumohanprasath.r/open-redirection-vulnerability-on-icewarp-webclient-product-cve-2023-40779-61176503710
|
||
|
CVE-2023-40781 - https://github.com/libming/libming/issues/288
|
||
|
CVE-2023-40791 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
|
||
|
CVE-2023-40796 - https://github.com/lst-oss/Vulnerability/tree/main/Phicomm/k2
|
||
|
CVE-2023-40797 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_4781A4
|
||
|
CVE-2023-40798 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/formSetIPv6status-formGetWanParameter
|
||
|
CVE-2023-40799 - https://github.com/lst-oss/Vulnerability/blob/main/Tenda/AC23/sub_450A4C
|
||
|
CVE-2023-40800 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/compare_parentcontrol_time
|
||
|
CVE-2023-40801 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/sub_451784
|
||
|
CVE-2023-40802 - https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/get_parentControl_list_Info
|
||
|
CVE-2023-40817 - https://www.esecforte.com/cve-2023-40817-html-injection-product-configuration/
|
||
|
CVE-2023-40829 - https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9
|
||
|
CVE-2023-40834 - https://packetstormsecurity.com/files/174525/OpenCart-CMS-4.0.2.2-Brute-Force.html
|
||
|
CVE-2023-40843 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/8/8.md
|
||
|
CVE-2023-40845 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/14/14.md
|
||
|
CVE-2023-40847 - https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/12/12.md
|
||
|
CVE-2023-40851 - https://www.exploit-db.com/exploits/51694
|
||
|
CVE-2023-40852 - https://www.exploit-db.com/exploits/51695
|
||
|
CVE-2023-40857 - https://github.com/VirusTotal/yara/issues/1945
|
||
|
CVE-2023-40868 - https://github.com/MinoTauro2020/CVE-2023-40868
|
||
|
CVE-2023-40869 - https://github.com/MinoTauro2020/CVE-2023-40869
|
||
|
CVE-2023-40889 - https://hackmd.io/@cspl/B1ZkFZv23
|
||
|
CVE-2023-40890 - https://hackmd.io/@cspl/H1PxPAUnn
|
||
|
CVE-2023-40942 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac9/SetFirewallCfg.md
|
||
|
CVE-2023-40953 - https://gist.github.com/ChubbyZ/e1e5c1858c389334dcf581a19c741308
|
||
|
CVE-2023-40954 - https://github.com/luvsn/OdZoo/tree/main/exploits/web_progress
|
||
|
CVE-2023-40955 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/2
|
||
|
CVE-2023-40956 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_job_search
|
||
|
CVE-2023-40957 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/3
|
||
|
CVE-2023-40958 - https://github.com/luvsn/OdZoo/tree/main/exploits/pdm/1
|
||
|
CVE-2023-40968 - https://github.com/hzeller/timg/issues/115
|
||
|
CVE-2023-40969 - https://github.com/slims/slims9_bulian/issues/204
|
||
|
CVE-2023-40970 - https://github.com/slims/slims9_bulian/issues/205
|
||
|
CVE-2023-41000 - https://github.com/gpac/gpac/issues/2550
|
||
|
CVE-2023-41011 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4
|
||
|
CVE-2023-41012 - https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4-Identity-verification-has-design-flaws
|
||
|
CVE-2023-41013 - https://medium.com/@katikitala.sushmitha078/cve-2023-41013-789841dcad91
|
||
|
CVE-2023-4104 - https://github.com/mozilla-mobile/mozilla-vpn-client/pull/7110
|
||
|
CVE-2023-41040 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c
|
||
|
CVE-2023-41041 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-3fqm-frhg-7c85
|
||
|
CVE-2023-41045 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-g96c-x7rh-99r3
|
||
|
CVE-2023-41054 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-p4f9-h8x8-mpwf
|
||
|
CVE-2023-41055 - https://github.com/Ahwxorg/LibreY/security/advisories/GHSA-xfj6-4vp9-8rgc
|
||
|
CVE-2023-4110 - http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-41107 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-020.txt
|
||
|
CVE-2023-41107 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021
|
||
|
CVE-2023-41108 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-021.txt
|
||
|
CVE-2023-41108 - https://www.syss.de/pentest-blog/sicherheitsschwachstellen-im-tef-haendlerportal-syss-2023-020/-021
|
||
|
CVE-2023-41109 - http://packetstormsecurity.com/files/175945/SmartNode-SN200-3.21.2-23021-OS-Command-Injection.html
|
||
|
CVE-2023-41109 - http://seclists.org/fulldisclosure/2023/Nov/12
|
||
|
CVE-2023-41109 - https://www.syss.de/
|
||
|
CVE-2023-41109 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-019.txt
|
||
|
CVE-2023-4111 - http://packetstormsecurity.com/files/173927/PHPJabbers-Bus-Reservation-System-1.1-Cross-Site-Scripting.html
|
||
|
CVE-2023-4111 - http://packetstormsecurity.com/files/173945/PHPJabbers-Bus-Reservation-System-1.1-SQL-Injection.html
|
||
|
CVE-2023-4112 - http://packetstormsecurity.com/files/173930/PHPJabbers-Shuttle-Booking-Software-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4113 - http://packetstormsecurity.com/files/173931/PHPJabbers-Service-Booking-Script-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4114 - http://packetstormsecurity.com/files/173932/PHPJabbers-Night-Club-Booking-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4115 - http://packetstormsecurity.com/files/173936/PHPJabbers-Cleaning-Business-1.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4116 - http://packetstormsecurity.com/files/173937/PHPJabbers-Taxi-Booking-2.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-41165 - https://advisories.stormshield.eu/2023-020/
|
||
|
CVE-2023-41166 - https://advisories.stormshield.eu/2023-027
|
||
|
CVE-2023-4117 - http://packetstormsecurity.com/files/173939/PHPJabbers-Rental-Property-Booking-2.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4117 - https://vuldb.com/?id.235964
|
||
|
CVE-2023-4119 - http://packetstormsecurity.com/files/173941/Academy-LMS-6.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4120 - https://github.com/RCEraser/cve/blob/main/rce.md
|
||
|
CVE-2023-4121 - https://github.com/torres14852/cve/blob/main/upload.md
|
||
|
CVE-2023-4124 - https://huntr.dev/bounties/2c684f99-d181-4106-8ee2-64a76ae6a348
|
||
|
CVE-2023-4125 - https://huntr.dev/bounties/85bfd18f-8d3b-4154-8b7b-1f8fcf704e28
|
||
|
CVE-2023-41257 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838
|
||
|
CVE-2023-4126 - https://huntr.dev/bounties/7f50bf1c-bcb9-46ca-8cec-211493d280c5
|
||
|
CVE-2023-4127 - https://huntr.dev/bounties/cf7d19e3-1318-4c77-8366-d8d04a0b41ba
|
||
|
CVE-2023-41270 - https://www.slideshare.net/fuguet/smold-tv-old-smart
|
||
|
CVE-2023-41270 - https://www.youtube.com/watch?v=MdIT4mPTX3s
|
||
|
CVE-2023-4128 - http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
|
||
|
CVE-2023-41316 - https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-gx3w-rwh5-w5cg
|
||
|
CVE-2023-41325 - https://github.com/OP-TEE/optee_os/security/advisories/GHSA-jrw7-63cq-7vhm
|
||
|
CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-92rv-4j2h-8mjj
|
||
|
CVE-2023-41330 - https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc
|
||
|
CVE-2023-41336 - https://symfony.com/bundles/ux-autocomplete/current/index.html#usage-in-a-form-with-ajax
|
||
|
CVE-2023-4136 - http://packetstormsecurity.com/files/174304/CrafterCMS-4.0.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-41362 - https://blog.sorcery.ie/posts/mybb_acp_rce/
|
||
|
CVE-2023-41364 - https://herolab.usd.de/security-advisories/usd-2023-0002/
|
||
|
CVE-2023-4138 - https://huntr.dev/bounties/1b1fa915-d588-4bb1-9e82-6a6be79befed
|
||
|
CVE-2023-41387 - https://seredynski.com/articles/exploiting-ios-apps-to-extract-session-tokens-and-overwrite-user-data
|
||
|
CVE-2023-41425 - https://gist.github.com/prodigiousMind/fc69a79629c4ba9ee88a7ad526043413
|
||
|
CVE-2023-41436 - https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md
|
||
|
CVE-2023-41442 - https://writeups.ayyappan.me/v/tor-iot-mqtt/
|
||
|
CVE-2023-41444 - https://blog.dru1d.ninja/windows-driver-exploit-development-irec-sys-a5eb45093945
|
||
|
CVE-2023-41444 - https://gist.github.com/dru1d-foofus/1af21179f253879f101c3a8d4f718bf0
|
||
|
CVE-2023-41445 - https://gist.github.com/RNPG/84cac1b949bab0e4c587a668385b052d
|
||
|
CVE-2023-41446 - https://gist.github.com/RNPG/4bb91170f8ee50b395427f26bc96a1f2
|
||
|
CVE-2023-41447 - https://gist.github.com/RNPG/56b9fe4dcc3a248d4288bde5ffb3a5b3
|
||
|
CVE-2023-41448 - https://gist.github.com/RNPG/458e17f24ebf7d8af3c5c4d7073347a0
|
||
|
CVE-2023-41449 - https://gist.github.com/RNPG/c1ae240f2acec138132aa64ce3faa2e0
|
||
|
CVE-2023-4145 - https://huntr.dev/bounties/ce852777-2994-40b4-bb4e-c4d10023eeb0
|
||
|
CVE-2023-41450 - https://gist.github.com/RNPG/e11af10e1bd3606de8b568033d932589
|
||
|
CVE-2023-41451 - https://gist.github.com/RNPG/062cfca2e293a0e7d24f5d55f8db3fde
|
||
|
CVE-2023-41452 - https://gist.github.com/RNPG/32be1c4bae6f9378d4f382ba0c92b367
|
||
|
CVE-2023-41453 - https://gist.github.com/RNPG/be2ca92cb1f943d4c340c75fbfc9b783
|
||
|
CVE-2023-41507 - https://github.com/redblueteam/CVE-2023-41507/
|
||
|
CVE-2023-41508 - https://github.com/redblueteam/CVE-2023-41508/
|
||
|
CVE-2023-4157 - https://huntr.dev/bounties/abc3521b-1238-4c4e-97f1-2957db670014
|
||
|
CVE-2023-41575 - https://github.com/soundarkutty/Stored-xss/blob/main/poc
|
||
|
CVE-2023-4158 - https://huntr.dev/bounties/e0e462ae-d7cb-4a84-b6fe-5f5de20e3d15
|
||
|
CVE-2023-41580 - https://github.com/ehtec/phpipam-exploit
|
||
|
CVE-2023-4159 - https://huntr.dev/bounties/e2e2365e-6a5f-4ca4-9ef1-297e3ed41f9c
|
||
|
CVE-2023-41593 - https://portswigger.net/web-security/cross-site-scripting
|
||
|
CVE-2023-41599 - http://www.so1lupus.ltd/2023/08/28/Directory-traversal-in-JFinalCMS/
|
||
|
CVE-2023-41601 - https://github.com/al3zx/csz_cms_1_3_0_xss_in_install_page/blob/main/README.md
|
||
|
CVE-2023-41613 - https://packetstormsecurity.com/files/175684/EzViz-Studio-2.2.0-DLL-Hijacking.html
|
||
|
CVE-2023-41615 - https://medium.com/@guravtushar231/sql-injection-in-login-field-a9073780f7e8
|
||
|
CVE-2023-41616 - https://medium.com/@guravtushar231/reflected-xss-in-admin-panel-7a459dcb9476
|
||
|
CVE-2023-41627 - https://jira.o-ran-sc.org/browse/RIC-1001
|
||
|
CVE-2023-41628 - https://jira.o-ran-sc.org/browse/RIC-1002
|
||
|
CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md
|
||
|
CVE-2023-41635 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md
|
||
|
CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection(1).md
|
||
|
CVE-2023-41636 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection(1).md
|
||
|
CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md
|
||
|
CVE-2023-41637 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md
|
||
|
CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41638%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md
|
||
|
CVE-2023-41638 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20RCE%20via%20Unrestricted%20File%20Upload.md
|
||
|
CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41640%20%7C%20RealGimm%20-%20Information%20disclosure.md
|
||
|
CVE-2023-41640 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md
|
||
|
CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41642%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
|
||
|
CVE-2023-41642 - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
|
||
|
CVE-2023-41646 - https://github.com/tristao-marinho/CVE-2023-41646/
|
||
|
CVE-2023-4168 - http://packetstormsecurity.com/files/174015/Adlisting-Classified-Ads-2.14.0-Information-Disclosure.html
|
||
|
CVE-2023-4169 - https://vuldb.com/?id.236185
|
||
|
CVE-2023-41703 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
||
|
CVE-2023-41704 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
||
|
CVE-2023-41705 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
||
|
CVE-2023-41706 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
||
|
CVE-2023-41707 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
||
|
CVE-2023-41708 - http://packetstormsecurity.com/files/177130/OX-App-Suite-7.10.6-Cross-Site-Scirpting-Denial-Of-Service.html
|
||
|
CVE-2023-41710 - http://packetstormsecurity.com/files/176422/OX-App-Suite-7.10.6-Access-Control-Cross-Site-Scripting.html
|
||
|
CVE-2023-41717 - https://github.com/federella/CVE-2023-41717
|
||
|
CVE-2023-4172 - https://vuldb.com/?id.236207
|
||
|
CVE-2023-4173 - http://packetstormsecurity.com/files/174016/mooSocial-3.1.8-Cross-Site-Scripting.html
|
||
|
CVE-2023-4174 - http://packetstormsecurity.com/files/174017/Social-Commerce-3.1.6-Cross-Site-Scripting.html
|
||
|
CVE-2023-4175 - https://vuldb.com/?id.236210
|
||
|
CVE-2023-4176 - https://vuldb.com/?id.236211
|
||
|
CVE-2023-4179 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20doctors.php/vuln.md
|
||
|
CVE-2023-4180 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/SQL%20Injection%20in%20login.php/vuln.md
|
||
|
CVE-2023-4181 - https://github.com/Yesec/Free-Hospital-Management-System-for-Small-Practices/blob/main/vertical%20privilege%20escalation/vuln.md
|
||
|
CVE-2023-4182 - https://vuldb.com/?id.236217
|
||
|
CVE-2023-4183 - https://vuldb.com/?id.236218
|
||
|
CVE-2023-4184 - https://vuldb.com/?id.236219
|
||
|
CVE-2023-4185 - https://vuldb.com/?id.236220
|
||
|
CVE-2023-4187 - https://huntr.dev/bounties/14941381-b669-4756-94fc-cce172472f8b
|
||
|
CVE-2023-41879 - https://github.com/OpenMage/magento-lts/security/advisories/GHSA-9358-cpvx-c2qp
|
||
|
CVE-2023-4188 - https://huntr.dev/bounties/fe9809b6-40ad-4e81-9197-a9aa42e8a7bf
|
||
|
CVE-2023-41885 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-h7cm-mrvq-wcfr
|
||
|
CVE-2023-41886 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m
|
||
|
CVE-2023-41887 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5
|
||
|
CVE-2023-41889 - https://github.com/shirasagi/shirasagi/security/advisories/GHSA-xr45-c2jv-2v9r
|
||
|
CVE-2023-4189 - https://huntr.dev/bounties/b00e6986-64e7-464e-ba44-e42476bfcdc4
|
||
|
CVE-2023-41892 - http://packetstormsecurity.com/files/176303/Craft-CMS-4.4.14-Remote-Code-Execution.html
|
||
|
CVE-2023-4190 - https://huntr.dev/bounties/71bc75d2-320c-4332-ad11-9de535a06d92
|
||
|
CVE-2023-4191 - https://github.com/Yesec/Resort-Reservation-System/blob/main/local%20file%20inclusion/vuln.md
|
||
|
CVE-2023-4192 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20manage_user.php/vuln.md
|
||
|
CVE-2023-4193 - https://github.com/Yesec/Resort-Reservation-System/blob/main/SQL%20Injection%20in%20view_fee.php/vuln.md
|
||
|
CVE-2023-4195 - https://huntr.dev/bounties/0bd5da2f-0e29-47ce-90f3-06518656bfd6
|
||
|
CVE-2023-4196 - https://huntr.dev/bounties/c275a2d4-721f-49f7-8787-b146af2056a0
|
||
|
CVE-2023-41966 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
||
|
CVE-2023-41966 - https://www.sielco.org/en/contacts
|
||
|
CVE-2023-4197 - https://starlabs.sg/advisories/23/23-4197
|
||
|
CVE-2023-4198 - https://starlabs.sg/advisories/23/23-4198
|
||
|
CVE-2023-4199 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20catagory_data.php/vuln.md
|
||
|
CVE-2023-41998 - https://www.tenable.com/security/research/tra-2023-37
|
||
|
CVE-2023-41999 - https://www.tenable.com/security/research/tra-2023-37
|
||
|
CVE-2023-4200 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20product_data.php/vuln.md
|
||
|
CVE-2023-42000 - https://www.tenable.com/security/research/tra-2023-37
|
||
|
CVE-2023-4201 - https://github.com/Yesec/Inventory-Management-System/blob/main/SQL%20Injection%20in%20ex_catagory_data.php/vuln.md
|
||
|
CVE-2023-4202 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html
|
||
|
CVE-2023-4202 - http://seclists.org/fulldisclosure/2023/Aug/13
|
||
|
CVE-2023-4202 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
||
|
CVE-2023-4203 - http://packetstormsecurity.com/files/174153/Advantech-EKI-1524-CE-EKI-1522-EKI-1521-Cross-Site-Scripting.html
|
||
|
CVE-2023-4203 - http://seclists.org/fulldisclosure/2023/Aug/13
|
||
|
CVE-2023-4203 - https://cyberdanube.com/en/en-st-polten-uas-multiple-vulnerabilities-in-advantech-eki-15xx-series/
|
||
|
CVE-2023-42134 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
||
|
CVE-2023-42135 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
||
|
CVE-2023-42136 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
||
|
CVE-2023-42137 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
||
|
CVE-2023-42143 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
||
|
CVE-2023-42144 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
||
|
CVE-2023-4219 - https://github.com/Yesec/-Doctor-s-Appointment-System/blob/main/SQL%20Injection%20in%20login.php/vuln.md
|
||
|
CVE-2023-4220 - https://starlabs.sg/advisories/23/23-4220
|
||
|
CVE-2023-4221 - https://starlabs.sg/advisories/23/23-4221
|
||
|
CVE-2023-4222 - https://starlabs.sg/advisories/23/23-4222
|
||
|
CVE-2023-42222 - http://packetstormsecurity.com/files/176957/WebCatalog-48.4-Arbitrary-Protocol-Execution-Code-Execution.html
|
||
|
CVE-2023-42222 - https://github.com/itssixtyn3in/CVE-2023-42222
|
||
|
CVE-2023-4223 - https://starlabs.sg/advisories/23/23-4223
|
||
|
CVE-2023-4224 - https://starlabs.sg/advisories/23/23-4224
|
||
|
CVE-2023-4225 - https://starlabs.sg/advisories/23/23-4225
|
||
|
CVE-2023-4226 - https://starlabs.sg/advisories/23/23-4226
|
||
|
CVE-2023-42270 - http://packetstormsecurity.com/files/176958/Grocy-4.0.2-Cross-Site-Request-Forgery.html
|
||
|
CVE-2023-42270 - http://xploit.sh/posts/cve-2023-xxxxx/
|
||
|
CVE-2023-42278 - https://github.com/dromara/hutool/issues/3289
|
||
|
CVE-2023-42282 - https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html
|
||
|
CVE-2023-42283 - https://github.com/andreysanyuk/CVE-2023-42283
|
||
|
CVE-2023-42284 - https://github.com/andreysanyuk/CVE-2023-42284
|
||
|
CVE-2023-42295 - https://github.com/OpenImageIO/oiio/issues/3947
|
||
|
CVE-2023-42298 - https://github.com/gpac/gpac/issues/2567
|
||
|
CVE-2023-42299 - https://github.com/OpenImageIO/oiio/issues/3840
|
||
|
CVE-2023-42320 - https://github.com/aixiao0621/Tenda/blob/main/AC10/0.md
|
||
|
CVE-2023-42323 - https://github.com/mnbvcxz131421/douhaocms/blob/main/README.md
|
||
|
CVE-2023-42358 - https://jira.o-ran-sc.org/browse/RIC-1009
|
||
|
CVE-2023-42361 - https://gccybermonks.com/posts/pdfjira/
|
||
|
CVE-2023-42362 - https://github.com/Mr-n0b3dy/CVE-2023-42362
|
||
|
CVE-2023-42374 - https://beosin.com/resources/%22memory-bomb%22-vulnerability-causes-sui-node-to-crash?lang=en-US
|
||
|
CVE-2023-42405 - https://github.com/fit2cloud/rackshift/issues/79
|
||
|
CVE-2023-42406 - https://github.com/1dreamGN/CVE/blob/main/CVE-2023-42406.md
|
||
|
CVE-2023-42406 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_:sysmanage:editrole.php.md
|
||
|
CVE-2023-42448 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03
|
||
|
CVE-2023-42448 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-mgcx-6p7h-5996
|
||
|
CVE-2023-42449 - https://github.com/input-output-hk/hydra/blob/master/CHANGELOG.md#0130---2023-10-03
|
||
|
CVE-2023-42449 - https://github.com/input-output-hk/hydra/security/advisories/GHSA-9m8q-7wxv-v65p
|
||
|
CVE-2023-42459 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm
|
||
|
CVE-2023-42468 - https://github.com/actuator/com.cutestudio.colordialer/blob/main/CWE-284.md
|
||
|
CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted
|
||
|
CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/dial.gif
|
||
|
CVE-2023-42469 - https://github.com/actuator/com.full.dialer.top.secure.encrypted/blob/main/poc.apk
|
||
|
CVE-2023-42469 - https://github.com/actuator/cve/blob/main/CVE-2023-42469
|
||
|
CVE-2023-42470 - https://github.com/actuator/cve/blob/main/CVE-2023-42470
|
||
|
CVE-2023-42470 - https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md
|
||
|
CVE-2023-42470 - https://github.com/actuator/imou/blob/main/poc.apk
|
||
|
CVE-2023-42471 - https://github.com/actuator/cve/blob/main/CVE-2023-42471
|
||
|
CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/CWE-94.md
|
||
|
CVE-2023-42471 - https://github.com/actuator/wave.ai.browser/blob/main/poc.apk
|
||
|
CVE-2023-4250 - https://wpscan.com/vulnerability/9c271619-f478-45c3-91d9-be0f55ee06a2
|
||
|
CVE-2023-4255 - https://github.com/tats/w3m/issues/268
|
||
|
CVE-2023-4256 - https://github.com/appneta/tcpreplay/issues/813
|
||
|
CVE-2023-4257 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4257 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j
|
||
|
CVE-2023-4259 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4259 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4
|
||
|
CVE-2023-4260 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4260 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh
|
||
|
CVE-2023-4262 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4262 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-56p9-5p3v-hhrc
|
||
|
CVE-2023-4263 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4263 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf
|
||
|
CVE-2023-4264 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4264 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j
|
||
|
CVE-2023-4265 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-4265 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh
|
||
|
CVE-2023-42752 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-42753 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-42753 - https://seclists.org/oss-sec/2023/q3/216
|
||
|
CVE-2023-42753 - https://www.openwall.com/lists/oss-security/2023/09/22/10
|
||
|
CVE-2023-42754 - https://seclists.org/oss-sec/2023/q4/14
|
||
|
CVE-2023-42755 - https://seclists.org/oss-sec/2023/q3/229
|
||
|
CVE-2023-42756 - https://seclists.org/oss-sec/2023/q3/242
|
||
|
CVE-2023-42769 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
||
|
CVE-2023-42769 - https://www.sielco.org/en/contacts
|
||
|
CVE-2023-4278 - http://packetstormsecurity.com/files/175007/WordPress-Masterstudy-LMS-3.0.17-Account-Creation.html
|
||
|
CVE-2023-42787 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-q5pq-8666-j8fr
|
||
|
CVE-2023-42788 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-qpv8-g6qv-rf8p
|
||
|
CVE-2023-42793 - http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-42793 - https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793
|
||
|
CVE-2023-42793 - https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/
|
||
|
CVE-2023-42799 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-r8cf-45f4-vf8m
|
||
|
CVE-2023-42800 - https://github.com/moonlight-stream/moonlight-common-c/security/advisories/GHSA-4927-23jw-rq62
|
||
|
CVE-2023-42808 - https://securitylab.github.com/advisories/GHSL-2023-026_Common_Voice/
|
||
|
CVE-2023-42811 - https://github.com/RustCrypto/AEADs/security/advisories/GHSA-423w-p2w9-r7vq
|
||
|
CVE-2023-42812 - https://github.com/galaxyproject/galaxy/security/advisories/GHSA-vf5q-r8p9-35xh
|
||
|
CVE-2023-42821 - https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2
|
||
|
CVE-2023-42882 - http://packetstormsecurity.com/files/176536/macOS-AppleVADriver-Out-Of-Bounds-Write.html
|
||
|
CVE-2023-42926 - http://packetstormsecurity.com/files/176535/macOS-AppleGVA-Memory-Handling.html
|
||
|
CVE-2023-42940 - http://seclists.org/fulldisclosure/2023/Dec/20
|
||
|
CVE-2023-4295 - http://packetstormsecurity.com/files/176109/Arm-Mali-CSF-Overflow-Use-After-Free.html
|
||
|
CVE-2023-4296 - http://packetstormsecurity.com/files/174703/PTC-Codebeamer-Cross-Site-Scripting.html
|
||
|
CVE-2023-4296 - http://seclists.org/fulldisclosure/2023/Sep/10
|
||
|
CVE-2023-4304 - https://huntr.dev/bounties/59fe5037-b253-4b0f-be69-1d2e4af8b4a9
|
||
|
CVE-2023-4309 - https://www.youtube.com/watch?v=yeG1xZkHc64
|
||
|
CVE-2023-43116 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md
|
||
|
CVE-2023-43131 - https://www.exploit-db.com/exploits/51641
|
||
|
CVE-2023-43144 - https://github.com/projectworldsofficial/Assets-management-system-in-php/issues/2
|
||
|
CVE-2023-43147 - https://github.com/MinoTauro2020/CVE-2023-43147/
|
||
|
CVE-2023-43148 - https://github.com/MinoTauro2020/CVE-2023-43148
|
||
|
CVE-2023-43149 - https://github.com/MinoTauro2020/CVE-2023-43149
|
||
|
CVE-2023-43154 - https://cxsecurity.com/issue/WLB-2023090075
|
||
|
CVE-2023-43154 - https://github.com/ally-petitt/macs-cms-auth-bypass
|
||
|
CVE-2023-43176 - https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H&version=3.1
|
||
|
CVE-2023-43177 - https://convergetp.com/2023/11/16/crushftp-zero-day-cve-2023-43177-discovered/
|
||
|
CVE-2023-43183 - http://seclists.org/fulldisclosure/2024/Jan/43
|
||
|
CVE-2023-43183 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html
|
||
|
CVE-2023-43196 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug4.md
|
||
|
CVE-2023-43197 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug1.md
|
||
|
CVE-2023-43198 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug5.md
|
||
|
CVE-2023-43199 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug6.md
|
||
|
CVE-2023-43200 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug3.md
|
||
|
CVE-2023-43201 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DI-7200GV2/bug2.md
|
||
|
CVE-2023-43208 - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html
|
||
|
CVE-2023-43208 - https://www.horizon3.ai/nextgen-mirth-connect-remote-code-execution-vulnerability-cve-2023-43208/
|
||
|
CVE-2023-4321 - https://huntr.dev/bounties/fce38751-bfd6-484c-b6e1-935e0aa8ffdc
|
||
|
CVE-2023-4322 - https://huntr.dev/bounties/06e2484c-d6f1-4497-af67-26549be9fffd
|
||
|
CVE-2023-43222 - https://blog.csdn.net/weixin_51394168/article/details/132817842
|
||
|
CVE-2023-43226 - https://github.com/zzq66/cve/
|
||
|
CVE-2023-43235 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWifiDownSettings/1.md
|
||
|
CVE-2023-43236 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/dir_setWanWifi/1.md
|
||
|
CVE-2023-43237 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/setMAC/1.md
|
||
|
CVE-2023-43238 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2Dhcpip_cgi/1.md
|
||
|
CVE-2023-43239 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/showMACfilterMAC/1.md
|
||
|
CVE-2023-43240 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/ipportFilter/1.md
|
||
|
CVE-2023-43241 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/823G/SetWLanRadioSecurity/1.md
|
||
|
CVE-2023-43242 - https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/form2IPQoSTcDel/1.md
|
||
|
CVE-2023-43250 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html
|
||
|
CVE-2023-43250 - http://seclists.org/fulldisclosure/2023/Oct/15
|
||
|
CVE-2023-43251 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html
|
||
|
CVE-2023-43251 - http://seclists.org/fulldisclosure/2023/Oct/15
|
||
|
CVE-2023-43252 - http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html
|
||
|
CVE-2023-43252 - http://seclists.org/fulldisclosure/2023/Oct/15
|
||
|
CVE-2023-43260 - https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13
|
||
|
CVE-2023-43261 - http://packetstormsecurity.com/files/176988/Milesight-UR5X-UR32L-UR32-UR35-UR41-Credential-Leakage.html
|
||
|
CVE-2023-43261 - https://github.com/win3zz/CVE-2023-43261
|
||
|
CVE-2023-43275 - https://github.com/thedarknessdied/dedecms/blob/main/v5.7_110-CSRF.md
|
||
|
CVE-2023-43278 - https://blog.csdn.net/sugaryzheng/article/details/133283101?spm=1001.2014.3001.5501
|
||
|
CVE-2023-43284 - https://github.com/MateusTesser/CVE-2023-43284
|
||
|
CVE-2023-43291 - https://gist.github.com/Dar1in9s/e3db6b04daacb68633a97581bbd5921b
|
||
|
CVE-2023-43309 - https://github.com/TishaManandhar/Webmin_xss_POC/blob/main/XSS
|
||
|
CVE-2023-43319 - https://medium.com/@muthumohanprasath.r/reflected-cross-site-scripting-on-icewarp-webclient-product-cve-2023-43319-c2ad758ac2bc
|
||
|
CVE-2023-43320 - http://packetstormsecurity.com/files/176967/Proxmox-VE-7.4-1-TOTP-Brute-Force.html
|
||
|
CVE-2023-43321 - https://github.com/Push3AX/vul/blob/main/DCN/DCFW_1800_SDC_CommandInjection.md
|
||
|
CVE-2023-43323 - https://github.com/ahrixia/CVE-2023-43323
|
||
|
CVE-2023-43325 - https://github.com/ahrixia/CVE-2023-43325
|
||
|
CVE-2023-43326 - https://github.com/ahrixia/CVE-2023-43326
|
||
|
CVE-2023-43336 - https://medium.com/@janirudransh/security-disclosure-of-vulnerability-cve-2023-23336-4429d416f826
|
||
|
CVE-2023-43338 - https://github.com/cesanta/mjs/issues/250
|
||
|
CVE-2023-43339 - https://github.com/sromanhu/CVE-2023-43339-CMSmadesimple-Reflected-XSS---Installation/blob/main/README.md
|
||
|
CVE-2023-43339 - https://github.com/sromanhu/Cmsmadesimple-CMS-Stored-XSS/blob/main/README.md
|
||
|
CVE-2023-43340 - https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options
|
||
|
CVE-2023-43340 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Admin-Options
|
||
|
CVE-2023-43341 - https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-
|
||
|
CVE-2023-43341 - https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection-
|
||
|
CVE-2023-43342 - https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend
|
||
|
CVE-2023-43342 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Frontend
|
||
|
CVE-2023-43343 - https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files
|
||
|
CVE-2023-43343 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files
|
||
|
CVE-2023-43344 - https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description
|
||
|
CVE-2023-43345 - https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content
|
||
|
CVE-2023-43346 - https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend
|
||
|
CVE-2023-43346 - https://github.com/sromanhu/Quick-CMS-Stored-XSS---Languages-Backend
|
||
|
CVE-2023-43352 - https://github.com/sromanhu/CMSmadesimple-SSTI--Content
|
||
|
CVE-2023-43352 - https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content
|
||
|
CVE-2023-43353 - https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra
|
||
|
CVE-2023-43354 - https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension
|
||
|
CVE-2023-43355 - https://github.com/sromanhu/CMSmadesimple-Reflected-XSS---Add-user
|
||
|
CVE-2023-43355 - https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user
|
||
|
CVE-2023-43356 - https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings
|
||
|
CVE-2023-43357 - https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut
|
||
|
CVE-2023-43358 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---News
|
||
|
CVE-2023-43358 - https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News
|
||
|
CVE-2023-43359 - https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager
|
||
|
CVE-2023-43360 - https://github.com/sromanhu/CMSmadesimple-Stored-XSS---File-Picker-extension
|
||
|
CVE-2023-43360 - https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension
|
||
|
CVE-2023-43361 - https://github.com/xiph/vorbis-tools/issues/41
|
||
|
CVE-2023-43364 - https://github.com/advisories/GHSA-66m2-493m-crh2
|
||
|
CVE-2023-43364 - https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-
|
||
|
CVE-2023-43364 - https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
|
||
|
CVE-2023-4347 - https://huntr.dev/bounties/1f78c6e1-2923-46c5-9376-4cc5a8f1152f
|
||
|
CVE-2023-43470 - https://github.com/ae6e361b/Online-Voting-System
|
||
|
CVE-2023-43477 - https://www.tenable.com/security/research/tra-2023-19
|
||
|
CVE-2023-43478 - https://www.tenable.com/security/research/tra-2023-19
|
||
|
CVE-2023-43481 - https://github.com/actuator/com.tcl.browser/blob/main/CWE-94.md
|
||
|
CVE-2023-4352 - http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html
|
||
|
CVE-2023-4354 - http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html
|
||
|
CVE-2023-4355 - http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html
|
||
|
CVE-2023-43567 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43568 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43569 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43570 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43571 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43572 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43573 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43574 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43575 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43576 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43577 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43578 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43579 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43580 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43581 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-43608 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1845
|
||
|
CVE-2023-43628 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860
|
||
|
CVE-2023-43641 - http://packetstormsecurity.com/files/176128/libcue-2.2.1-Out-Of-Bounds-Access.html
|
||
|
CVE-2023-43641 - https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/
|
||
|
CVE-2023-43641 - https://github.com/lipnitsk/libcue/security/advisories/GHSA-5982-x7hv-r9cj
|
||
|
CVE-2023-43642 - https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv
|
||
|
CVE-2023-43646 - https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5
|
||
|
CVE-2023-43654 - http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html
|
||
|
CVE-2023-43661 - https://github.com/cachethq/cachet/security/advisories/GHSA-hv79-p62r-wg3p
|
||
|
CVE-2023-43741 - https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md
|
||
|
CVE-2023-43787 - https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/
|
||
|
CVE-2023-43791 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-f475-x83m-rx5m
|
||
|
CVE-2023-43809 - https://github.com/charmbracelet/soft-serve/issues/389
|
||
|
CVE-2023-4381 - https://huntr.dev/bounties/666c2617-e3e9-4955-9c97-2f8ed5262cc3
|
||
|
CVE-2023-43810 - https://github.com/open-telemetry/opentelemetry-python-contrib/security/advisories/GHSA-5rv5-6h4r-h22v
|
||
|
CVE-2023-4382 - http://packetstormsecurity.com/files/174212/Hyip-Rio-2.1-Cross-Site-Scripting-File-Upload.html
|
||
|
CVE-2023-43828 - https://github.com/al3zx/xss_languages_subrion_4.2.1
|
||
|
CVE-2023-4383 - https://gist.github.com/dmknght/ac489cf3605ded09b3925521afee3003
|
||
|
CVE-2023-43830 - https://github.com/al3zx/xss_financial_subrion_4.2.1
|
||
|
CVE-2023-43835 - https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html
|
||
|
CVE-2023-43860 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43861 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43862 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43863 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43864 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43865 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43866 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43867 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43868 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43869 - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md
|
||
|
CVE-2023-43871 - https://github.com/sromanhu/CVE-2023-43871-WBCE-Arbitrary-File-Upload--XSS---Media/blob/main/README.md
|
||
|
CVE-2023-43871 - https://github.com/sromanhu/WBCE-File-Upload--XSS---Media/blob/main/README.md
|
||
|
CVE-2023-43872 - https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager
|
||
|
CVE-2023-43873 - https://github.com/sromanhu/e107-CMS-Stored-XSS---Manage/blob/main/README.md
|
||
|
CVE-2023-43874 - https://github.com/sromanhu/e107-CMS-Stored-XSS---MetaCustomTags/blob/main/README.md
|
||
|
CVE-2023-43875 - https://github.com/sromanhu/CVE-2023-43875-Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md
|
||
|
CVE-2023-43875 - https://github.com/sromanhu/Subrion-CMS-Reflected-XSS---Installation/blob/main/README.md
|
||
|
CVE-2023-43876 - https://github.com/sromanhu/October-CMS-Reflected-XSS---Installation/blob/main/README.md
|
||
|
CVE-2023-43877 - https://github.com/sromanhu/CVE-2023-43878-RiteCMS-Stored-XSS---MainMenu/blob/main/README.md
|
||
|
CVE-2023-43877 - https://github.com/sromanhu/RiteCMS-Stored-XSS---Home
|
||
|
CVE-2023-43878 - https://github.com/sromanhu/RiteCMS-Stored-XSS---MainMenu/blob/main/README.md
|
||
|
CVE-2023-43879 - https://github.com/sromanhu/RiteCMS-Stored-XSS---GlobalContent/tree/main
|
||
|
CVE-2023-43884 - https://github.com/dpuenteramirez/XSS-ReferenceID-Subrion_4.2.1
|
||
|
CVE-2023-43887 - https://github.com/strukturag/libde265/issues/418
|
||
|
CVE-2023-43890 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20bypass%20filter.md
|
||
|
CVE-2023-43891 - https://github.com/adhikara13/CVE/blob/main/netis_N3/command%20injection%20in%20changing%20password%20feature.md
|
||
|
CVE-2023-43892 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20hostname%20parameter%20in%20wan%20settings.md
|
||
|
CVE-2023-43893 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20wake%20on%20lan%20functionality%20in%20wakeup_mac%20parameter.md
|
||
|
CVE-2023-43906 - https://github.com/Playful-CR/CVE-paddle-/blob/main/CVE-2023-43906
|
||
|
CVE-2023-43907 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
|
||
|
CVE-2023-4395 - https://huntr.dev/bounties/60e38563-7ac8-4a13-ac04-2980cc48b0da
|
||
|
CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser
|
||
|
CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/CWE-94.md
|
||
|
CVE-2023-43955 - https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk
|
||
|
CVE-2023-43959 - https://hackmd.io/@tahaafarooq/auth_rce_voip
|
||
|
CVE-2023-43959 - https://www.exploit-db.com/exploits/50509
|
||
|
CVE-2023-43960 - https://hackmd.io/@tahaafarooq/dlink-dph-400se-cwe-200
|
||
|
CVE-2023-43960 - https://www.exploit-db.com/exploits/51709
|
||
|
CVE-2023-44008 - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44008
|
||
|
CVE-2023-44013 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/0/0.md
|
||
|
CVE-2023-44014 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/1/0.md
|
||
|
CVE-2023-44015 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/8/0.md
|
||
|
CVE-2023-44016 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/7/0.md
|
||
|
CVE-2023-44017 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/6/0.md
|
||
|
CVE-2023-44018 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/10/0.md
|
||
|
CVE-2023-44019 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/5/0.md
|
||
|
CVE-2023-44020 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/9/0.md
|
||
|
CVE-2023-44021 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/2/0.md
|
||
|
CVE-2023-44022 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/3/0.md
|
||
|
CVE-2023-44023 - https://github.com/aixiao0621/Tenda/blob/main/AC10U/4/0.md
|
||
|
CVE-2023-44031 - http://seclists.org/fulldisclosure/2024/Jan/43
|
||
|
CVE-2023-44031 - https://packetstormsecurity.com/files/176841/Reprise-License-Manager-15.1-Privilege-Escalation-File-Write.html
|
||
|
CVE-2023-44042 - https://github.com/Gi0rgi0R/xss_frontend_settings_blackcat_cms_1.4.1
|
||
|
CVE-2023-44043 - https://github.com/Gi0rgi0R/xss_installation_blackcat_cms_1.4.1
|
||
|
CVE-2023-44044 - https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL
|
||
|
CVE-2023-44047 - https://github.com/xcodeOn1/SQLI-TollTax/blob/main/README.md
|
||
|
CVE-2023-44047 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44047.md
|
||
|
CVE-2023-44048 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App/tree/main
|
||
|
CVE-2023-44048 - https://github.com/xcodeOn1/xcode0x-CVEs/blob/main/CVE/CVE-2023-44048.md
|
||
|
CVE-2023-44061 - https://github.com/soundarkutty/File-upload-Restriction-bypass/blob/main/poc.md
|
||
|
CVE-2023-4407 - http://packetstormsecurity.com/files/174244/Credit-Lite-1.5.4-SQL-Injection.html
|
||
|
CVE-2023-4409 - https://vuldb.com/?id.237512
|
||
|
CVE-2023-44216 - https://arstechnica.com/security/2023/09/gpus-from-all-major-suppliers-are-vulnerable-to-new-pixel-stealing-attack/
|
||
|
CVE-2023-44216 - https://github.com/UT-Security/gpu-zip
|
||
|
CVE-2023-44216 - https://news.ycombinator.com/item?id=37663159
|
||
|
CVE-2023-44216 - https://www.bleepingcomputer.com/news/security/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack/
|
||
|
CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/
|
||
|
CVE-2023-44216 - https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf
|
||
|
CVE-2023-4422 - https://huntr.dev/bounties/2e12b773-b6a2-48da-a4bb-55d5d1307d2e
|
||
|
CVE-2023-44249 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj
|
||
|
CVE-2023-44256 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh
|
||
|
CVE-2023-4427 - http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html
|
||
|
CVE-2023-44275 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense
|
||
|
CVE-2023-44276 - https://www.x41-dsec.de/lab/advisories/x41-2023-001-opnsense
|
||
|
CVE-2023-4432 - https://huntr.dev/bounties/69684663-6822-41ff-aa05-afbdb8f5268f
|
||
|
CVE-2023-4433 - https://huntr.dev/bounties/64f3253d-6852-4b9f-b870-85e896007b1a
|
||
|
CVE-2023-4434 - https://huntr.dev/bounties/19e68377-e071-4a8e-aa4c-cd84a426602e
|
||
|
CVE-2023-4435 - https://huntr.dev/bounties/1875ee85-4b92-4aa4-861e-094137a29276
|
||
|
CVE-2023-4437 - https://vuldb.com/?id.237558
|
||
|
CVE-2023-44372 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1842
|
||
|
CVE-2023-4439 - https://vuldb.com/?id.237560
|
||
|
CVE-2023-44393 - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg
|
||
|
CVE-2023-44398 - https://github.com/Exiv2/exiv2/commit/e884a0955359107f4031c74a07406df7e99929a5
|
||
|
CVE-2023-44400 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g
|
||
|
CVE-2023-4441 - https://vuldb.com/?id.237562
|
||
|
CVE-2023-44466 - https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph
|
||
|
CVE-2023-44467 - https://github.com/langchain-ai/langchain/commit/4c97a10bd0d9385cfee234a63b5bd826a295e483
|
||
|
CVE-2023-44469 - https://security.lauritz-holtmann.de/post/sso-security-ssrf/
|
||
|
CVE-2023-4448 - https://vuldb.com/?id.237569
|
||
|
CVE-2023-44487 - https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
|
||
|
CVE-2023-44487 - https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
|
||
|
CVE-2023-44487 - https://github.com/Azure/AKS/issues/3947
|
||
|
CVE-2023-44487 - https://github.com/advisories/GHSA-qppj-fm5r-hxr3
|
||
|
CVE-2023-44487 - https://github.com/akka/akka-http/issues/4323
|
||
|
CVE-2023-44487 - https://github.com/alibaba/tengine/issues/1872
|
||
|
CVE-2023-44487 - https://github.com/apache/apisix/issues/10320
|
||
|
CVE-2023-44487 - https://github.com/apache/httpd-site/pull/10
|
||
|
CVE-2023-44487 - https://github.com/apache/trafficserver/pull/10564
|
||
|
CVE-2023-44487 - https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
|
||
|
CVE-2023-44487 - https://github.com/caddyserver/caddy/issues/5877
|
||
|
CVE-2023-44487 - https://github.com/eclipse/jetty.project/issues/10679
|
||
|
CVE-2023-44487 - https://github.com/envoyproxy/envoy/pull/30055
|
||
|
CVE-2023-44487 - https://github.com/etcd-io/etcd/issues/16740
|
||
|
CVE-2023-44487 - https://github.com/facebook/proxygen/pull/466
|
||
|
CVE-2023-44487 - https://github.com/golang/go/issues/63417
|
||
|
CVE-2023-44487 - https://github.com/grpc/grpc-go/pull/6703
|
||
|
CVE-2023-44487 - https://github.com/h2o/h2o/pull/3291
|
||
|
CVE-2023-44487 - https://github.com/haproxy/haproxy/issues/2312
|
||
|
CVE-2023-44487 - https://github.com/kazu-yamamoto/http2/issues/93
|
||
|
CVE-2023-44487 - https://github.com/kubernetes/kubernetes/pull/121120
|
||
|
CVE-2023-44487 - https://github.com/line/armeria/pull/5232
|
||
|
CVE-2023-44487 - https://github.com/micrictor/http2-rst-stream
|
||
|
CVE-2023-44487 - https://github.com/microsoft/CBL-Mariner/pull/6381
|
||
|
CVE-2023-44487 - https://github.com/nghttp2/nghttp2/pull/1961
|
||
|
CVE-2023-44487 - https://github.com/ninenines/cowboy/issues/1615
|
||
|
CVE-2023-44487 - https://github.com/nodejs/node/pull/50121
|
||
|
CVE-2023-44487 - https://github.com/openresty/openresty/issues/930
|
||
|
CVE-2023-44487 - https://github.com/opensearch-project/data-prepper/issues/3474
|
||
|
CVE-2023-44487 - https://github.com/projectcontour/contour/pull/5826
|
||
|
CVE-2023-44487 - https://github.com/tempesta-tech/tempesta/issues/1986
|
||
|
CVE-2023-44487 - https://github.com/varnishcache/varnish-cache/issues/3996
|
||
|
CVE-2023-44487 - https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
|
||
|
CVE-2023-4451 - https://huntr.dev/bounties/4e111c3e-6cf3-4b4c-b3c1-a540bf30f8fa
|
||
|
CVE-2023-4453 - https://huntr.dev/bounties/245a8785-0fc0-4561-b181-fa20f869d993
|
||
|
CVE-2023-4454 - https://huntr.dev/bounties/4ee0ef74-e4d4-46e7-a05c-076bce522299
|
||
|
CVE-2023-4455 - https://huntr.dev/bounties/5ab1b206-5fe8-4737-b275-d705e76f193a
|
||
|
CVE-2023-4462 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-4463 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-4464 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-4465 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-4466 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-4466 - https://vuldb.com/?id.249259
|
||
|
CVE-2023-4467 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-4468 - https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
|
||
|
CVE-2023-44694 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-7000_rce_%20mailrecvview.md
|
||
|
CVE-2023-44709 - https://github.com/sammycage/plutosvg/issues/7
|
||
|
CVE-2023-4473 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
||
|
CVE-2023-4474 - https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/
|
||
|
CVE-2023-44758 - https://github.com/sromanhu/GDidees-CMS-Stored-XSS---Title/tree/main
|
||
|
CVE-2023-44760 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---TrackingCodes
|
||
|
CVE-2023-44761 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Forms
|
||
|
CVE-2023-44762 - https://github.com/sromanhu/ConcreteCMS-Reflected-XSS---Tags
|
||
|
CVE-2023-44763 - https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail
|
||
|
CVE-2023-44764 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation
|
||
|
CVE-2023-44765 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Associations
|
||
|
CVE-2023-44766 - https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO
|
||
|
CVE-2023-44767 - https://github.com/sromanhu/RiteCMS-File-Upload--XSS---Filemanager/blob/main/README.md
|
||
|
CVE-2023-44769 - https://github.com/sromanhu/CVE-2023-44769_ZenarioCMS--Reflected-XSS---Alias/tree/main
|
||
|
CVE-2023-44769 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Alias/tree/main
|
||
|
CVE-2023-44770 - https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/blob/main/README.md
|
||
|
CVE-2023-44771 - https://github.com/sromanhu/ZenarioCMS--Stored-XSS---Page-Layout
|
||
|
CVE-2023-44796 - https://github.com/Hebing123/CVE-2023-44796/issues/1
|
||
|
CVE-2023-44796 - https://github.com/Hebing123/cve/issues/4
|
||
|
CVE-2023-44807 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug2.md
|
||
|
CVE-2023-44808 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug3.md
|
||
|
CVE-2023-44809 - https://github.com/Archerber/bug_submit/blob/main/D-Link/DIR-820l/bug1.md
|
||
|
CVE-2023-44811 - https://github.com/ahrixia/CVE-2023-44811
|
||
|
CVE-2023-44812 - https://github.com/ahrixia/CVE-2023-44812
|
||
|
CVE-2023-44813 - https://github.com/ahrixia/CVE-2023-44813
|
||
|
CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/195
|
||
|
CVE-2023-44821 - https://github.com/kohler/gifsicle/issues/65
|
||
|
CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133365547?spm=1001.2014.3001.5501
|
||
|
CVE-2023-44846 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
|
||
|
CVE-2023-44847 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
|
||
|
CVE-2023-44848 - https://blog.csdn.net/2301_79997870/article/details/133661890?spm=1001.2014.3001.5502
|
||
|
CVE-2023-44860 - https://github.com/adhikara13/CVE/blob/main/netis_N3/Improper%20Authentication%20Mechanism%20Leading%20to%20Denial-of-Service%20(DoS).md
|
||
|
CVE-2023-44954 - https://github.com/Ciber-Mike/BigTree_CMS-Stored_XSS-Developer_Settings/blob/main/README.md
|
||
|
CVE-2023-44961 - https://github.com/ggb0n/CVE-2023-44961
|
||
|
CVE-2023-44962 - https://github.com/ggb0n/CVE-2023-44962
|
||
|
CVE-2023-4504 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
|
||
|
CVE-2023-4504 - https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
|
||
|
CVE-2023-4504 - https://takeonme.org/cves/CVE-2023-4504.html
|
||
|
CVE-2023-4505 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313
|
||
|
CVE-2023-4506 - https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313
|
||
|
CVE-2023-45075 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-45076 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-45077 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-45078 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-45079 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a
|
||
|
CVE-2023-4508 - https://github.com/gerbv/gerbv/commit/dfb5aac533a3f9e8ccd93ca217a753258cba4fe5
|
||
|
CVE-2023-4508 - https://github.com/gerbv/gerbv/issues/191
|
||
|
CVE-2023-4511 - https://gitlab.com/wireshark/wireshark/-/issues/19258
|
||
|
CVE-2023-4512 - https://gitlab.com/wireshark/wireshark/-/issues/19144
|
||
|
CVE-2023-4513 - https://gitlab.com/wireshark/wireshark/-/issues/19259
|
||
|
CVE-2023-45139 - https://github.com/fonttools/fonttools/security/advisories/GHSA-6673-4983-2vx5
|
||
|
CVE-2023-45142 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr
|
||
|
CVE-2023-45146 - https://securitylab.github.com/advisories/GHSL-2023-052_XXL-RPC/
|
||
|
CVE-2023-45152 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-jj9g-75wf-6ppf
|
||
|
CVE-2023-45160 - https://www.1e.com/vulnerability-disclosure-policy/
|
||
|
CVE-2023-4517 - https://huntr.dev/bounties/508d1d21-c45d-47ff-833f-50c671882e51
|
||
|
CVE-2023-45208 - https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection
|
||
|
CVE-2023-45228 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
||
|
CVE-2023-45228 - https://www.sielco.org/en/contacts
|
||
|
CVE-2023-45229 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-4523 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-01
|
||
|
CVE-2023-45230 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-45231 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-45232 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-45233 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-45234 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-45235 - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
|
||
|
CVE-2023-45252 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/
|
||
|
CVE-2023-45253 - https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/
|
||
|
CVE-2023-45277 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
||
|
CVE-2023-45278 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
||
|
CVE-2023-45279 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
||
|
CVE-2023-45280 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
||
|
CVE-2023-45281 - https://www.linkedin.com/pulse/yamcs-vulnerability-assessment-visionspace-technologies
|
||
|
CVE-2023-45303 - https://herolab.usd.de/security-advisories/usd-2023-0010/
|
||
|
CVE-2023-45312 - https://medium.com/@_sadshade/almost-2000-telegram-proxy-servers-are-potentially-vulnerable-to-rce-since-2018-742a455be16b
|
||
|
CVE-2023-45317 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
|
||
|
CVE-2023-45317 - https://www.sielco.org/en/contacts
|
||
|
CVE-2023-45318 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843
|
||
|
CVE-2023-45318 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1843
|
||
|
CVE-2023-4532 - https://gitlab.com/gitlab-org/gitlab/-/issues/423357
|
||
|
CVE-2023-4534 - https://vuldb.com/?id.238026
|
||
|
CVE-2023-4535 - https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651
|
||
|
CVE-2023-45357 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617
|
||
|
CVE-2023-45358 - https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617
|
||
|
CVE-2023-45375 - https://security.friendsofpresta.org/modules/2023/10/12/pireospay.html
|
||
|
CVE-2023-45376 - https://security.friendsofpresta.org/modules/2023/10/19/hicarouselspack.html
|
||
|
CVE-2023-45386 - https://security.friendsofpresta.org/modules/2023/10/12/extratabspro.html
|
||
|
CVE-2023-45396 - https://github.com/strik3r0x1/Vulns/blob/main/(IDOR)%20leads%20to%20events%20profiles%20access%20-%20Elenos.md
|
||
|
CVE-2023-4542 - https://github.com/PumpkinBridge/cve/blob/main/rce.md
|
||
|
CVE-2023-4544 - https://vuldb.com/?id.238049
|
||
|
CVE-2023-45463 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20hostname%20parameter%20leads%20to%20DOS.md
|
||
|
CVE-2023-45464 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20servDomain%20parameter%20leads%20to%20DOS.md
|
||
|
CVE-2023-45465 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ddnsDomainName%20parameter%20in%20Dynamic%20DNS%20setting.md
|
||
|
CVE-2023-45466 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20pin_host%20parameter%20in%20wps%20setting.md
|
||
|
CVE-2023-45467 - https://github.com/adhikara13/CVE/blob/main/netis_N3/blind%20command%20injection%20in%20ntpServIP%20parameter%20in%20Time%20Settings%20.md
|
||
|
CVE-2023-45468 - https://github.com/adhikara13/CVE/blob/main/netis_N3/buffer%20overflow%20in%20pingWdogIp%20parameter%20leads%20to%20DOS.md
|
||
|
CVE-2023-4547 - http://packetstormsecurity.com/files/174343/SPA-Cart-eCommerce-CMS-1.9.0.3-Cross-Site-Scripting.html
|
||
|
CVE-2023-45471 - https://github.com/itsAptx/CVE-2023-45471
|
||
|
CVE-2023-45479 - https://github.com/l3m0nade/IOTvul/blob/master/sub_49E098.md
|
||
|
CVE-2023-4548 - http://packetstormsecurity.com/files/174344/SPA-Cart-eCommerce-CMS-1.9.0.3-SQL-Injection.html
|
||
|
CVE-2023-45480 - https://github.com/l3m0nade/IOTvul/blob/master/sub_47D878.md
|
||
|
CVE-2023-45481 - https://github.com/l3m0nade/IOTvul/blob/master/SetFirewallCfg.md
|
||
|
CVE-2023-45482 - https://github.com/l3m0nade/IOTvul/blob/master/get_parentControl_list_Info.md
|
||
|
CVE-2023-45483 - https://github.com/l3m0nade/IOTvul/blob/master/compare_parentcontrol_time.md
|
||
|
CVE-2023-45484 - https://github.com/l3m0nade/IOTvul/blob/master/fromSetWifiGusetBasic.md
|
||
|
CVE-2023-45498 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html
|
||
|
CVE-2023-45498 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html
|
||
|
CVE-2023-45498 - http://seclists.org/fulldisclosure/2023/Oct/31
|
||
|
CVE-2023-45498 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/
|
||
|
CVE-2023-45499 - http://packetstormsecurity.com/files/175397/VinChin-VMWare-Backup-7.0-Hardcoded-Credential-Remote-Code-Execution.html
|
||
|
CVE-2023-45499 - http://packetstormsecurity.com/files/176289/Vinchin-Backup-And-Recovery-Command-Injection.html
|
||
|
CVE-2023-45499 - http://seclists.org/fulldisclosure/2023/Oct/31
|
||
|
CVE-2023-45499 - https://blog.leakix.net/2023/10/vinchin-backup-rce-chain/
|
||
|
CVE-2023-45510 - https://github.com/justdan96/tsMuxer/issues/778
|
||
|
CVE-2023-45511 - https://github.com/justdan96/tsMuxer/issues/780
|
||
|
CVE-2023-45540 - https://github.com/soundarkutty/HTML-Injection/blob/main/POC.md
|
||
|
CVE-2023-45542 - https://github.com/ahrixia/CVE-2023-45542
|
||
|
CVE-2023-45554 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md
|
||
|
CVE-2023-45555 - https://github.com/96xiaopang/Vulnerabilities/blob/main/zzzcms%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0_en.md
|
||
|
CVE-2023-4560 - https://huntr.dev/bounties/86f06e28-ed8d-4f96-b4ad-e47f2fe94ba6
|
||
|
CVE-2023-4561 - https://huntr.dev/bounties/d4302a0d-db62-4d76-93dd-e6e6473e057a
|
||
|
CVE-2023-45659 - https://github.com/engelsystem/engelsystem/security/advisories/GHSA-f6mm-3v2h-jm6x
|
||
|
CVE-2023-45670 - https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/
|
||
|
CVE-2023-45670 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h
|
||
|
CVE-2023-45670 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/
|
||
|
CVE-2023-45671 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/
|
||
|
CVE-2023-45672 - https://github.com/blakeblackshear/frigate/security/advisories/GHSA-qp3h-4q62-p428
|
||
|
CVE-2023-45672 - https://securitylab.github.com/advisories/GHSL-2023-190_Frigate/
|
||
|
CVE-2023-4568 - https://www.tenable.com/security/research/tra-2023-31
|
||
|
CVE-2023-45685 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
||
|
CVE-2023-45686 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
||
|
CVE-2023-45687 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
||
|
CVE-2023-45688 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
||
|
CVE-2023-45689 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
||
|
CVE-2023-45690 - https://www.rapid7.com/blog/post/2023/10/16/multiple-vulnerabilities-in-south-river-technologies-titan-mft-and-titan-sftp-fixed/
|
||
|
CVE-2023-45779 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962
|
||
|
CVE-2023-45779 - https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html
|
||
|
CVE-2023-45805 - https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9
|
||
|
CVE-2023-45805 - https://peps.python.org/pep-0440/#post-release-spelling
|
||
|
CVE-2023-45811 - https://github.com/relative/synchrony/security/advisories/GHSA-jg82-xh3w-rhxx
|
||
|
CVE-2023-45813 - https://github.com/DedSecInside/TorBot/security/advisories/GHSA-72qw-p7hh-m3ff
|
||
|
CVE-2023-4582 - https://bugzilla.mozilla.org/show_bug.cgi?id=1773874
|
||
|
CVE-2023-45820 - https://github.com/directus/directus/security/advisories/GHSA-hmgw-9jrg-hf2m
|
||
|
CVE-2023-45827 - https://github.com/clickbar/dot-diver/security/advisories/GHSA-9w5f-mw3p-pj47
|
||
|
CVE-2023-45838 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
||
|
CVE-2023-45839 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
||
|
CVE-2023-45840 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
||
|
CVE-2023-45841 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
||
|
CVE-2023-45842 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
|
||
|
CVE-2023-45852 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_RCE.md
|
||
|
CVE-2023-45862 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5
|
||
|
CVE-2023-45863 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3
|
||
|
CVE-2023-45866 - https://github.com/skysafe/reblog/tree/main/cve-2023-45866
|
||
|
CVE-2023-45867 - https://rehmeinfosec.de/labor/cve-2023-45867
|
||
|
CVE-2023-45868 - https://rehmeinfosec.de/labor/cve-2023-45867
|
||
|
CVE-2023-45869 - https://rehmeinfosec.de/labor/cve-2023-45869
|
||
|
CVE-2023-45878 - https://herolab.usd.de/security-advisories/usd-2023-0025/
|
||
|
CVE-2023-45879 - https://herolab.usd.de/security-advisories/usd-2023-0019/
|
||
|
CVE-2023-45880 - https://herolab.usd.de/security-advisories/usd-2023-0022/
|
||
|
CVE-2023-45881 - https://herolab.usd.de/security-advisories/usd-2023-0024/
|
||
|
CVE-2023-45887 - http://packetstormsecurity.com/files/177135/DS-Wireless-Communication-Code-Execution.html
|
||
|
CVE-2023-45889 - https://blog.zerdle.net/classlink/
|
||
|
CVE-2023-45889 - https://blog.zerdle.net/classlink2/
|
||
|
CVE-2023-45892 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45892.md
|
||
|
CVE-2023-45893 - https://github.com/Oracle-Security/CVEs/blob/main/FloorsightSoftware/CVE-2023-45893.md
|
||
|
CVE-2023-45897 - https://dfir.ru/2023/11/01/cve-2023-45897-a-vulnerability-in-the-linux-exfat-userspace-tools/
|
||
|
CVE-2023-45898 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4
|
||
|
CVE-2023-4596 - https://www.exploit-db.com/exploits/51664
|
||
|
CVE-2023-4597 - http://packetstormsecurity.com/files/174604/WordPress-Slimstat-Analytics-5.0.9-Cross-Site-Scripting-SQL-Injection.html
|
||
|
CVE-2023-45990 - https://github.com/PwnCYN/Wenwenai/issues/2
|
||
|
CVE-2023-45992 - https://github.com/harry935/CVE-2023-45992
|
||
|
CVE-2023-46001 - https://github.com/gpac/gpac/issues/2629
|
||
|
CVE-2023-46004 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/Arbitrary-File-Upload-Vulnerability.md
|
||
|
CVE-2023-46005 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability.md
|
||
|
CVE-2023-46006 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-2.md
|
||
|
CVE-2023-46007 - https://github.com/zerrr0/Zerrr0_Vulnerability/blob/main/Best%20Courier%20Management%20System%201.0/SQL-Injection-Vulnerability-3.md
|
||
|
CVE-2023-46009 - https://github.com/kohler/gifsicle/issues/196
|
||
|
CVE-2023-46010 - https://blog.csdn.net/DGS666/article/details/133795200?spm=1001.2014.3001.5501
|
||
|
CVE-2023-46014 - https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
||
|
CVE-2023-46015 - https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
|
||
|
CVE-2023-46016 - https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
|
||
|
CVE-2023-46017 - https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
||
|
CVE-2023-46018 - https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
||
|
CVE-2023-46019 - https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
|
||
|
CVE-2023-46020 - https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability
|
||
|
CVE-2023-46021 - https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
|
||
|
CVE-2023-46022 - https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability
|
||
|
CVE-2023-46023 - https://github.com/ersinerenler/Code-Projects-Simple-Task-List-1.0/blob/main/CVE-2023-46023-Code-Projects-Simple-Task-List-1.0-SQL-Injection-Vulnerability.md
|
||
|
CVE-2023-46024 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46024-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md
|
||
|
CVE-2023-46025 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46025-phpgurukul-Teacher-Subject-Allocation-Management-System-1.0-SQL-Injection-Vulnerability.md
|
||
|
CVE-2023-46026 - https://github.com/ersinerenler/phpgurukul-Teacher-Subject-Allocation-Management-System-1.0/blob/main/CVE-2023-46026-PHPGurukul-Teacher-Subject-Allocation-Management-System-1.0-Stored-Cross-Site-Scripting-Vulnerability.md
|
||
|
CVE-2023-46055 - https://gist.github.com/GroundCTL2MajorTom/eef0d55f5df77cc911d84392acdbf625
|
||
|
CVE-2023-46058 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/Stored_XSS_in_group.php.md
|
||
|
CVE-2023-46059 - https://github.com/CrownZTX/vulnerabilities/blob/main/geeklog/reflected_XSS_in_editservice.md
|
||
|
CVE-2023-46116 - https://github.com/tutao/tutanota/security/advisories/GHSA-mxgj-pq62-f644
|
||
|
CVE-2023-46118 - https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg
|
||
|
CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/issues/1062
|
||
|
CVE-2023-46120 - https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h
|
||
|
CVE-2023-46132 - https://github.com/hyperledger/fabric/security/advisories/GHSA-v9w2-543f-h69m
|
||
|
CVE-2023-46139 - https://github.com/tiann/KernelSU/security/advisories/GHSA-86cp-3prf-pwqq
|
||
|
CVE-2023-4620 - https://wpscan.com/vulnerability/084e9494-2f9e-4420-9bf7-78a1a41433d7
|
||
|
CVE-2023-4622 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-4623 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-4624 - https://huntr.dev/bounties/9ce5cef6-e546-44e7-addf-a2726fa4e60c
|
||
|
CVE-2023-46245 - https://github.com/kimai/kimai/security/advisories/GHSA-fjhg-96cp-6fcw
|
||
|
CVE-2023-46246 - https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm
|
||
|
CVE-2023-46256 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-5hvv-q2r5-rppw
|
||
|
CVE-2023-46277 - https://github.com/rustsec/advisory-db/pull/1798
|
||
|
CVE-2023-46316 - http://packetstormsecurity.com/files/176660/Traceroute-2.1.2-Privilege-Escalation.html
|
||
|
CVE-2023-46324 - https://www.gsma.com/security/wp-content/uploads/2023/10/0073-invalid_curve.pdf
|
||
|
CVE-2023-46331 - https://github.com/WebAssembly/wabt/issues/2310
|
||
|
CVE-2023-46332 - https://github.com/WebAssembly/wabt/issues/2311
|
||
|
CVE-2023-4634 - https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz
|
||
|
CVE-2023-4634 - https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/
|
||
|
CVE-2023-46344 - https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS
|
||
|
CVE-2023-46346 - https://security.friendsofpresta.org/modules/2023/10/24/exportproducts.html
|
||
|
CVE-2023-46347 - https://security.friendsofpresta.org/modules/2023/10/24/ndk_steppingpack.html
|
||
|
CVE-2023-46356 - https://security.friendsofpresta.org/modules/2023/10/26/csvfeeds-89.html
|
||
|
CVE-2023-46358 - https://security.friendsofpresta.org/modules/2023/10/24/referralbyphone.html
|
||
|
CVE-2023-46361 - https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md
|
||
|
CVE-2023-46362 - https://github.com/agl/jbig2enc/issues/84
|
||
|
CVE-2023-46363 - https://github.com/agl/jbig2enc/issues/85
|
||
|
CVE-2023-46380 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html
|
||
|
CVE-2023-46381 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html
|
||
|
CVE-2023-46382 - http://packetstormsecurity.com/files/175646/LOYTEC-Electronics-Insecure-Transit-Insecure-Permissions-Unauthenticated-Access.html
|
||
|
CVE-2023-46383 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html
|
||
|
CVE-2023-46384 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html
|
||
|
CVE-2023-46385 - https://packetstormsecurity.com/files/175951/Loytec-LINX-Configurator-7.4.10-Insecure-Transit-Cleartext-Secrets.html
|
||
|
CVE-2023-46386 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
||
|
CVE-2023-46387 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
||
|
CVE-2023-46388 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
||
|
CVE-2023-46389 - http://packetstormsecurity.com/files/175952/Loytec-L-INX-Automation-Servers-Information-Disclosure-Cleartext-Secrets.html
|
||
|
CVE-2023-46402 - https://gist.github.com/6en6ar/7c2424c93e7fbf2b6fc44e7fb9acb95d
|
||
|
CVE-2023-46404 - https://github.com/windecks/CVE-2023-46404
|
||
|
CVE-2023-46445 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
|
||
|
CVE-2023-46445 - https://github.com/advisories/GHSA-cfc2-wr2v-gxm5
|
||
|
CVE-2023-46445 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
|
||
|
CVE-2023-46445 - https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5
|
||
|
CVE-2023-46446 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
|
||
|
CVE-2023-46446 - https://github.com/advisories/GHSA-c35q-ffpf-5qpm
|
||
|
CVE-2023-46446 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
|
||
|
CVE-2023-46446 - https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm
|
||
|
CVE-2023-46448 - https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/
|
||
|
CVE-2023-46449 - https://github.com/sajaljat/CVE-2023-46449/tree/main
|
||
|
CVE-2023-46449 - https://www.youtube.com/watch?v=H5QnsOKjs3s
|
||
|
CVE-2023-46450 - https://github.com/yte121/-CVE-2023-46450/
|
||
|
CVE-2023-46450 - https://youtu.be/LQy0_xIK2q0
|
||
|
CVE-2023-46451 - https://github.com/sajaljat/CVE-2023-46451
|
||
|
CVE-2023-46451 - https://youtu.be/f8B3_m5YfqI
|
||
|
CVE-2023-46468 - https://www.sumor.top/index.php/archives/875/
|
||
|
CVE-2023-46475 - https://github.com/elementalSec/CVE-Disclosures/blob/main/ZentaoPMS/CVE-2023-46475/CVE-2023-46475%20-%20Cross-Site%20Scripting%20(Stored).md
|
||
|
CVE-2023-46478 - https://github.com/mr-xmen786/CVE-2023-46478/tree/main
|
||
|
CVE-2023-46480 - https://github.com/shahzaibak96/CVE-2023-46480
|
||
|
CVE-2023-46484 - https://815yang.github.io/2023/10/29/x6000r/setLedCfg/TOTOlink%20X6000R%20setLedCfg%20e/
|
||
|
CVE-2023-46485 - https://815yang.github.io/2023/10/29/x6000r/TOTOlink%20X6000R%20V9.1.0cu.2350_B20230313-rsetTracerouteCfg/
|
||
|
CVE-2023-4649 - https://huntr.dev/bounties/069bb1f3-0805-480d-a6e1-b3345cdc60f3
|
||
|
CVE-2023-46490 - https://gist.github.com/ISHGARD-2/a95632111138fcd7ccf7432ccb145b53
|
||
|
CVE-2023-4650 - https://huntr.dev/bounties/d92e8985-9d9d-4a62-92e8-ada014ee3b17
|
||
|
CVE-2023-4651 - https://huntr.dev/bounties/beba9b98-2a5c-4629-987d-b67f47ba9437
|
||
|
CVE-2023-4652 - https://huntr.dev/bounties/7869e4af-fad9-48c3-9e4f-c949e54cbb41
|
||
|
CVE-2023-4653 - https://huntr.dev/bounties/e0bf7e95-fc8c-4fd4-8575-8b46b9431c6d
|
||
|
CVE-2023-4654 - https://huntr.dev/bounties/56432a75-af43-4b1a-9307-bd8de568351b
|
||
|
CVE-2023-4655 - https://huntr.dev/bounties/e2189ad5-b665-4ba5-b6c4-112e58ae9a97
|
||
|
CVE-2023-46569 - https://gist.github.com/gandalf4a/afeaf8cc958f95876f0ee245b8a002e8
|
||
|
CVE-2023-46569 - https://github.com/radareorg/radare2/issues/22334
|
||
|
CVE-2023-46570 - https://gist.github.com/gandalf4a/d7fa58f1b3418ef08ad244acccc10ba6
|
||
|
CVE-2023-46570 - https://github.com/radareorg/radare2/issues/22333
|
||
|
CVE-2023-46574 - https://github.com/OraclePi/repo/blob/main/totolink%20A3700R/1/A3700R%20%20V9.1.2u.6165_20211012%20vuln.md
|
||
|
CVE-2023-4658 - https://gitlab.com/gitlab-org/gitlab/-/issues/423835
|
||
|
CVE-2023-46580 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46580-Code-Projects-Inventory-Management-1.0-Stored-Cross-Site-Scripting-Vulnerability.md
|
||
|
CVE-2023-46581 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46581-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md
|
||
|
CVE-2023-46582 - https://github.com/ersinerenler/Code-Projects-Inventory-Management-1.0/blob/main/CVE-2023-46582-Code-Projects-Inventory-Management-1.0-SQL-Injection-Vulnerability.md
|
||
|
CVE-2023-46587 - https://github.com/nasroabd/vulns/tree/main/XnView/2.51.5
|
||
|
CVE-2023-46602 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
||
|
CVE-2023-46603 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
||
|
CVE-2023-46604 - http://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-46604 - https://packetstormsecurity.com/files/175676/Apache-ActiveMQ-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-46661 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-46662 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-46663 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-46664 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-46665 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-46666 - https://www.elastic.co/community/security
|
||
|
CVE-2023-46667 - https://www.elastic.co/community/security
|
||
|
CVE-2023-46668 - https://www.elastic.co/community/security
|
||
|
CVE-2023-46672 - https://www.elastic.co/community/security
|
||
|
CVE-2023-46673 - https://www.elastic.co/community/security
|
||
|
CVE-2023-46722 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-jfxw-6c5v-c42f
|
||
|
CVE-2023-46730 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-vw6c-h82w-mvfv
|
||
|
CVE-2023-46736 - https://github.com/espocrm/espocrm/security/advisories/GHSA-g955-rwxx-jvf6
|
||
|
CVE-2023-46744 - https://github.com/Squidex/squidex/security/advisories/GHSA-xfr4-qg2v-7v5m
|
||
|
CVE-2023-46745 - https://github.com/librenms/librenms/security/advisories/GHSA-rq42-58qf-v3qx
|
||
|
CVE-2023-46747 - http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html
|
||
|
CVE-2023-4678 - https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877
|
||
|
CVE-2023-46805 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2023-4681 - https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e
|
||
|
CVE-2023-46813 - https://bugzilla.suse.com/show_bug.cgi?id=1212649
|
||
|
CVE-2023-46817 - http://seclists.org/fulldisclosure/2023/Oct/30
|
||
|
CVE-2023-46817 - https://karmainsecurity.com/KIS-2023-12
|
||
|
CVE-2023-46817 - https://karmainsecurity.com/pocs/CVE-2023-46817.php
|
||
|
CVE-2023-46818 - http://packetstormsecurity.com/files/176126/ISPConfig-3.2.11-PHP-Code-Injection.html
|
||
|
CVE-2023-46818 - http://seclists.org/fulldisclosure/2023/Dec/2
|
||
|
CVE-2023-4682 - https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c
|
||
|
CVE-2023-4683 - https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922
|
||
|
CVE-2023-46857 - https://census-labs.com/news/2023/11/08/weak-svg-asset-filtering-mechanism-in-squidex-cms/
|
||
|
CVE-2023-46858 - https://packetstormsecurity.com/files/175277/Moodle-4.3-Cross-Site-Scripting.html
|
||
|
CVE-2023-46864 - https://github.com/Peppermint-Lab/peppermint/issues/171
|
||
|
CVE-2023-46865 - https://github.com/asylumdx/Crater-CVE-2023-46865-RCE
|
||
|
CVE-2023-46865 - https://github.com/crater-invoice/crater/issues/1267
|
||
|
CVE-2023-46865 - https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html
|
||
|
CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
|
||
|
CVE-2023-46866 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
||
|
CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
|
||
|
CVE-2023-46867 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/53
|
||
|
CVE-2023-46871 - https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486
|
||
|
CVE-2023-46871 - https://github.com/gpac/gpac/issues/2658
|
||
|
CVE-2023-46889 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
||
|
CVE-2023-46892 - https://www.kth.se/cs/nse/research/software-systems-architecture-and-security/projects/ethical-hacking-1.1279219
|
||
|
CVE-2023-46916 - http://packetstormsecurity.com/files/175660
|
||
|
CVE-2023-46927 - https://github.com/gpac/gpac/issues/2657
|
||
|
CVE-2023-46928 - https://github.com/gpac/gpac/issues/2661
|
||
|
CVE-2023-46929 - https://github.com/gpac/gpac/issues/2662
|
||
|
CVE-2023-46930 - https://github.com/gpac/gpac/issues/2666
|
||
|
CVE-2023-46931 - https://github.com/gpac/gpac/issues/2664
|
||
|
CVE-2023-46932 - https://github.com/gpac/gpac/issues/2669
|
||
|
CVE-2023-46935 - https://github.com/weng-xianhu/eyoucms/issues/55
|
||
|
CVE-2023-4696 - https://huntr.dev/bounties/4747a485-77c3-4bb5-aab0-21253ef303ca
|
||
|
CVE-2023-4697 - https://huntr.dev/bounties/3ff3325a-1dcb-4da7-894d-81a9cf726d81
|
||
|
CVE-2023-46974 - https://github.com/yte121/CVE-2023-46974/
|
||
|
CVE-2023-46974 - https://youtu.be/5oVfJHT_-Ys
|
||
|
CVE-2023-46976 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20A3300R/1/README.md
|
||
|
CVE-2023-46977 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20LR1200GB/1/README.md
|
||
|
CVE-2023-46978 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/1/README.md
|
||
|
CVE-2023-46979 - https://github.com/shinypolaris/vuln-reports/blob/master/TOTOLINK%20X6000R/2/README.md
|
||
|
CVE-2023-4698 - https://huntr.dev/bounties/e1107d79-1d63-4238-90b7-5cc150512654
|
||
|
CVE-2023-46980 - https://github.com/sajaljat/CVE-2023-46980/tree/main
|
||
|
CVE-2023-46980 - https://youtu.be/3Mz2lSElg7Y
|
||
|
CVE-2023-46981 - https://github.com/JunFengDeng/Cve-List/blob/main/novel-plus/20231027/vuln/readme.md
|
||
|
CVE-2023-46987 - https://blog.csdn.net/weixin_72610998/article/details/133420747?spm=1001.2014.3001.5501
|
||
|
CVE-2023-46992 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R/readme.md
|
||
|
CVE-2023-46993 - https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%20Injection/readme.md
|
||
|
CVE-2023-46998 - https://github.com/soy-oreocato/CVE-2023-46998/
|
||
|
CVE-2023-47004 - https://github.com/RedisGraph/RedisGraph/issues/3178
|
||
|
CVE-2023-47014 - https://github.com/emirhanerdogu/CVE-2023-47014-Sticky-Notes-App-Using-PHP-with-Source-Code-v1.0-CSRF-to-CORS/blob/main/README.md
|
||
|
CVE-2023-47016 - https://gist.github.com/gandalf4a/65705be4f84269cb7cd725a1d4ab2ffa
|
||
|
CVE-2023-47016 - https://github.com/radareorg/radare2/issues/22349
|
||
|
CVE-2023-47025 - https://github.com/free5gc/free5gc/issues/501
|
||
|
CVE-2023-4704 - https://huntr.dev/bounties/4a54134d-df1f-43d4-9b14-45f023cd654a
|
||
|
CVE-2023-4707 - http://packetstormsecurity.com/files/174444/Clcknshop-1.0.0-Cross-Site-Scripting.html
|
||
|
CVE-2023-4708 - http://packetstormsecurity.com/files/174445/Clcknshop-1.0.0-SQL-Injection.html
|
||
|
CVE-2023-47091 - https://advisories.stormshield.eu/2023-024/
|
||
|
CVE-2023-47102 - https://quantiano.github.io/cve-2023-47102/
|
||
|
CVE-2023-47106 - https://github.com/traefik/traefik/security/advisories/GHSA-fvhj-4qfh-q2hm
|
||
|
CVE-2023-47108 - https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw
|
||
|
CVE-2023-47115 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-q68h-xwq5-mm7x
|
||
|
CVE-2023-47116 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-p59w-9gqw-wj8r
|
||
|
CVE-2023-47117 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw
|
||
|
CVE-2023-4712 - https://github.com/wpay65249519/cve/blob/main/SQL_injection.md
|
||
|
CVE-2023-47128 - https://github.com/piccolo-orm/piccolo/security/advisories/GHSA-xq59-7jf3-rjc6
|
||
|
CVE-2023-47130 - https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection
|
||
|
CVE-2023-4714 - http://packetstormsecurity.com/files/174446/PlayTube-3.0.1-Information-Disclosure.html
|
||
|
CVE-2023-47171 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1869
|
||
|
CVE-2023-4720 - https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad
|
||
|
CVE-2023-4721 - https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
|
||
|
CVE-2023-47218 - https://www.rapid7.com/blog/post/2024/02/13/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed/
|
||
|
CVE-2023-4722 - https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830
|
||
|
CVE-2023-47249 - https://github.com/InternationalColorConsortium/DemoIccMAX/issues/54
|
||
|
CVE-2023-47250 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
|
||
|
CVE-2023-47250 - http://seclists.org/fulldisclosure/2023/Nov/13
|
||
|
CVE-2023-47250 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/
|
||
|
CVE-2023-47251 - http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
|
||
|
CVE-2023-47251 - http://seclists.org/fulldisclosure/2023/Nov/13
|
||
|
CVE-2023-47251 - https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/
|
||
|
CVE-2023-47254 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-023.txt
|
||
|
CVE-2023-47254 - https://www.syss.de/pentest-blog/command-injection-via-cli-des-draytek-vigor167-syss-2023-023
|
||
|
CVE-2023-47256 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256
|
||
|
CVE-2023-47257 - https://web.archive.org/web/20240208140218/https://gotham-security.com/screenconnect-cve-2023-47256
|
||
|
CVE-2023-47271 - http://packetstormsecurity.com/files/176255/PKP-WAL-3.4.0-3-Remote-Code-Execution.html
|
||
|
CVE-2023-47271 - http://seclists.org/fulldisclosure/2023/Dec/23
|
||
|
CVE-2023-47308 - https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2023-11-09-newsletterpop.md
|
||
|
CVE-2023-47320 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47320
|
||
|
CVE-2023-47321 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47321
|
||
|
CVE-2023-47322 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47322
|
||
|
CVE-2023-47323 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323
|
||
|
CVE-2023-47324 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47324
|
||
|
CVE-2023-47325 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47325
|
||
|
CVE-2023-47326 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47326
|
||
|
CVE-2023-47327 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47327
|
||
|
CVE-2023-4733 - https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c
|
||
|
CVE-2023-4733 - https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217
|
||
|
CVE-2023-4734 - https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217
|
||
|
CVE-2023-47345 - https://github.com/free5gc/free5gc/issues/483
|
||
|
CVE-2023-47346 - https://github.com/free5gc/free5gc/issues/482
|
||
|
CVE-2023-47347 - https://github.com/free5gc/free5gc/issues/496
|
||
|
CVE-2023-4735 - https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51
|
||
|
CVE-2023-47350 - https://mechaneus.github.io/CVE-2023-47350.html
|
||
|
CVE-2023-47353 - https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md
|
||
|
CVE-2023-47354 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md
|
||
|
CVE-2023-47355 - https://github.com/actuator/com.eypcnnapps.quickreboot/blob/main/CWE-925.md
|
||
|
CVE-2023-4736 - https://huntr.dev/bounties/e1ce0995-4df4-4dec-9cd7-3136ac3e8e71
|
||
|
CVE-2023-4738 - https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1
|
||
|
CVE-2023-4738 - https://huntr.dev/bounties/9fc7dced-a7bb-4479-9718-f956df20f612
|
||
|
CVE-2023-47384 - https://github.com/gpac/gpac/issues/2672
|
||
|
CVE-2023-4739 - https://github.com/Meizhi-hua/cve/blob/main/upload_file.md
|
||
|
CVE-2023-47397 - https://liotree.github.io/2023/webid.html
|
||
|
CVE-2023-4740 - https://vuldb.com/?id.238629
|
||
|
CVE-2023-4744 - https://github.com/GleamingEyes/vul/blob/main/tenda_ac8/ac8_1.md
|
||
|
CVE-2023-47444 - https://0xbro.red/disclosures/disclosed-vulnerabilities/opencart-cve-2023-47444/
|
||
|
CVE-2023-47445 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47445%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20SQL%20Injection.md
|
||
|
CVE-2023-47446 - https://github.com/termanix/PHPGrukul-Pre-School-Enrollment-System-v1.0/blob/main/CVE-2023-47446%20PHPGurukul-Pre-School-Enrollment-System-v1.0%20Stored%20XSS%20Vulnerability.md
|
||
|
CVE-2023-4745 - https://github.com/Jacky-Y/vuls/blob/main/vul6.md
|
||
|
CVE-2023-47452 - https://github.com/xieqiang11/poc-1/tree/main
|
||
|
CVE-2023-47453 - https://github.com/xieqiang11/poc-2/tree/main
|
||
|
CVE-2023-47454 - https://github.com/xieqiang11/poc-3/tree/main
|
||
|
CVE-2023-47455 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/setSchedWifi.md
|
||
|
CVE-2023-47456 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1806/fromSetWirelessRepeat.md
|
||
|
CVE-2023-47462 - https://github.com/gl-inet/CVE-issues/blob/main/3.215/Arbitrary%20File%20Read%20through%20file%20share.md
|
||
|
CVE-2023-47464 - https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Arbitrary%20File%20Creation%20Through%20API%20upload.md
|
||
|
CVE-2023-47465 - https://github.com/gpac/gpac/issues/2652
|
||
|
CVE-2023-47470 - https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60
|
||
|
CVE-2023-47470 - https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael@niedermayer.cc/
|
||
|
CVE-2023-47471 - https://github.com/strukturag/libde265/issues/426
|
||
|
CVE-2023-47473 - https://github.com/THMOAS0/SSR123/blob/main/%E4%BC%81%E8%AF%ADiFair%20Any%20file%20read.pdf
|
||
|
CVE-2023-47488 - https://bugplorer.github.io/cve-xss-itop/
|
||
|
CVE-2023-47488 - https://nitipoom-jar.github.io/CVE-2023-47488/
|
||
|
CVE-2023-47489 - https://bugplorer.github.io/cve-csv-itop/
|
||
|
CVE-2023-47489 - https://nitipoom-jar.github.io/CVE-2023-47489/
|
||
|
CVE-2023-4749 - https://skypoc.wordpress.com/2023/09/03/%e3%80%90code-audit%e3%80%91open-source-ample-inventory-management-system-v1-0-by-mayuri_k-has-a-file-inclusion-vulnerability/
|
||
|
CVE-2023-4750 - https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed
|
||
|
CVE-2023-4750 - https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea
|
||
|
CVE-2023-4751 - https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378
|
||
|
CVE-2023-4752 - https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139
|
||
|
CVE-2023-4752 - https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757
|
||
|
CVE-2023-4754 - https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
|
||
|
CVE-2023-4755 - https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
|
||
|
CVE-2023-4756 - https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05
|
||
|
CVE-2023-4758 - https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6
|
||
|
CVE-2023-4759 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11
|
||
|
CVE-2023-47619 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/
|
||
|
CVE-2023-47620 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/
|
||
|
CVE-2023-47623 - https://securitylab.github.com/advisories/GHSL-2023-218_GHSL-2023-219_scrypted/
|
||
|
CVE-2023-47624 - https://securitylab.github.com/advisories/GHSL-2023-203_GHSL-2023-204_audiobookshelf/
|
||
|
CVE-2023-47625 - https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82
|
||
|
CVE-2023-47627 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg
|
||
|
CVE-2023-47628 - https://github.com/datahub-project/datahub/security/advisories/GHSA-75p8-rgh2-r9mx
|
||
|
CVE-2023-47629 - https://github.com/datahub-project/datahub/security/advisories/GHSA-vj59-23ww-p6c8
|
||
|
CVE-2023-47633 - https://github.com/traefik/traefik/security/advisories/GHSA-6fwg-jrfw-ff7p
|
||
|
CVE-2023-47637 - https://github.com/pimcore/pimcore/security/advisories/GHSA-72hh-xf79-429p
|
||
|
CVE-2023-47640 - https://github.com/datahub-project/datahub/security/advisories/GHSA-fg9x-wvqw-6gmw
|
||
|
CVE-2023-47641 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j
|
||
|
CVE-2023-47643 - https://github.com/salesagility/SuiteCRM-Core/security/advisories/GHSA-fxww-jqfv-9rrr
|
||
|
CVE-2023-4777 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-4778 - https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397
|
||
|
CVE-2023-47800 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2023-006.txt
|
||
|
CVE-2023-47804 - https://www.openoffice.org/security/cves/CVE-2023-47804.html
|
||
|
CVE-2023-4781 - https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93
|
||
|
CVE-2023-4781 - https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883
|
||
|
CVE-2023-47861 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1884
|
||
|
CVE-2023-47861 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1884
|
||
|
CVE-2023-47882 - https://github.com/actuator/yi/blob/main/CWE-319.md
|
||
|
CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/AFC-POC.apk
|
||
|
CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/CWE-94.md
|
||
|
CVE-2023-47883 - https://github.com/actuator/com.altamirano.fabricio.tvbrowser/blob/main/TVBrowserDemo.gif
|
||
|
CVE-2023-47889 - https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md
|
||
|
CVE-2023-47890 - https://github.com/pyload/pyload/security/advisories/GHSA-h73m-pcfw-25h2
|
||
|
CVE-2023-47992 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47992
|
||
|
CVE-2023-47993 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47993
|
||
|
CVE-2023-47994 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47994
|
||
|
CVE-2023-47995 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47995
|
||
|
CVE-2023-47996 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47996
|
||
|
CVE-2023-47997 - https://github.com/thelastede/FreeImage-cve-poc/tree/master/CVE-2023-47997
|
||
|
CVE-2023-48003 - https://docs.unsafe-inline.com/0day/asp.net-zero-v12.3.0-html-injection-leads-to-open-redirect-via-websockets-cve-2023-48003
|
||
|
CVE-2023-48003 - https://github.com/passtheticket/vulnerability-research/blob/main/aspnetzero_html_injection_via_websockets_messages.md
|
||
|
CVE-2023-48011 - https://github.com/gpac/gpac/issues/2611
|
||
|
CVE-2023-48013 - https://github.com/gpac/gpac/issues/2612
|
||
|
CVE-2023-48014 - https://github.com/gpac/gpac/issues/2613
|
||
|
CVE-2023-48016 - https://github.com/Serhatcck/cves/blob/main/CVE-2023-48016-restaurant-table-booking-system-SQLInjection.md
|
||
|
CVE-2023-48028 - https://nitipoom-jar.github.io/CVE-2023-48028/
|
||
|
CVE-2023-48029 - https://nitipoom-jar.github.io/CVE-2023-48029/
|
||
|
CVE-2023-48031 - https://nitipoom-jar.github.io/CVE-2023-48031/
|
||
|
CVE-2023-48039 - https://github.com/gpac/gpac/issues/2679
|
||
|
CVE-2023-48049 - https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog
|
||
|
CVE-2023-48050 - https://github.com/luvsn/OdZoo/tree/main/exploits/odoo-biometric-attendance
|
||
|
CVE-2023-48058 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20task%20management%20execution%20task%20location.md
|
||
|
CVE-2023-48060 - https://github.com/CP1379767017/cms/blob/main/CSRF%20exists%20at%20the%20location%20where%20task%20management%20adds%20tasks.md
|
||
|
CVE-2023-48063 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/There%20is%20a%20CSRF%20vulnerability%20at%20th%20menu%20management%20location.md
|
||
|
CVE-2023-48068 - https://github.com/CP1379767017/cms/blob/dreamcms_vul/dedevCMS/dedeCMS_XSS.md
|
||
|
CVE-2023-48078 - https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC
|
||
|
CVE-2023-48090 - https://github.com/gpac/gpac/issues/2680
|
||
|
CVE-2023-4810 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2023-48104 - https://github.com/E1tex/CVE-2023-48104
|
||
|
CVE-2023-48105 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/2726
|
||
|
CVE-2023-48106 - https://github.com/zlib-ng/minizip-ng/issues/740
|
||
|
CVE-2023-48107 - https://github.com/zlib-ng/minizip-ng/issues/739
|
||
|
CVE-2023-48118 - https://github.com/el-dud3rino/CVE-Disclosures/blob/main/Quest%20Analytics%20IQCRM/Proof%20of%20Concept
|
||
|
CVE-2023-48121 - https://joerngermany.github.io/ezviz_vulnerability/
|
||
|
CVE-2023-48122 - https://github.com/microweber/microweber/issues/1042
|
||
|
CVE-2023-4814 - https://kcm.trellix.com/corporate/index?page=content&id=SB10407
|
||
|
CVE-2023-4815 - https://huntr.dev/bounties/4cd3eeb4-57c9-4af2-ad19-2166c9e0fd2c
|
||
|
CVE-2023-4816 - https://images.go.hitachienergy.com/Web/ABBEnterpriseSoftware/%7B70b3d323-4866-42e1-8a75-58996729c1d4%7D_8DBD000172-VU-2023-23_Asset_Suite_Tagout_vulnerability_Rev1.pdf
|
||
|
CVE-2023-48161 - https://github.com/tacetool/TACE#cve-2023-48161
|
||
|
CVE-2023-48161 - https://sourceforge.net/p/giflib/bugs/167/
|
||
|
CVE-2023-48172 - http://packetstormsecurity.com/files/175800
|
||
|
CVE-2023-4818 - https://blog.stmcyber.com/pax-pos-cves-2023/
|
||
|
CVE-2023-48192 - https://github.com/zxsssd/TotoLink-
|
||
|
CVE-2023-48197 - https://nitipoom-jar.github.io/CVE-2023-48197/
|
||
|
CVE-2023-48198 - https://nitipoom-jar.github.io/CVE-2023-48198
|
||
|
CVE-2023-48199 - https://nitipoom-jar.github.io/CVE-2023-48199/
|
||
|
CVE-2023-48200 - https://nitipoom-jar.github.io/CVE-2023-48200/
|
||
|
CVE-2023-48201 - https://mechaneus.github.io/CVE-2023-48201.html
|
||
|
CVE-2023-48202 - https://mechaneus.github.io/CVE-2023-48202.html
|
||
|
CVE-2023-48205 - http://packetstormsecurity.com/files/175802
|
||
|
CVE-2023-48206 - http://packetstormsecurity.com/files/175803
|
||
|
CVE-2023-48207 - http://packetstormsecurity.com/files/175804
|
||
|
CVE-2023-48208 - http://packetstormsecurity.com/files/175805
|
||
|
CVE-2023-48223 - https://github.com/nearform/fast-jwt/security/advisories/GHSA-c2ff-88x2-x9pg
|
||
|
CVE-2023-48225 - https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp
|
||
|
CVE-2023-48226 - https://bugcrowd.com/vulnerability-rating-taxonomy
|
||
|
CVE-2023-48226 - https://github.com/openreplay/openreplay/security/advisories/GHSA-xpfv-454c-3fj4
|
||
|
CVE-2023-48238 - https://github.com/joaquimserafim/json-web-token/security/advisories/GHSA-4xw9-cx39-r355
|
||
|
CVE-2023-4829 - https://huntr.dev/bounties/babd73ca-6c80-4145-8c7d-33a883fe606b
|
||
|
CVE-2023-48294 - https://github.com/librenms/librenms/security/advisories/GHSA-fpq5-4vwm-78x4
|
||
|
CVE-2023-48295 - https://github.com/librenms/librenms/security/advisories/GHSA-8phr-637g-pxrg
|
||
|
CVE-2023-48300 - https://github.com/epiphyt/embed-privacy/security/advisories/GHSA-3wv9-4rvf-w37g
|
||
|
CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
|
||
|
CVE-2023-48310 - https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm
|
||
|
CVE-2023-48312 - https://github.com/projectcapsule/capsule-proxy/security/advisories/GHSA-fpvw-6m5v-hqfp
|
||
|
CVE-2023-4836 - https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc
|
||
|
CVE-2023-48418 - http://packetstormsecurity.com/files/176446/Android-DeviceVersionFragment.java-Privilege-Escalation.html
|
||
|
CVE-2023-4847 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/
|
||
|
CVE-2023-4848 - https://skypoc.wordpress.com/2023/09/04/sourcecodester-simple-book-catalog-app-v1-0-has-multiple-vulnerabilities/
|
||
|
CVE-2023-4850 - https://vuldb.com/?id.239259
|
||
|
CVE-2023-4858 - https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md
|
||
|
CVE-2023-4863 - https://blog.isosceles.com/the-webp-0day/
|
||
|
CVE-2023-4863 - https://bugzilla.suse.com/show_bug.cgi?id=1215231
|
||
|
CVE-2023-4863 - https://news.ycombinator.com/item?id=37478403
|
||
|
CVE-2023-4863 - https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
|
||
|
CVE-2023-4864 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/
|
||
|
CVE-2023-4865 - https://skypoc.wordpress.com/2023/09/05/sourcecodester-take-note-app-v1-0-has-multiple-vulnerabilities/
|
||
|
CVE-2023-4865 - https://vuldb.com/?id.239350
|
||
|
CVE-2023-48654 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/
|
||
|
CVE-2023-4868 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
||
|
CVE-2023-4869 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
||
|
CVE-2023-4870 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
||
|
CVE-2023-48702 - https://securitylab.github.com/advisories/GHSL-2023-028_jellyfin/
|
||
|
CVE-2023-48706 - https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
|
||
|
CVE-2023-4871 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
||
|
CVE-2023-48711 - https://github.com/cjvnjde/google-translate-api-browser/security/advisories/GHSA-4233-7q5q-m7p6
|
||
|
CVE-2023-48712 - https://github.com/warp-tech/warpgate/security/advisories/GHSA-c94j-vqr5-3mxr
|
||
|
CVE-2023-4872 - https://skypoc.wordpress.com/2023/09/05/vuln1/
|
||
|
CVE-2023-48728 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1883
|
||
|
CVE-2023-48728 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1883
|
||
|
CVE-2023-4873 - https://github.com/cugerQDHJ/cve/blob/main/rce.md
|
||
|
CVE-2023-48730 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882
|
||
|
CVE-2023-48730 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1882
|
||
|
CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137
|
||
|
CVE-2023-48733 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139
|
||
|
CVE-2023-48733 - https://www.openwall.com/lists/oss-security/2024/02/14/4
|
||
|
CVE-2023-48736 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/58
|
||
|
CVE-2023-4876 - https://huntr.dev/bounties/f729d2c8-a62e-4f30-ac24-e187b0a7892a
|
||
|
CVE-2023-4877 - https://huntr.dev/bounties/168e9299-f8ff-40d6-9def-d097b38bad84
|
||
|
CVE-2023-4878 - https://huntr.dev/bounties/655c4f77-04b2-4220-bfaf-a4d99fe86703
|
||
|
CVE-2023-4879 - https://huntr.dev/bounties/7df6b167-3c39-4563-9b8a-33613e25cf27
|
||
|
CVE-2023-48795 - http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
|
||
|
CVE-2023-48795 - https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
|
||
|
CVE-2023-48795 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
|
||
|
CVE-2023-48795 - https://www.paramiko.org/changelog.html
|
||
|
CVE-2023-48795 - https://www.theregister.com/2023/12/20/terrapin_attack_ssh
|
||
|
CVE-2023-48813 - https://github.com/slims/slims9_bulian/issues/217
|
||
|
CVE-2023-48823 - http://packetstormsecurity.com/files/176030
|
||
|
CVE-2023-48824 - http://packetstormsecurity.com/files/176031
|
||
|
CVE-2023-48825 - http://packetstormsecurity.com/files/176033
|
||
|
CVE-2023-48826 - http://packetstormsecurity.com/files/176034
|
||
|
CVE-2023-48827 - http://packetstormsecurity.com/files/176036
|
||
|
CVE-2023-48828 - http://packetstormsecurity.com/files/176037
|
||
|
CVE-2023-48830 - http://packetstormsecurity.com/files/176038
|
||
|
CVE-2023-48831 - http://packetstormsecurity.com/files/176039
|
||
|
CVE-2023-48833 - http://packetstormsecurity.com/files/176042
|
||
|
CVE-2023-48834 - http://packetstormsecurity.com/files/176043
|
||
|
CVE-2023-48835 - http://packetstormsecurity.com/files/176045
|
||
|
CVE-2023-48836 - http://packetstormsecurity.com/files/176046
|
||
|
CVE-2023-48837 - http://packetstormsecurity.com/files/176048
|
||
|
CVE-2023-48838 - http://packetstormsecurity.com/files/176054
|
||
|
CVE-2023-48839 - http://packetstormsecurity.com/files/176055
|
||
|
CVE-2023-48840 - http://packetstormsecurity.com/files/176056
|
||
|
CVE-2023-48841 - http://packetstormsecurity.com/files/176058
|
||
|
CVE-2023-48849 - https://github.com/delsploit/CVE-2023-48849
|
||
|
CVE-2023-48858 - https://github.com/Shumerez/CVE-2023-48858
|
||
|
CVE-2023-48861 - https://github.com/xieqiang11/POC4/blob/main/README.md
|
||
|
CVE-2023-48866 - https://nitipoom-jar.github.io/CVE-2023-48866/
|
||
|
CVE-2023-48886 - https://github.com/luxiaoxun/NettyRpc/issues/53
|
||
|
CVE-2023-48887 - https://github.com/fengjiachun/Jupiter/issues/115
|
||
|
CVE-2023-48893 - https://github.com/slims/slims9_bulian/issues/209
|
||
|
CVE-2023-48894 - https://github.com/jishenghua/jshERP/issues/98
|
||
|
CVE-2023-48910 - https://gist.github.com/b33t1e/2a2dc17cf36cd741b2c99425c892d826
|
||
|
CVE-2023-48912 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20article%20management%20modification%20section.md
|
||
|
CVE-2023-48913 - https://github.com/Tiamat-ron/cms/blob/main/The%20deletion%20function%20of%20the%20Article%20Management%20Office%20exists%20in%20CSRF.md
|
||
|
CVE-2023-48914 - https://github.com/Tiamat-ron/cms/blob/main/There%20is%20a%20csrf%20in%20the%20newly%20added%20section%20of%20article%20management.md
|
||
|
CVE-2023-48925 - https://security.friendsofpresta.org/modules/2023/12/07/bavideotab.html
|
||
|
CVE-2023-48928 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928
|
||
|
CVE-2023-48929 - https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48929
|
||
|
CVE-2023-48945 - https://github.com/openlink/virtuoso-opensource/issues/1172
|
||
|
CVE-2023-48946 - https://github.com/openlink/virtuoso-opensource/issues/1178
|
||
|
CVE-2023-48947 - https://github.com/openlink/virtuoso-opensource/issues/1179
|
||
|
CVE-2023-48948 - https://github.com/openlink/virtuoso-opensource/issues/1176
|
||
|
CVE-2023-48949 - https://github.com/openlink/virtuoso-opensource/issues/1173
|
||
|
CVE-2023-48950 - https://github.com/openlink/virtuoso-opensource/issues/1174
|
||
|
CVE-2023-48951 - https://github.com/openlink/virtuoso-opensource/issues/1177
|
||
|
CVE-2023-48952 - https://github.com/openlink/virtuoso-opensource/issues/1175
|
||
|
CVE-2023-48958 - https://github.com/gpac/gpac/issues/2689
|
||
|
CVE-2023-48963 - https://github.com/daodaoshao/vul_tenda_i6_1
|
||
|
CVE-2023-48964 - https://github.com/daodaoshao/vul_tenda_i6_2
|
||
|
CVE-2023-48967 - https://github.com/noear/solon/issues/226
|
||
|
CVE-2023-4897 - https://huntr.dev/bounties/0631af48-84a3-4019-85db-f0f8b12cb0ab
|
||
|
CVE-2023-4898 - https://huntr.dev/bounties/a3dda692-7e8a-44a9-bd96-24cfd3f721d2
|
||
|
CVE-2023-4899 - https://huntr.dev/bounties/70a2fb18-f030-4abb-9ddc-13f94107ac9d
|
||
|
CVE-2023-49000 - https://github.com/actuator/com.artis.browser/blob/main/CWE-94.md
|
||
|
CVE-2023-49001 - https://github.com/actuator/com.gurry.kvbrowser/blob/main/CWE-94.md
|
||
|
CVE-2023-49002 - https://github.com/actuator/com.sinous.voice.dialer/blob/main/CWE-928.md
|
||
|
CVE-2023-49003 - https://github.com/actuator/com.simplemobiletools.dialer/blob/main/CWE-928.md
|
||
|
CVE-2023-49006 - https://github.com/Hebing123/cve/issues/5
|
||
|
CVE-2023-49006 - https://huntr.com/bounties/ca6d669f-fd82-4188-aae2-69e08740d982/
|
||
|
CVE-2023-49032 - https://github.com/ltb-project/self-service-password/issues/816
|
||
|
CVE-2023-49040 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_internet_set.md
|
||
|
CVE-2023-49042 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/setSchedWifi.md
|
||
|
CVE-2023-49043 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md
|
||
|
CVE-2023-49044 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/form_fast_setting_wifi_set.md
|
||
|
CVE-2023-49046 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md
|
||
|
CVE-2023-49047 - https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formSetDeviceName.md
|
||
|
CVE-2023-49052 - https://github.com/Cyber-Wo0dy/CVE-2023-49052
|
||
|
CVE-2023-49052 - https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload
|
||
|
CVE-2023-49070 - http://packetstormsecurity.com/files/176323/Apache-OFBiz-18.12.09-Remote-Code-Execution.html
|
||
|
CVE-2023-49076 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-xx63-4jr8-9ghc
|
||
|
CVE-2023-49078 - https://github.com/zediious/raptor-web/security/advisories/GHSA-8r6g-fhh4-xhmq
|
||
|
CVE-2023-49079 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-3f39-6537-3cgc
|
||
|
CVE-2023-49081 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2
|
||
|
CVE-2023-49082 - https://gist.github.com/jnovikov/7f411ae9fe6a9a7804cf162a3bdbb44b
|
||
|
CVE-2023-49082 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-qvrw-v9rv-5rjx
|
||
|
CVE-2023-49083 - http://www.openwall.com/lists/oss-security/2023/11/29/2
|
||
|
CVE-2023-49083 - https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97
|
||
|
CVE-2023-49084 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2023-49085 - http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html
|
||
|
CVE-2023-49086 - https://github.com/Cacti/cacti/security/advisories/GHSA-wc73-r2vw-59pr
|
||
|
CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h
|
||
|
CVE-2023-49088 - https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x
|
||
|
CVE-2023-49091 - https://github.com/azukaar/Cosmos-Server/security/advisories/GHSA-hpvm-x7m8-3c6x
|
||
|
CVE-2023-49093 - https://github.com/HtmlUnit/htmlunit/security/advisories/GHSA-37vq-hr2f-g7h7
|
||
|
CVE-2023-49100 - https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-11.html
|
||
|
CVE-2023-4911 - http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html
|
||
|
CVE-2023-4911 - http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html
|
||
|
CVE-2023-4911 - http://seclists.org/fulldisclosure/2023/Oct/11
|
||
|
CVE-2023-4911 - http://www.openwall.com/lists/oss-security/2023/10/03/2
|
||
|
CVE-2023-4911 - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
|
||
|
CVE-2023-49114 - http://seclists.org/fulldisclosure/2024/Mar/10
|
||
|
CVE-2023-49114 - https://r.sec-consult.com/qognify
|
||
|
CVE-2023-4912 - https://gitlab.com/gitlab-org/gitlab/-/issues/424882
|
||
|
CVE-2023-4913 - https://huntr.dev/bounties/d2a9ec4d-1b4b-470b-87da-ec069f5925ae
|
||
|
CVE-2023-4914 - https://huntr.dev/bounties/cdd995b2-c983-428b-a73a-827b61b7c06b
|
||
|
CVE-2023-49147 - http://packetstormsecurity.com/files/176206/PDF24-Creator-11.15.1-Local-Privilege-Escalation.html
|
||
|
CVE-2023-49147 - http://seclists.org/fulldisclosure/2023/Dec/18
|
||
|
CVE-2023-49147 - https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-pdf24-creator-geek-software-gmbh/
|
||
|
CVE-2023-49210 - https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e
|
||
|
CVE-2023-49276 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-v4v2-8h88-65qj
|
||
|
CVE-2023-4928 - https://huntr.dev/bounties/cb72cc17-5a0d-4392-9a5f-a13aa773de9e
|
||
|
CVE-2023-49287 - http://packetstormsecurity.com/files/176060/TinyDir-1.2.5-Buffer-Overflow.html
|
||
|
CVE-2023-49287 - https://github.com/cxong/tinydir/security/advisories/GHSA-jf5r-wgf4-qhxf
|
||
|
CVE-2023-49290 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf
|
||
|
CVE-2023-49291 - https://securitylab.github.com/research/github-actions-untrusted-input
|
||
|
CVE-2023-49293 - https://github.com/vitejs/vite/security/advisories/GHSA-92r3-m2mg-pj97
|
||
|
CVE-2023-49294 - https://github.com/asterisk/asterisk/security/advisories/GHSA-8857-hfmw-vg8f
|
||
|
CVE-2023-49297 - https://github.com/iterative/PyDrive2/security/advisories/GHSA-v5f6-hjmf-9mc5
|
||
|
CVE-2023-49298 - https://www.theregister.com/2023/12/04/two_new_versions_of_openzfs/
|
||
|
CVE-2023-49313 - https://github.com/louiselalanne/CVE-2023-49313
|
||
|
CVE-2023-49314 - https://asana.com/pt/download
|
||
|
CVE-2023-49328 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2023-4933 - https://wpscan.com/vulnerability/882f6c36-44c6-4273-81cd-2eaaf5e81fa7
|
||
|
CVE-2023-49355 - https://github.com/linzc21/bug-reports/blob/main/reports/jq/1.7-37-g88f01a7/heap-buffer-overflow/CVE-2023-49355.md
|
||
|
CVE-2023-49356 - https://github.com/linzc21/bug-reports/blob/main/reports/mp3gain/1.6.2/stack-buffer-overflow/CVE-2023-49356.md
|
||
|
CVE-2023-49371 - https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md
|
||
|
CVE-2023-49372 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20present%20at%20the%20new%20location%20of%20the%20rotation%20image.md
|
||
|
CVE-2023-49373 - https://github.com/li-yu320/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20broadcast%20image.md
|
||
|
CVE-2023-49374 - https://github.com/li-yu320/cms/blob/main/There%20is%20CSRF%20in%20the%20rotation%20image%20editing%20section.md
|
||
|
CVE-2023-49375 - https://github.com/cui2shark/cms/blob/main/There%20is%20CSRF%20in%20the%20modification%20of%20the%20friendship%20link.md
|
||
|
CVE-2023-49376 - https://github.com/cui2shark/cms/blob/main/Delete%20existing%20CSRF%20in%20label%20management.md
|
||
|
CVE-2023-49377 - https://github.com/cui2shark/cms/blob/main/Modification%20of%20CSRF%20in%20Label%20Management.md
|
||
|
CVE-2023-49378 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20creation%20location%20of%20the%20custom%20table.md
|
||
|
CVE-2023-49379 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20new%20location%20of%20the%20friendship%20link.md
|
||
|
CVE-2023-49380 - https://github.com/cui2shark/cms/blob/main/There%20is%20a%20CSRF%20at%20the%20deletion%20point%20of%20the%20friendship%20link.md
|
||
|
CVE-2023-49381 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20modification%20point%20of%20the%20custom%20table.md
|
||
|
CVE-2023-49382 - https://github.com/cui2shark/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20the%20custom%20table.md
|
||
|
CVE-2023-49383 - https://github.com/cui2shark/cms/blob/main/Added%20CSRF%20in%20Label%20Management.md
|
||
|
CVE-2023-49391 - https://github.com/free5gc/free5gc/issues/497
|
||
|
CVE-2023-49395 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20in%20the%20column%20management%20modification%20section.md
|
||
|
CVE-2023-49396 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20newly%20added%20section%20of%20column%20management.md
|
||
|
CVE-2023-49397 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md
|
||
|
CVE-2023-49398 - https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20column%20management.md
|
||
|
CVE-2023-49402 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_localMsg/w30e_localMsg.md
|
||
|
CVE-2023-49403 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setFixTools/w30e_setFixTools.md
|
||
|
CVE-2023-49404 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setAdvancedSetList/w30e_setAdvancedSetList.md
|
||
|
CVE-2023-49405 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_UploadCfg/w30e_UploadCfg.md
|
||
|
CVE-2023-49406 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_telnet/w30e_telnet.md
|
||
|
CVE-2023-49408 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_setBlackRule/AX3-setBlackRule.md
|
||
|
CVE-2023-49409 - https://github.com/GD008/TENDA/blob/main/AX3/tenda_AX3_telnet/AX3_telnet.md
|
||
|
CVE-2023-49410 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setIPv6Status/w30e_setIPv6Status.md
|
||
|
CVE-2023-49411 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_deleteMesh/w30e_deleteMesh.md
|
||
|
CVE-2023-49417 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setOpModeCfg
|
||
|
CVE-2023-49418 - https://github.com/cnitlrt/iot_vuln/tree/master/totolink/A7000R/setIpPortFilterRules
|
||
|
CVE-2023-49424 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetVirtualServerCfg.md
|
||
|
CVE-2023-49425 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/setMacFilterCfg.md
|
||
|
CVE-2023-49426 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetStaticRouteCfg.md
|
||
|
CVE-2023-49428 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetOnlineDevName.md
|
||
|
CVE-2023-49431 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetOnlineDevName.md
|
||
|
CVE-2023-49432 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/setMacFilterCfg.md
|
||
|
CVE-2023-49433 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetVirtualServerCfg.md
|
||
|
CVE-2023-49435 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-3.md
|
||
|
CVE-2023-49436 - https://github.com/ef4tless/vuln/blob/master/iot/AX9/SetNetControlList-2.md
|
||
|
CVE-2023-49437 - https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.md
|
||
|
CVE-2023-49438 - https://github.com/brandon-t-elliott/CVE-2023-49438
|
||
|
CVE-2023-49446 - https://github.com/ysuzhangbin/cms/blob/main/There%20is%20a%20CSRF%20in%20the%20newly%20added%20navigation%20management%20area.md
|
||
|
CVE-2023-49447 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20navigation%20management%20modification%20location.md
|
||
|
CVE-2023-49448 - https://github.com/ysuzhangbin/cms/blob/main/CSRF%20exists%20at%20the%20deletion%20point%20of%20navigation%20management.md
|
||
|
CVE-2023-49460 - https://github.com/strukturag/libheif/issues/1046
|
||
|
CVE-2023-49462 - https://github.com/strukturag/libheif/issues/1043
|
||
|
CVE-2023-49463 - https://github.com/strukturag/libheif/issues/1042
|
||
|
CVE-2023-49464 - https://github.com/strukturag/libheif/issues/1044
|
||
|
CVE-2023-49465 - https://github.com/strukturag/libde265/issues/435
|
||
|
CVE-2023-49467 - https://github.com/strukturag/libde265/issues/434
|
||
|
CVE-2023-49468 - https://github.com/strukturag/libde265/issues/432
|
||
|
CVE-2023-49471 - https://github.com/zunak/CVE-2023-49471
|
||
|
CVE-2023-49492 - https://github.com/Hebing123/cve/issues/2
|
||
|
CVE-2023-49493 - https://github.com/Hebing123/cve/issues/2
|
||
|
CVE-2023-49494 - https://github.com/Hebing123/cve/issues/3
|
||
|
CVE-2023-49544 - https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
|
||
|
CVE-2023-49549 - https://github.com/cesanta/mjs/issues/251
|
||
|
CVE-2023-49551 - https://github.com/cesanta/mjs/issues/257
|
||
|
CVE-2023-49553 - https://github.com/cesanta/mjs/issues/253
|
||
|
CVE-2023-49554 - https://github.com/yasm/yasm/issues/249
|
||
|
CVE-2023-49555 - https://github.com/yasm/yasm/issues/248
|
||
|
CVE-2023-49556 - https://github.com/yasm/yasm/issues/250
|
||
|
CVE-2023-49557 - https://github.com/yasm/yasm/issues/253
|
||
|
CVE-2023-49558 - https://github.com/yasm/yasm/issues/252
|
||
|
CVE-2023-49563 - https://gist.github.com/ph4nt0mbyt3/b237bfb06b2bff405ab47e4ea52c0bd2
|
||
|
CVE-2023-4965 - https://github.com/ctflearner/Vulnerability/blob/main/PHPIPAM/Open_Redirect.md
|
||
|
CVE-2023-4966 - http://packetstormsecurity.com/files/175323/Citrix-Bleed-Session-Token-Leakage-Proof-Of-Concept.html
|
||
|
CVE-2023-4969 - https://blog.trailofbits.com
|
||
|
CVE-2023-4969 - https://kb.cert.org/vuls/id/446598
|
||
|
CVE-2023-4969 - https://www.kb.cert.org/vuls/id/446598
|
||
|
CVE-2023-49693 - https://kb.netgear.com/000065886/Security-Advisory-for-Sensitive-Information-Disclosure-on-the-NMS300-PSV-2023-0126
|
||
|
CVE-2023-49693 - https://www.tenable.com/security/research/tra-2023-39
|
||
|
CVE-2023-49694 - https://www.tenable.com/security/research/tra-2023-39
|
||
|
CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137
|
||
|
CVE-2023-49721 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139
|
||
|
CVE-2023-49721 - https://www.openwall.com/lists/oss-security/2024/02/14/4
|
||
|
CVE-2023-4973 - http://packetstormsecurity.com/files/174680/Academy-LMS-6.2-Cross-Site-Scripting.html
|
||
|
CVE-2023-4974 - http://packetstormsecurity.com/files/174681/Academy-LMS-6.2-SQL-Injection.html
|
||
|
CVE-2023-4977 - https://huntr.dev/bounties/3db8a1a4-ca2d-45df-be18-a959ebf82fbc
|
||
|
CVE-2023-4978 - https://huntr.dev/bounties/cefd9295-2053-4e6e-a130-7e1f845728f4
|
||
|
CVE-2023-49786 - http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html
|
||
|
CVE-2023-49786 - http://seclists.org/fulldisclosure/2023/Dec/24
|
||
|
CVE-2023-4979 - https://huntr.dev/bounties/e67f8f5d-4048-404f-9b86-cb6b8719b77f
|
||
|
CVE-2023-49799 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-3wfp-253j-5jxv
|
||
|
CVE-2023-4980 - https://huntr.dev/bounties/470b9b13-b7fe-4b3f-a186-fdc5dc193976
|
||
|
CVE-2023-49800 - https://github.com/johannschopplich/nuxt-api-party/security/advisories/GHSA-q6hx-3m4p-749h
|
||
|
CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-88j4-pcx8-q4q3
|
||
|
CVE-2023-49804 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-g9v2-wqcj-j99g
|
||
|
CVE-2023-49805 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-mj22-23ff-2hrr
|
||
|
CVE-2023-4981 - https://huntr.dev/bounties/1f014494-49a9-4bf0-8d43-a675498b9609
|
||
|
CVE-2023-49810 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898
|
||
|
CVE-2023-4982 - https://huntr.dev/bounties/d3c2dd8a-883c-400e-a1a7-326c3fd37b9e
|
||
|
CVE-2023-4987 - http://packetstormsecurity.com/files/174760/Taskhub-2.8.7-SQL-Injection.html
|
||
|
CVE-2023-49923 - https://www.elastic.co/community/security
|
||
|
CVE-2023-49950 - https://github.com/shrikeinfosec/cve-2023-49950/blob/main/cve-2023-49950.md
|
||
|
CVE-2023-49964 - https://github.com/mbadanoiu/CVE-2023-49964
|
||
|
CVE-2023-49967 - https://github.com/typecho/typecho/issues/1648
|
||
|
CVE-2023-49991 - https://github.com/espeak-ng/espeak-ng/issues/1825
|
||
|
CVE-2023-49992 - https://github.com/espeak-ng/espeak-ng/issues/1827
|
||
|
CVE-2023-49993 - https://github.com/espeak-ng/espeak-ng/issues/1826
|
||
|
CVE-2023-49994 - https://github.com/espeak-ng/espeak-ng/issues/1823
|
||
|
CVE-2023-49999 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_setUmountUSBPartition/w30e_setUmountUSBPartition.md
|
||
|
CVE-2023-50000 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_resetMesh/w30e_resetMesh.md
|
||
|
CVE-2023-50001 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_upgradeMeshOnline/w30e_upgradeMeshOnline.md
|
||
|
CVE-2023-50002 - https://github.com/GD008/TENDA/blob/main/w30e/tenda_w30e_rebootMesh/w30e_rebootMesh.md
|
||
|
CVE-2023-50011 - https://packetstormsecurity.com/files/175924/PopojiCMS-2.0.1-Remote-Command-Execution.html
|
||
|
CVE-2023-50017 - https://github.com/849200701/cms/blob/main/CSRF%20exists%20in%20the%20backup%20and%20restore%20location.md
|
||
|
CVE-2023-50027 - https://security.friendsofpresta.org/modules/2023/12/19/baproductzoommagnifier.html
|
||
|
CVE-2023-50030 - https://security.friendsofpresta.org/modules/2024/01/16/jmssetting.html
|
||
|
CVE-2023-50061 - https://security.friendsofpresta.org/modules/2024/02/08/oparteasyredirect.html
|
||
|
CVE-2023-50069 - https://github.com/holomekc/wiremock/issues/51
|
||
|
CVE-2023-50072 - https://github.com/ahrixia/CVE-2023-50072
|
||
|
CVE-2023-50089 - https://github.com/NoneShell/Vulnerabilities/blob/main/NETGEAR/WNR2000v4-1.0.0.70-Authorized-Command-Injection.md
|
||
|
CVE-2023-50094 - https://www.mattz.io/posts/cve-2023-50094/
|
||
|
CVE-2023-50096 - https://github.com/elttam/publications/blob/master/writeups/CVE-2023-50096.md
|
||
|
CVE-2023-50110 - https://github.com/TestLinkOpenSourceTRMS/testlink-code/pull/357
|
||
|
CVE-2023-50120 - https://github.com/gpac/gpac/issues/2698
|
||
|
CVE-2023-50123 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50124 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50125 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50126 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50127 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50128 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50129 - https://www.secura.com/services/iot/consumer-products/security-concerns-in-popular-smart-home-devices
|
||
|
CVE-2023-50164 - http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html
|
||
|
CVE-2023-50172 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1897
|
||
|
CVE-2023-5024 - https://youtu.be/evdhcUlD1EQ
|
||
|
CVE-2023-50245 - https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj
|
||
|
CVE-2023-50246 - https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc
|
||
|
CVE-2023-50250 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
|
||
|
CVE-2023-50251 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-ff5x-7qg5-vwf2
|
||
|
CVE-2023-50252 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-jq98-9543-m4cr
|
||
|
CVE-2023-50253 - https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f
|
||
|
CVE-2023-50254 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495
|
||
|
CVE-2023-50255 - https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-rw5r-8p9h-3gp2
|
||
|
CVE-2023-50257 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98
|
||
|
CVE-2023-50258 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-3hph-6586-qv9g
|
||
|
CVE-2023-50258 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/
|
||
|
CVE-2023-50259 - https://github.com/pymedusa/Medusa/security/advisories/GHSA-8mcr-vffr-jwxv
|
||
|
CVE-2023-50259 - https://securitylab.github.com/advisories/GHSL-2023-201_GHSL-2023-202_Medusa/
|
||
|
CVE-2023-50262 - https://github.com/dompdf/dompdf/security/advisories/GHSA-3qx2-6f78-w2j2
|
||
|
CVE-2023-50264 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
||
|
CVE-2023-50265 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
||
|
CVE-2023-50266 - https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
|
||
|
CVE-2023-5027 - https://vuldb.com/?id.239869
|
||
|
CVE-2023-5028 - https://vuldb.com/?id.239870
|
||
|
CVE-2023-5033 - https://vuldb.com/?id.239877
|
||
|
CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
|
||
|
CVE-2023-5036 - https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d
|
||
|
CVE-2023-5041 - https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523
|
||
|
CVE-2023-50429 - https://github.com/orangecertcc/security-research/security/advisories/GHSA-mc3w-rv8p-f9xf
|
||
|
CVE-2023-50445 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html
|
||
|
CVE-2023-50446 - https://github.com/mullvad/mullvadvpn-app/pull/5398
|
||
|
CVE-2023-50447 - https://duartecsantos.github.io/2023-01-02-CVE-2023-50447/
|
||
|
CVE-2023-50449 - https://gitee.com/heyewei/JFinalcms/issues/I7WGC6
|
||
|
CVE-2023-50465 - https://github.com/Crypt0Cr33py/monicahqvuln
|
||
|
CVE-2023-50470 - https://blog.csdn.net/weixin_72610998/article/details/134784075?spm=1001.2014.3001.5502
|
||
|
CVE-2023-50471 - https://github.com/DaveGamble/cJSON/issues/802
|
||
|
CVE-2023-50472 - https://github.com/DaveGamble/cJSON/issues/803
|
||
|
CVE-2023-50488 - https://github.com/roman-mueller/PoC/tree/master/CVE-2023-50488
|
||
|
CVE-2023-50488 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/
|
||
|
CVE-2023-50495 - https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
|
||
|
CVE-2023-50559 - https://github.com/OpenXiangShan/XiangShan/issues/2534
|
||
|
CVE-2023-50569 - https://gist.github.com/ISHGARD-2/a6b57de899f977e2af41780e7428b4bf
|
||
|
CVE-2023-50569 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
|
||
|
CVE-2023-50585 - https://github.com/LaPhilosophie/IoT-vulnerable/blob/main/Tenda/A18/formSetDeviceName.md
|
||
|
CVE-2023-50589 - https://github.com/VauP/CVE-IDs/blob/main/proof_of_concept.md
|
||
|
CVE-2023-5060 - https://huntr.dev/bounties/01b0917d-f92f-4903-9eca-bcfc46e847e3
|
||
|
CVE-2023-50612 - https://github.com/yaowenxiao721/CloudExplorer-Lite-v1.4.1-vulnerability-BOPLA
|
||
|
CVE-2023-50628 - https://github.com/libming/libming/issues/289
|
||
|
CVE-2023-50630 - https://github.com/xiweicheng/tms/issues/19
|
||
|
CVE-2023-50693 - https://github.com/dom96/jester/issues/326
|
||
|
CVE-2023-50694 - https://github.com/dom96/httpbeast/issues/95
|
||
|
CVE-2023-50715 - https://github.com/home-assistant/core/security/advisories/GHSA-jqpc-rc7g-vf83
|
||
|
CVE-2023-5072 - https://github.com/stleary/JSON-java/issues/758
|
||
|
CVE-2023-50720 - https://jira.xwiki.org/browse/XWIKI-20371
|
||
|
CVE-2023-50731 - https://securitylab.github.com/advisories/GHSL-2023-182_GHSL-2023-184_mindsdb_mindsdb/
|
||
|
CVE-2023-5074 - https://www.tenable.com/security/research/tra-2023-32
|
||
|
CVE-2023-5075 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-5078 - https://support.lenovo.com/us/en/product_security/LEN-141775
|
||
|
CVE-2023-5084 - https://huntr.dev/bounties/f3340570-6e59-4c72-a7d1-d4b829b4fb45
|
||
|
CVE-2023-50916 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/
|
||
|
CVE-2023-50916 - https://www.trustwave.com/hubfs/Web/Library/Advisories_txt/TWSL2024-001_kyocera-v2.txt
|
||
|
CVE-2023-50917 - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html
|
||
|
CVE-2023-50917 - http://packetstormsecurity.com/files/176669/MajorDoMo-Command-Injection.html
|
||
|
CVE-2023-50919 - http://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html
|
||
|
CVE-2023-50965 - https://github.com/starnight/MicroHttpServer/issues/5
|
||
|
CVE-2023-50980 - https://github.com/weidai11/cryptopp/issues/1248
|
||
|
CVE-2023-50982 - https://rehmeinfosec.de/labor/cve-2023-50982
|
||
|
CVE-2023-51010 - https://github.com/firmianay/security-issues/tree/main/app/com.sdjictec.qdmetro
|
||
|
CVE-2023-51011 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanPriDns/
|
||
|
CVE-2023-51012 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/
|
||
|
CVE-2023-51013 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanNetmask/
|
||
|
CVE-2023-51014 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig_lanSecDns/
|
||
|
CVE-2023-51015 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/
|
||
|
CVE-2023-51016 - https://815yang.github.io/2023/12/10/EX1800T/TOTOlink%20EX1800T_V9.1.0cu.2112_B20220316(setRebootScheCfg)/
|
||
|
CVE-2023-51017 - https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanIp/
|
||
|
CVE-2023-51018 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setWiFiApConfig-opmode/
|
||
|
CVE-2023-51019 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-key5g/
|
||
|
CVE-2023-51020 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langType/
|
||
|
CVE-2023-51021 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setRptWizardCfg-merge/
|
||
|
CVE-2023-51022 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setLanguageCfg-langFlag/
|
||
|
CVE-2023-51023 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031NTPSyncWithHost-host_time/
|
||
|
CVE-2023-51024 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setNtpCfg-tz/
|
||
|
CVE-2023-51025 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setPasswordCfg-admuser/
|
||
|
CVE-2023-51026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setRebootScheCfg-hour/
|
||
|
CVE-2023-51027 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliAuthMode/
|
||
|
CVE-2023-51028 - https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliChannel/
|
||
|
CVE-2023-51033 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_setOpModeCfg/
|
||
|
CVE-2023-51034 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_UploadFirmwareFile/
|
||
|
CVE-2023-51035 - https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost/
|
||
|
CVE-2023-5104 - https://huntr.dev/bounties/1b5c6d9f-941e-4dd7-a964-42b53d6826b0
|
||
|
CVE-2023-51042 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
|
||
|
CVE-2023-51063 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51063.md
|
||
|
CVE-2023-51066 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51066.md
|
||
|
CVE-2023-51068 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51068.md
|
||
|
CVE-2023-51070 - https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51070.md
|
||
|
CVE-2023-51074 - https://github.com/json-path/JsonPath/issues/973
|
||
|
CVE-2023-51075 - https://github.com/dromara/hutool/issues/3421
|
||
|
CVE-2023-51079 - https://github.com/mvel/mvel/issues/348
|
||
|
CVE-2023-51079 - https://github.com/mvel/mvel/issues/348#issuecomment-1874047271
|
||
|
CVE-2023-51084 - https://github.com/PoppingSnack/VulReport/issues/12
|
||
|
CVE-2023-51091 - https://github.com/GD008/TENDA/blob/main/M3/cookie/M3_cookie.md
|
||
|
CVE-2023-51093 - https://github.com/GD008/TENDA/blob/main/M3/setVlanInfo/M3_setVlanInfo.md
|
||
|
CVE-2023-51094 - https://github.com/GD008/TENDA/blob/main/M3/telnet/M3_telnet.md
|
||
|
CVE-2023-51095 - https://github.com/GD008/TENDA/blob/main/M3/delWlPolicyData/M3_delWlPolicyData.md
|
||
|
CVE-2023-51097 - https://github.com/GD008/TENDA/blob/main/W9/W9_setAutoPing/W9_setAutoPing.md
|
||
|
CVE-2023-51098 - https://github.com/GD008/TENDA/blob/main/W9/W9_setDiagnoseInfo/W9_setDiagnoseInfo.md
|
||
|
CVE-2023-51102 - https://github.com/GD008/TENDA/blob/main/W9/W9_WifiMacFilterSet/W9_WifiMacFilterSet.md
|
||
|
CVE-2023-51123 - https://github.com/WhereisRain/dir-815
|
||
|
CVE-2023-51123 - https://github.com/WhereisRain/dir-815/blob/main/README.md
|
||
|
CVE-2023-51210 - https://medium.com/@nasir.synack/uncovering-critical-vulnerability-cve-2023-51210-in-prestashop-plugin-bundle-product-pack-ad7fb08bdc91
|
||
|
CVE-2023-51252 - https://github.com/sanluan/PublicCMS/issues/79
|
||
|
CVE-2023-51257 - https://github.com/jasper-software/jasper/issues/367
|
||
|
CVE-2023-51277 - https://www.youtube.com/watch?v=c0nawqA_bdI
|
||
|
CVE-2023-51385 - https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html
|
||
|
CVE-2023-5139 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-5139 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453
|
||
|
CVE-2023-5142 - https://vuldb.com/?id.240238
|
||
|
CVE-2023-51442 - https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r
|
||
|
CVE-2023-51443 - http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html
|
||
|
CVE-2023-5152 - https://github.com/llixixi/cve/blob/main/D-LINK-DAR-8000-10_sql_%20importexport.md
|
||
|
CVE-2023-5153 - https://vuldb.com/?id.240249
|
||
|
CVE-2023-51661 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j
|
||
|
CVE-2023-51664 - https://github.com/tj-actions/changed-files/security/advisories/GHSA-mcph-m25j-8j63
|
||
|
CVE-2023-5167 - https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437
|
||
|
CVE-2023-51717 - https://dataiku.com
|
||
|
CVE-2023-5173 - https://bugzilla.mozilla.org/show_bug.cgi?id=1823172
|
||
|
CVE-2023-5174 - https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
|
||
|
CVE-2023-51747 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
||
|
CVE-2023-5175 - https://bugzilla.mozilla.org/show_bug.cgi?id=1849704
|
||
|
CVE-2023-51764 - https://github.com/duy-31/CVE-2023-51764
|
||
|
CVE-2023-51764 - https://github.com/eeenvik1/CVE-2023-51764
|
||
|
CVE-2023-51764 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
||
|
CVE-2023-51765 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
||
|
CVE-2023-51766 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
|
||
|
CVE-2023-51771 - https://github.com/starnight/MicroHttpServer/issues/8
|
||
|
CVE-2023-51772 - https://sec-consult.com/vulnerability-lab/advisory/kiosk-escape-privilege-escalation-one-identity-password-manager-secure-password-extension/
|
||
|
CVE-2023-51775 - https://bitbucket.org/b_c/jose4j/issues/212
|
||
|
CVE-2023-51806 - https://github.com/ujcms/ujcms/issues/8
|
||
|
CVE-2023-51820 - https://infosec.rm-it.de/2024/02/01/blurams-lumi-security-camera-analysis/
|
||
|
CVE-2023-51828 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
||
|
CVE-2023-5184 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-5184 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g
|
||
|
CVE-2023-5192 - https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7
|
||
|
CVE-2023-51939 - https://github.com/liang-junkai/Relic-bbs-fault-injection
|
||
|
CVE-2023-51939 - https://github.com/relic-toolkit/relic/issues/284
|
||
|
CVE-2023-51949 - https://github.com/cui2shark/security/blob/main/Added%20CSRF%20in%20Role%20Controller.md
|
||
|
CVE-2023-51951 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2023-004
|
||
|
CVE-2023-5197 - http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
|
||
|
CVE-2023-5198 - https://gitlab.com/gitlab-org/gitlab/-/issues/416957
|
||
|
CVE-2023-51987 - https://github.com/funny-mud-peee/IoT-vuls/tree/main/dir822%2B/2
|
||
|
CVE-2023-51989 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md
|
||
|
CVE-2023-52026 - https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/
|
||
|
CVE-2023-52027 - https://815yang.github.io/2023/12/23/a3700r/TOTOLINKA3700R_NTPSyncWithHost/
|
||
|
CVE-2023-52028 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_setTracerouteCfg/
|
||
|
CVE-2023-5203 - https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932
|
||
|
CVE-2023-52031 - https://815yang.github.io/2023/12/04/a3700r/TOTOlink%20A3700R_UploadFirmwareFile/
|
||
|
CVE-2023-52032 - https://815yang.github.io/2023/12/24/cve6/EX1200T_V4.1.2cu.5232_B20210713_downloadFlile/
|
||
|
CVE-2023-5204 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html
|
||
|
CVE-2023-52041 - https://kee02p.github.io/2024/01/13/CVE-2023-52041/
|
||
|
CVE-2023-52042 - https://kee02p.github.io/2024/01/13/CVE-2023-52042/
|
||
|
CVE-2023-52047 - https://github.com/chongfujun/test/blob/main/2023-52047.docx
|
||
|
CVE-2023-52059 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52059/README.md
|
||
|
CVE-2023-52060 - https://github.com/Tanguy-Boisset/CVE/blob/master/CVE-2023-52060/README.md
|
||
|
CVE-2023-52064 - https://github.com/wuzhicms/wuzhicms/issues/208
|
||
|
CVE-2023-52072 - https://github.com/zouyang0714/cms/blob/main/2.md
|
||
|
CVE-2023-52073 - https://github.com/zouyang0714/cms/blob/main/3.md
|
||
|
CVE-2023-52074 - https://github.com/zouyang0714/cms/blob/main/1.md
|
||
|
CVE-2023-52075 - https://github.com/ReVanced/revanced-api/security/advisories/GHSA-852x-grxp-8p3q
|
||
|
CVE-2023-52076 - https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37
|
||
|
CVE-2023-5212 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html
|
||
|
CVE-2023-52137 - https://github.com/tj-actions/verify-changed-files/security/advisories/GHSA-ghm2-rq8q-wrhc
|
||
|
CVE-2023-52138 - https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v
|
||
|
CVE-2023-52139 - https://github.com/misskey-dev/misskey/security/advisories/GHSA-7pxq-6xx9-xpgm
|
||
|
CVE-2023-52153 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
||
|
CVE-2023-52154 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
||
|
CVE-2023-52155 - https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html
|
||
|
CVE-2023-5221 - https://vuldb.com/?id.240363
|
||
|
CVE-2023-5222 - https://github.com/Push3AX/vul/blob/main/viessmann/Vitogate300_HardcodedPassword.md
|
||
|
CVE-2023-52240 - https://kantega-sso.atlassian.net/wiki/spaces/KSE/pages/1226473473/Security+Vulnerability+HTML+injection+Cross-site+scripting+in+SAML+POST+binding+Kantega+SSO+Enterprise
|
||
|
CVE-2023-52251 - http://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html
|
||
|
CVE-2023-52251 - https://github.com/BobTheShoplifter/CVE-2023-52251-POC
|
||
|
CVE-2023-52252 - https://harkenzo.tlstickle.com/2023-03-17-UR-Web-Triggerable-RCE/
|
||
|
CVE-2023-52252 - https://www.exploit-db.com/exploits/51309
|
||
|
CVE-2023-52257 - https://packetstormsecurity.com/files/174815
|
||
|
CVE-2023-52265 - https://github.com/wbowm15/jubilant-enigma/blob/main/writeup.md
|
||
|
CVE-2023-52266 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766
|
||
|
CVE-2023-52266 - https://github.com/hongliuliao/ehttp/issues/38
|
||
|
CVE-2023-52267 - https://github.com/hongliuliao/ehttp/commit/17405b975948abc216f6a085d2d027ec1cfd5766
|
||
|
CVE-2023-52267 - https://github.com/hongliuliao/ehttp/issues/38
|
||
|
CVE-2023-52269 - https://github.com/vipercalling/XSSsecurityGateway/blob/main/finding
|
||
|
CVE-2023-5227 - https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8
|
||
|
CVE-2023-52277 - https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5788.php
|
||
|
CVE-2023-52302 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md
|
||
|
CVE-2023-52303 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md
|
||
|
CVE-2023-52304 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md
|
||
|
CVE-2023-52305 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md
|
||
|
CVE-2023-52306 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md
|
||
|
CVE-2023-52307 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md
|
||
|
CVE-2023-52308 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md
|
||
|
CVE-2023-52309 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md
|
||
|
CVE-2023-52310 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md
|
||
|
CVE-2023-52311 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md
|
||
|
CVE-2023-52312 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md
|
||
|
CVE-2023-52313 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md
|
||
|
CVE-2023-52314 - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md
|
||
|
CVE-2023-52339 - https://github.com/Matroska-Org/libebml/issues/147
|
||
|
CVE-2023-52355 - https://gitlab.com/libtiff/libtiff/-/issues/621
|
||
|
CVE-2023-52356 - https://gitlab.com/libtiff/libtiff/-/issues/622
|
||
|
CVE-2023-5237 - https://research.cleantalk.org/cve-2023-5237-memberlite-shortcodes-stored-xss-via-shortcode
|
||
|
CVE-2023-5241 - http://packetstormsecurity.com/files/175371/WordPress-AI-ChatBot-4.8.9-SQL-Injection-Traversal-File-Deletion.html
|
||
|
CVE-2023-52430 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2023-5244 - https://huntr.dev/bounties/a3bd58ba-ca59-4cba-85d1-799f73a76470
|
||
|
CVE-2023-5245 - https://github.com/combust/mleap/pull/866#issuecomment-1738032225
|
||
|
CVE-2023-5245 - https://research.jfrog.com/vulnerabilities/mleap-path-traversal-rce-xray-532656/
|
||
|
CVE-2023-52555 - https://github.com/mongo-express/mongo-express/issues/1338
|
||
|
CVE-2023-5259 - https://github.com/RCEraser/cve/blob/main/ForU-CMS.md
|
||
|
CVE-2023-5264 - https://github.com/yhy217/huakecms-vul/issues/1
|
||
|
CVE-2023-5284 - https://vuldb.com/?id.240912
|
||
|
CVE-2023-5286 - https://github.com/xcodeOn1/XSS-Stored-Expense-Tracker-App
|
||
|
CVE-2023-5287 - https://vuldb.com/?id.240915
|
||
|
CVE-2023-5289 - https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce
|
||
|
CVE-2023-5297 - https://vuldb.com/?id.240927
|
||
|
CVE-2023-5302 - https://github.com/rohit0x5/poc/blob/main/cve_2
|
||
|
CVE-2023-5307 - https://research.cleantalk.org/cve-2023-5307-photos-and-files-contest-gallery-contact-form-21-2-8-1-unauthenticated-stored-xss-via-http-headers
|
||
|
CVE-2023-5311 - https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311
|
||
|
CVE-2023-5313 - https://github.com/tht1997/WhiteBox/blob/main/PHPKOBO/ajax_pool_script.md
|
||
|
CVE-2023-5316 - https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43
|
||
|
CVE-2023-5317 - https://huntr.dev/bounties/5e146e7c-60c7-498b-9ffe-fd4cb4ca8c54
|
||
|
CVE-2023-5318 - https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d
|
||
|
CVE-2023-5319 - https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d
|
||
|
CVE-2023-5320 - https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67
|
||
|
CVE-2023-5321 - https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a
|
||
|
CVE-2023-5322 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000%E5%AD%98%E5%9C%A8sql%E6%B3%A8%E5%85%A5:sysmanage:edit_manageadmin.php.md
|
||
|
CVE-2023-5323 - https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8
|
||
|
CVE-2023-5341 - https://github.com/ImageMagick/ImageMagick/commit/aa673b2e4defc7cad5bec16c4fc8324f71e531f1
|
||
|
CVE-2023-5344 - https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04
|
||
|
CVE-2023-5344 - https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
|
||
|
CVE-2023-5345 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
||
|
CVE-2023-5347 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html
|
||
|
CVE-2023-5347 - http://seclists.org/fulldisclosure/2024/Jan/11
|
||
|
CVE-2023-5347 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/
|
||
|
CVE-2023-5350 - https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736
|
||
|
CVE-2023-5351 - https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b
|
||
|
CVE-2023-5353 - https://huntr.dev/bounties/3b3bb4f1-1aea-4134-99eb-157f245fa752
|
||
|
CVE-2023-5360 - http://packetstormsecurity.com/files/175992/WordPress-Royal-Elementor-Addons-And-Templates-Remote-Shell-Upload.html
|
||
|
CVE-2023-5375 - https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9
|
||
|
CVE-2023-5376 - http://packetstormsecurity.com/files/176550/Korenix-JetNet-Series-Unauthenticated-Access.html
|
||
|
CVE-2023-5376 - http://seclists.org/fulldisclosure/2024/Jan/11
|
||
|
CVE-2023-5376 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-korenix-jetnet-series/
|
||
|
CVE-2023-5377 - https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf
|
||
|
CVE-2023-5389 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-5390 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-5427 - http://packetstormsecurity.com/files/176029/ARM-Mali-r44p0-Use-After-Free.html
|
||
|
CVE-2023-5441 - https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2
|
||
|
CVE-2023-5448 - https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve
|
||
|
CVE-2023-5452 - https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8
|
||
|
CVE-2023-5463 - https://drive.google.com/drive/folders/1mpRxWOPjxVS980r0qu1IY_Hf0irKO-cu
|
||
|
CVE-2023-5471 - https://vuldb.com/?id.241608
|
||
|
CVE-2023-5488 - https://vuldb.com/?id.241640
|
||
|
CVE-2023-5492 - https://vuldb.com/?id.241644
|
||
|
CVE-2023-5495 - http://packetstormsecurity.com/files/175071/Smart-School-6.4.1-SQL-Injection.html
|
||
|
CVE-2023-5496 - https://vuldb.com/?id.241649
|
||
|
CVE-2023-5498 - https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9
|
||
|
CVE-2023-5511 - https://huntr.dev/bounties/43206801-9862-48da-b379-e55e341d78bf
|
||
|
CVE-2023-5512 - https://gitlab.com/gitlab-org/gitlab/-/issues/427827
|
||
|
CVE-2023-5520 - https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a
|
||
|
CVE-2023-5521 - https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1
|
||
|
CVE-2023-5535 - https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d
|
||
|
CVE-2023-5535 - https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
|
||
|
CVE-2023-5536 - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1829071
|
||
|
CVE-2023-5538 - https://github.com/juweihuitao/MpOperationLogs/
|
||
|
CVE-2023-5555 - https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f
|
||
|
CVE-2023-5556 - https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b
|
||
|
CVE-2023-5563 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv
|
||
|
CVE-2023-5564 - https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c
|
||
|
CVE-2023-5571 - https://huntr.dev/bounties/926ca25f-dd4a-40cf-8e6b-9d7b5938e95a
|
||
|
CVE-2023-5572 - https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be
|
||
|
CVE-2023-5573 - https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72
|
||
|
CVE-2023-5586 - https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
|
||
|
CVE-2023-5590 - https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99
|
||
|
CVE-2023-5591 - https://huntr.dev/bounties/54813d42-5b93-440e-b9b1-c179d2cbf090
|
||
|
CVE-2023-5595 - https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
|
||
|
CVE-2023-5607 - https://kcm.trellix.com/corporate/index?page=content&id=SB10411
|
||
|
CVE-2023-5618 - https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve
|
||
|
CVE-2023-5626 - https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b
|
||
|
CVE-2023-5640 - https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/
|
||
|
CVE-2023-5642 - https://tenable.com/security/research/tra-2023-33
|
||
|
CVE-2023-5654 - https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231
|
||
|
CVE-2023-5674 - https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67
|
||
|
CVE-2023-5681 - https://github.com/Wsecpro/cve1/blob/main/NS-ASG-sql-list_addr_fwresource_ip.md
|
||
|
CVE-2023-5684 - https://github.com/Chef003/cve/blob/main/rce.md
|
||
|
CVE-2023-5686 - https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0
|
||
|
CVE-2023-5687 - https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d
|
||
|
CVE-2023-5688 - https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7
|
||
|
CVE-2023-5689 - https://huntr.com/bounties/24835833-3421-412b-bafb-1b7ea3cf60e6
|
||
|
CVE-2023-5690 - https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01
|
||
|
CVE-2023-5708 - https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve
|
||
|
CVE-2023-5718 - https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb
|
||
|
CVE-2023-5732 - https://bugzilla.mozilla.org/show_bug.cgi?id=1690979
|
||
|
CVE-2023-5753 - http://packetstormsecurity.com/files/175657/Zephyr-RTOS-3.x.0-Buffer-Overflows.html
|
||
|
CVE-2023-5753 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww
|
||
|
CVE-2023-5754 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07
|
||
|
CVE-2023-5760 - https://support.norton.com/sp/static/external/tools/security-advisories.html
|
||
|
CVE-2023-5762 - https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb
|
||
|
CVE-2023-5772 - https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve
|
||
|
CVE-2023-5774 - https://drive.google.com/file/d/1zXWW545ktCznO36k90AN0APhTz8ky-gG/view?usp=sharing
|
||
|
CVE-2023-5774 - https://www.wordfence.com/threat-intel/vulnerabilities/id/33c2756d-c300-479f-b3aa-8f22c3a70278?source=cve
|
||
|
CVE-2023-5784 - https://github.com/gb111d/ns-asg_poc/
|
||
|
CVE-2023-5784 - https://vuldb.com/?id.243590
|
||
|
CVE-2023-5785 - https://github.com/ggg48966/cve/blob/main/NS-ASG-sql-addaddress_interpret.md
|
||
|
CVE-2023-5796 - https://vuldb.com/?id.243602
|
||
|
CVE-2023-5817 - https://drive.google.com/file/d/125xS3GVMr7_qo5HjWvXaXixuE_R-q_u3/view?usp=sharing
|
||
|
CVE-2023-5826 - https://github.com/Cubi123123123/cve/blob/main/NS-ASG-sql-list_onlineuser.md
|
||
|
CVE-2023-5826 - https://vuldb.com/?id.243716
|
||
|
CVE-2023-5832 - https://huntr.com/bounties/afee3726-571f-416e-bba5-0828c815f5df
|
||
|
CVE-2023-5838 - https://huntr.com/bounties/8f6feca3-386d-4897-801c-39b9e3e5eb03
|
||
|
CVE-2023-5839 - https://huntr.com/bounties/21125f12-64a0-42a3-b218-26b9945a5bc0
|
||
|
CVE-2023-5840 - https://huntr.com/bounties/8042d8c3-650e-4c0d-9146-d9ccf6082b30
|
||
|
CVE-2023-5841 - https://takeonme.org/cves/CVE-2023-5841.html
|
||
|
CVE-2023-5842 - https://huntr.com/bounties/aed81114-5952-46f5-ae3a-e66518e98ba3
|
||
|
CVE-2023-5844 - https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021
|
||
|
CVE-2023-5846 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04
|
||
|
CVE-2023-5847 - https://www.tenable.com/security/tns-2023-37
|
||
|
CVE-2023-5861 - https://huntr.com/bounties/7baecef8-6c59-42fc-bced-886c4929e220
|
||
|
CVE-2023-5862 - https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d
|
||
|
CVE-2023-5863 - https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f
|
||
|
CVE-2023-5864 - https://huntr.com/bounties/e4b0e8f4-5e06-49d1-832f-5756573623ad
|
||
|
CVE-2023-5865 - https://huntr.com/bounties/4c4b7395-d9fd-4ca0-98d7-2e20c1249aff
|
||
|
CVE-2023-5866 - https://huntr.com/bounties/ec44bcba-ae7f-497a-851e-8165ecf56945
|
||
|
CVE-2023-5873 - https://huntr.com/bounties/701cfc30-22a1-4c4b-9b2f-885c77c290ce
|
||
|
CVE-2023-5889 - https://huntr.com/bounties/fba2991a-1b8a-4c89-9689-d708526928e1
|
||
|
CVE-2023-5890 - https://huntr.com/bounties/b60e6e1f-e44d-4b11-acf8-b0548b915686
|
||
|
CVE-2023-5891 - https://huntr.com/bounties/ce4956e4-9ef5-4e0e-bfb2-481ec5cfb0a5
|
||
|
CVE-2023-5892 - https://huntr.com/bounties/16719252-d88d-43cc-853a-24ff75a067d8
|
||
|
CVE-2023-5893 - https://huntr.com/bounties/a965aa16-79ce-4185-8f58-3d3b0d74a71e
|
||
|
CVE-2023-5894 - https://huntr.com/bounties/aba3ba5b-aa6b-4076-b663-4237b4a0761d
|
||
|
CVE-2023-5895 - https://huntr.com/bounties/2cc80417-32b2-4024-bbcd-d95a039c11ae
|
||
|
CVE-2023-5898 - https://huntr.com/bounties/19801d12-b8ad-45e7-86e1-8f0230667c9e
|
||
|
CVE-2023-5899 - https://huntr.com/bounties/0c7f1981-3bba-4508-a07e-4cb9a2553216
|
||
|
CVE-2023-5900 - https://huntr.com/bounties/c3f011d4-9f76-4b2b-b3d4-a5e2ecd2e354
|
||
|
CVE-2023-5901 - https://huntr.com/bounties/8fb9b06b-cadd-469e-862d-5ce026019597
|
||
|
CVE-2023-5948 - https://huntr.com/bounties/ac1363b5-207b-40d9-aac5-e66d6213f692
|
||
|
CVE-2023-5995 - https://gitlab.com/gitlab-org/gitlab/-/issues/425361
|
||
|
CVE-2023-5998 - https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113
|
||
|
CVE-2023-6006 - https://www.papercut.com/kb/Main/CommonSecurityQuestions/
|
||
|
CVE-2023-6007 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-6008 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-6009 - http://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html
|
||
|
CVE-2023-6009 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2023-6013 - https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af
|
||
|
CVE-2023-6014 - https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4
|
||
|
CVE-2023-6015 - https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3
|
||
|
CVE-2023-6016 - https://huntr.com/bounties/83dd17ec-053e-453c-befb-7d6736bf1836
|
||
|
CVE-2023-6017 - https://huntr.com/bounties/6a69952f-a1ba-4dee-9d8c-e87f52508b58
|
||
|
CVE-2023-6019 - https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
|
||
|
CVE-2023-6020 - https://huntr.com/bounties/83dd8619-6dc3-4c98-8f1b-e620fedcd1f6
|
||
|
CVE-2023-6021 - https://huntr.com/bounties/5039c045-f986-4cbc-81ac-370fe4b0d3f8
|
||
|
CVE-2023-6022 - https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af
|
||
|
CVE-2023-6023 - https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca
|
||
|
CVE-2023-6038 - https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c
|
||
|
CVE-2023-6040 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
||
|
CVE-2023-6051 - https://gitlab.com/gitlab-org/gitlab/-/issues/431345
|
||
|
CVE-2023-6052 - https://vuldb.com/?id.244872
|
||
|
CVE-2023-6053 - https://vuldb.com/?id.244874
|
||
|
CVE-2023-6054 - https://vuldb.com/?id.244875
|
||
|
CVE-2023-6065 - https://drive.google.com/file/d/1w83xWsVLS_gCpQy4LDwbjNK9JaB87EEf/view?usp=sharing
|
||
|
CVE-2023-6070 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413
|
||
|
CVE-2023-6071 - https://kcm.trellix.com/corporate/index?page=content&id=SB10413
|
||
|
CVE-2023-6084 - https://vuldb.com/?id.244994
|
||
|
CVE-2023-6099 - https://github.com/gatsby2003/Shenzhen-Youkate-Industrial-Co.-Ltd/blob/main/Shenzhen%20Youkate%20Industrial%20Co.%2C%20Ltd.md
|
||
|
CVE-2023-6099 - https://vuldb.com/?id.245061
|
||
|
CVE-2023-6103 - https://vuldb.com/?id.245065
|
||
|
CVE-2023-6105 - https://www.tenable.com/security/research/tra-2023-35
|
||
|
CVE-2023-6112 - http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
|
||
|
CVE-2023-6113 - https://research.cleantalk.org/cve-2023-6113-wp-staging-unauth-sensitive-data-exposure-to-account-takeover-poc-exploit/
|
||
|
CVE-2023-6114 - https://drive.google.com/file/d/1mpapFCqfZLv__EAM7uivrrl2h55rpi1V/view?usp=sharing
|
||
|
CVE-2023-6119 - https://kcm.trellix.com/corporate/index?page=content&id=SB10412
|
||
|
CVE-2023-6124 - https://huntr.com/bounties/aed4d8f3-ab9a-42fd-afea-b3ec288a148e
|
||
|
CVE-2023-6125 - https://huntr.com/bounties/a9462f1e-9746-4380-8228-533ff2f64691
|
||
|
CVE-2023-6127 - https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d
|
||
|
CVE-2023-6132 - https://www.aveva.com/en/support-and-success/cyber-security-updates/
|
||
|
CVE-2023-6146 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-6147 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-6148 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-6149 - https://www.qualys.com/security-advisories/
|
||
|
CVE-2023-6152 - https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f
|
||
|
CVE-2023-6176 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
||
|
CVE-2023-6179 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2023-6188 - https://vuldb.com/?id.245735
|
||
|
CVE-2023-6222 - https://drive.google.com/file/d/1krgHH2NvVFr93VpErLkOjDV3L6M5yIA1/view?usp=sharing
|
||
|
CVE-2023-6246 - http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
|
||
|
CVE-2023-6246 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
||
|
CVE-2023-6246 - http://seclists.org/fulldisclosure/2024/Feb/3
|
||
|
CVE-2023-6246 - https://www.openwall.com/lists/oss-security/2024/01/30/6
|
||
|
CVE-2023-6246 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
|
||
|
CVE-2023-6253 - http://packetstormsecurity.com/files/175956/Fortra-Digital-Guardian-Agent-Uninstaller-Cross-Site-Scripting-UninstallKey-Cached.html
|
||
|
CVE-2023-6253 - http://seclists.org/fulldisclosure/2023/Nov/14
|
||
|
CVE-2023-6253 - https://r.sec-consult.com/fortra
|
||
|
CVE-2023-6263 - https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing
|
||
|
CVE-2023-6265 - https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md
|
||
|
CVE-2023-6269 - http://packetstormsecurity.com/files/176194/Atos-Unify-OpenScape-Authentication-Bypass-Remote-Code-Execution.html
|
||
|
CVE-2023-6269 - http://seclists.org/fulldisclosure/2023/Dec/16
|
||
|
CVE-2023-6269 - https://r.sec-consult.com/unifyroot
|
||
|
CVE-2023-6271 - https://research.cleantalk.org/cve-2023-6271-backup-migration-unauth-sensitive-data-exposure-to-full-control-of-the-site-poc-exploit
|
||
|
CVE-2023-6274 - https://github.com/Carol7S/cve/blob/main/rce.md
|
||
|
CVE-2023-6274 - https://vuldb.com/?id.246103
|
||
|
CVE-2023-6277 - https://gitlab.com/libtiff/libtiff/-/issues/614
|
||
|
CVE-2023-6292 - https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/
|
||
|
CVE-2023-6293 - https://huntr.com/bounties/36a7ecbf-4d3d-462e-86a3-cda7b1ec64e2
|
||
|
CVE-2023-6296 - http://packetstormsecurity.com/files/175925/osCommerce-4-Cross-Site-Scripting.html
|
||
|
CVE-2023-6297 - https://github.com/dhabaleshwar/niv_testing_rxss/blob/main/exploit.md
|
||
|
CVE-2023-6298 - https://vuldb.com/?id.246124
|
||
|
CVE-2023-6301 - https://vuldb.com/?id.246127
|
||
|
CVE-2023-6306 - https://vuldb.com/?id.246132
|
||
|
CVE-2023-6308 - https://github.com/gatsby2003/Struts2-046/blob/main/Xiamen%20Four-Faith%20Communication%20Technology%20Co.,%20Ltd.%20video%20surveillance%20management%20system%20has%20a%20command%20execution%20vulnerability.md
|
||
|
CVE-2023-6309 - https://github.com/moses-smt/mosesdecoder/issues/237
|
||
|
CVE-2023-6310 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20browser.md
|
||
|
CVE-2023-6311 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteltype.md
|
||
|
CVE-2023-6311 - https://vuldb.com/?id.246137
|
||
|
CVE-2023-6312 - https://github.com/joinia/webray.com.cn/blob/main/Loan-Management-System/lmssql%20-%20deleteuser.md
|
||
|
CVE-2023-6313 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/url-shortener.md
|
||
|
CVE-2023-6329 - https://tenable.com/security/research/tra-2023-36
|
||
|
CVE-2023-6341 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6342 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6343 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6344 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6348 - http://packetstormsecurity.com/files/176368/Chrome-BindTextSuggestionHostForFrame-Type-Confusion.html
|
||
|
CVE-2023-6353 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6354 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6360 - https://www.tenable.com/security/research/tra-2023-40
|
||
|
CVE-2023-6375 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6376 - https://techcrunch.com/2023/11/30/us-court-records-systems-vulnerabilities-exposed-sealed-documents/
|
||
|
CVE-2023-6440 - https://github.com/lscjl/lsi.webray.com.cn/blob/main/CVE-project/Book%20Borrower%20System%20Cross%20site%20scripting.md
|
||
|
CVE-2023-6461 - https://huntr.com/bounties/9a97d163-1738-4a09-b284-a04716e69dd0
|
||
|
CVE-2023-6474 - https://github.com/dhabaleshwar/niv_testing_csrf/blob/main/exploit.md
|
||
|
CVE-2023-6530 - https://research.cleantalk.org/cve-2023-6530-tj-shortcodes-stored-xss-poc/
|
||
|
CVE-2023-6553 - http://packetstormsecurity.com/files/176638/WordPress-Backup-Migration-1.3.7-Remote-Command-Execution.html
|
||
|
CVE-2023-6553 - https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it
|
||
|
CVE-2023-6560 - http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html
|
||
|
CVE-2023-6562 - https://github.com/google/security-research/security/advisories/GHSA-g6qc-fhcq-vhf9
|
||
|
CVE-2023-6566 - https://huntr.com/bounties/cf4b68b5-8d97-4d05-9cde-e76b1a414fd6
|
||
|
CVE-2023-6568 - https://huntr.com/bounties/816bdaaa-8153-4732-951e-b0d92fddf709
|
||
|
CVE-2023-6569 - https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c
|
||
|
CVE-2023-6570 - https://huntr.com/bounties/82d6e853-013b-4029-a23f-8b50ec56602a
|
||
|
CVE-2023-6571 - https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632
|
||
|
CVE-2023-6575 - https://github.com/houhuidong/cve/blob/main/rce.md
|
||
|
CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html
|
||
|
CVE-2023-6592 - https://research.cleantalk.org/cve-2023-6592-fastdup-database-users-password-leak-poc-exploit/
|
||
|
CVE-2023-6599 - https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e
|
||
|
CVE-2023-6653 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_add_sub.md
|
||
|
CVE-2023-6655 - https://github.com/willchen0011/cve/blob/main/HongJing-sql.md
|
||
|
CVE-2023-6659 - https://github.com/Kidjing/cve/blob/main/sql1.md
|
||
|
CVE-2023-6730 - https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16
|
||
|
CVE-2023-6753 - https://huntr.com/bounties/b397b83a-527a-47e7-b912-a12a17a6cfb4
|
||
|
CVE-2023-6773 - https://drive.google.com/drive/folders/1yuc1n6tr57wD8qsT0HAFDVAuii7iibDM?usp=sharing
|
||
|
CVE-2023-6778 - https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b
|
||
|
CVE-2023-6779 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
||
|
CVE-2023-6779 - http://seclists.org/fulldisclosure/2024/Feb/3
|
||
|
CVE-2023-6779 - https://www.openwall.com/lists/oss-security/2024/01/30/6
|
||
|
CVE-2023-6779 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
|
||
|
CVE-2023-6780 - http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
|
||
|
CVE-2023-6780 - http://seclists.org/fulldisclosure/2024/Feb/3
|
||
|
CVE-2023-6780 - https://www.openwall.com/lists/oss-security/2024/01/30/6
|
||
|
CVE-2023-6780 - https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
|
||
|
CVE-2023-6817 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
||
|
CVE-2023-6817 - http://www.openwall.com/lists/oss-security/2023/12/22/6
|
||
|
CVE-2023-6832 - https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376
|
||
|
CVE-2023-6875 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html
|
||
|
CVE-2023-6888 - http://www.huiyao.love/2023/12/08/rtspserver-stackoverflow-vulnerability/
|
||
|
CVE-2023-6889 - https://huntr.com/bounties/52897778-fad7-4169-bf04-a68a0646df0c
|
||
|
CVE-2023-6890 - https://huntr.com/bounties/2cf11678-8793-4fa1-b21a-f135564a105d
|
||
|
CVE-2023-6893 - https://github.com/willchen0011/cve/blob/main/download.md
|
||
|
CVE-2023-6901 - https://github.com/g1an123/POC/blob/main/README.md
|
||
|
CVE-2023-6902 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20upload%20getshell.md
|
||
|
CVE-2023-6906 - https://github.com/unpWn4bL3/iot-security/blob/main/1.md
|
||
|
CVE-2023-6907 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20deletion.md
|
||
|
CVE-2023-6927 - https://bugzilla.redhat.com/show_bug.cgi?id=2255027
|
||
|
CVE-2023-6928 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
|
||
|
CVE-2023-6929 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
|
||
|
CVE-2023-6930 - https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
|
||
|
CVE-2023-6932 - http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
|
||
|
CVE-2023-6976 - https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f
|
||
|
CVE-2023-6977 - https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf
|
||
|
CVE-2023-7018 - https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c
|
||
|
CVE-2023-7026 - https://github.com/willchen0011/cve/blob/main/upload2.md
|
||
|
CVE-2023-7027 - http://packetstormsecurity.com/files/176525/WordPress-POST-SMTP-Mailer-2.8.7-Authorization-Bypass-Cross-Site-Scripting.html
|
||
|
CVE-2023-7038 - https://github.com/screetsec/VDD/tree/main/Automad%20CMS/Cross-Site%20Request%20Forgery%20(CSRF)
|
||
|
CVE-2023-7039 - https://github.com/Stitch3612/cve/blob/main/rce.md
|
||
|
CVE-2023-7040 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20read.md
|
||
|
CVE-2023-7041 - https://github.com/g1an123/POC/blob/main/Unauthorized%20file%20overwrite.md
|
||
|
CVE-2023-7051 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_delete_notes.md
|
||
|
CVE-2023-7052 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/csrf_profile_notes.md
|
||
|
CVE-2023-7059 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/school-visitors-log-e-book.md
|
||
|
CVE-2023-7092 - https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/view
|
||
|
CVE-2023-7092 - https://vuldb.com/?id.248939
|
||
|
CVE-2023-7095 - https://github.com/unpWn4bL3/iot-security/blob/main/2.md
|
||
|
CVE-2023-7100 - https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03
|
||
|
CVE-2023-7101 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
|
||
|
CVE-2023-7101 - https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc
|
||
|
CVE-2023-7102 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc
|
||
|
CVE-2023-7102 - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
|
||
|
CVE-2023-7105 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md
|
||
|
CVE-2023-7106 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md
|
||
|
CVE-2023-7107 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md
|
||
|
CVE-2023-7108 - https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20Stored%20Cross-site%20Scripting.md
|
||
|
CVE-2023-7109 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-1.md
|
||
|
CVE-2023-7109 - https://vuldb.com/?id.249004
|
||
|
CVE-2023-7110 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-2.md
|
||
|
CVE-2023-7111 - https://github.com/h4md153v63n/CVEs/blob/main/Library-Management-System/Library-Management-System_SQL_Injection-3.md
|
||
|
CVE-2023-7123 - https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4
|
||
|
CVE-2023-7124 - https://github.com/h4md153v63n/CVEs/blob/main/E-commerce_Site/E-commerce_Site-Reflected_Cross_Site_Scripting.md
|
||
|
CVE-2023-7126 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-1.md
|
||
|
CVE-2023-7126 - https://vuldb.com/?id.249129
|
||
|
CVE-2023-7127 - https://github.com/h4md153v63n/CVEs/blob/main/Automated_Voting_System/Automated_Voting_System-SQL_Injection-2.md
|
||
|
CVE-2023-7128 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-1.md
|
||
|
CVE-2023-7129 - https://github.com/h4md153v63n/CVEs/blob/main/Voting_System/Voting_System-SQL_Injection-2.md
|
||
|
CVE-2023-7130 - https://github.com/h4md153v63n/CVEs/blob/main/College_Notes_Gallery/College_Notes_Gallery-SQL_Injection.md
|
||
|
CVE-2023-7130 - https://vuldb.com/?id.249133
|
||
|
CVE-2023-7131 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-SQL-Injection.md
|
||
|
CVE-2023-7132 - https://github.com/h4md153v63n/CVEs/blob/main/Intern_Membership_Management_System/Intern_Membership_Management_System-Stored_Cross_site_Scripting.md
|
||
|
CVE-2023-7134 - https://medium.com/@2839549219ljk/medicine-tracking-system-rce-vulnerability-1f009165b915
|
||
|
CVE-2023-7135 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-1.md
|
||
|
CVE-2023-7136 - https://github.com/h4md153v63n/CVEs/blob/main/Record_Management_System/Record_Management_System-Blind_Cross_Site_Scripting-2.md
|
||
|
CVE-2023-7137 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_1.md
|
||
|
CVE-2023-7138 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_2.md
|
||
|
CVE-2023-7139 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_3.md
|
||
|
CVE-2023-7140 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_4.md
|
||
|
CVE-2023-7141 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_5.md
|
||
|
CVE-2023-7142 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-SQL_Injection_6.md
|
||
|
CVE-2023-7143 - https://github.com/h4md153v63n/CVEs/blob/main/Client_Details_System/Client_Details_System-Blind_Cross_Site_Scripting.md
|
||
|
CVE-2023-7149 - https://github.com/h4md153v63n/CVEs/blob/main/QR_Code_Generator/QR_Code_Generator-Reflected_Cross_Site_Scripting.md
|
||
|
CVE-2023-7150 - https://github.com/laoquanshi/Chic-Vulnerability-
|
||
|
CVE-2023-7155 - https://medium.com/@heishou/inventory-management-system-sql-injection-f6d67247c7ae
|
||
|
CVE-2023-7156 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-95b95ab64ccc
|
||
|
CVE-2023-7157 - https://medium.com/@heishou/inventory-management-system-sql-injection-7b955b5707eb
|
||
|
CVE-2023-7158 - https://github.com/micropython/micropython/issues/13007
|
||
|
CVE-2023-7160 - https://vuldb.com/?id.249182
|
||
|
CVE-2023-7161 - https://github.com/fixitc/cve/blob/main/sql.md
|
||
|
CVE-2023-7163 - https://tenable.com/security/research/tra-2023-43
|
||
|
CVE-2023-7172 - https://github.com/sharathc213/CVE-2023-7172
|
||
|
CVE-2023-7173 - https://github.com/sharathc213/CVE-2023-7173
|
||
|
CVE-2023-7175 - https://medium.com/@heishou/libsystem-sql-injection-bb74915175fe
|
||
|
CVE-2023-7176 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-3-d02f0ce78fe3
|
||
|
CVE-2023-7176 - https://vuldb.com/?id.249363
|
||
|
CVE-2023-7177 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-4-cadc2983eb5e
|
||
|
CVE-2023-7178 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-5-5a761e5b73b8
|
||
|
CVE-2023-7179 - https://medium.com/@heishou/libsystem-foreground-sql-injection-vulnerability-a98949964faf
|
||
|
CVE-2023-7181 - https://vuldb.com/?id.249368
|
||
|
CVE-2023-7202 - https://research.cleantalk.org/cve-2023-7202-fatal-error-notify-error-email-sending-csrf/
|
||
|
CVE-2023-7208 - https://github.com/unpWn4bL3/iot-security/blob/main/13.md
|
||
|
CVE-2023-7215 - https://github.com/Chanzhaoyu/chatgpt-web/issues/2001
|
||
|
CVE-2023-7215 - https://vuldb.com/?id.249779
|
||
|
CVE-2023-7216 - https://bugzilla.redhat.com/show_bug.cgi?id=2249901
|
||
|
CVE-2023-7227 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02
|
||
|
CVE-2024-0023 - https://android.googlesource.com/platform/frameworks/av/+/30b1b34cfd5abfcfee759e7d13167d368ac6c268
|
||
|
CVE-2024-0044 - https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2
|
||
|
CVE-2024-0044 - https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html
|
||
|
CVE-2024-0049 - https://android.googlesource.com/platform/frameworks/av/+/462689f06fd5e72ac63cd87b43ee52554ddf953e
|
||
|
CVE-2024-0051 - https://android.googlesource.com/platform/frameworks/av/+/a52c14a5b49f26efafa581dea653b4179d66909e
|
||
|
CVE-2024-0181 - https://vuldb.com/?id.249433
|
||
|
CVE-2024-0182 - https://vuldb.com/?id.249440
|
||
|
CVE-2024-0187 - https://wpscan.com/vulnerability/b4600411-bee1-4cc8-aee9-0a613ac9b55b/
|
||
|
CVE-2024-0204 - http://packetstormsecurity.com/files/176683/GoAnywhere-MFT-Authentication-Bypass.html
|
||
|
CVE-2024-0204 - http://packetstormsecurity.com/files/176974/Fortra-GoAnywhere-MFT-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2024-0206 - https://kcm.trellix.com/corporate/index?page=content&id=SB10415
|
||
|
CVE-2024-0209 - https://gitlab.com/wireshark/wireshark/-/issues/19501
|
||
|
CVE-2024-0210 - https://gitlab.com/wireshark/wireshark/-/issues/19504
|
||
|
CVE-2024-0213 - https://kcm.trellix.com/corporate/index?page=content&id=SB10416
|
||
|
CVE-2024-0233 - https://wpscan.com/vulnerability/04a708a0-b6f3-47d1-aac9-0bb17f57c61e/
|
||
|
CVE-2024-0235 - https://wpscan.com/vulnerability/e370b99a-f485-42bd-96a3-60432a15a4e9/
|
||
|
CVE-2024-0236 - https://wpscan.com/vulnerability/09aeb6f2-6473-4de7-8598-e417049896d7/
|
||
|
CVE-2024-0237 - https://wpscan.com/vulnerability/73d1b00e-1f17-4d9a-bfc8-6bc43a46b90b/
|
||
|
CVE-2024-0238 - https://wpscan.com/vulnerability/774655ac-b201-4d9f-8790-9eff8564bc91/
|
||
|
CVE-2024-0239 - https://wpscan.com/vulnerability/b9a4a3e3-7cdd-4354-8541-4219bd41c854/
|
||
|
CVE-2024-0243 - https://huntr.com/bounties/370904e7-10ac-40a4-a8d4-e2d16e1ca861
|
||
|
CVE-2024-0248 - https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/
|
||
|
CVE-2024-0250 - https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/
|
||
|
CVE-2024-0261 - https://packetstormsecurity.com/files/176342/FTPDMIN-0.96-Denial-Of-Service.html
|
||
|
CVE-2024-0261 - https://vuldb.com/?id.249817
|
||
|
CVE-2024-0261 - https://www.youtube.com/watch?v=q-CVJfYdd-g
|
||
|
CVE-2024-0263 - https://0day.today/exploit/description/39212
|
||
|
CVE-2024-0263 - https://packetstormsecurity.com/files/176333/Ultra-Mini-HTTPd-1.21-Denial-Of-Service.html
|
||
|
CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/
|
||
|
CVE-2024-0264 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py
|
||
|
CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE
|
||
|
CVE-2024-0265 - https://github.com/jmrcsnchz/ClinicQueueingSystem_RCE/blob/main/clinicx.py
|
||
|
CVE-2024-0268 - https://vuldb.com/?id.249824
|
||
|
CVE-2024-0273 - https://vuldb.com/?id.249828
|
||
|
CVE-2024-0278 - https://vuldb.com/?id.249833
|
||
|
CVE-2024-0300 - https://github.com/tolkent/cve/blob/main/upload.md
|
||
|
CVE-2024-0310 - https://kcm.trellix.com/corporate/index?page=content&id=SB10417
|
||
|
CVE-2024-0311 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
||
|
CVE-2024-0312 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
||
|
CVE-2024-0313 - https://kcm.trellix.com/corporate/index?page=content&id=SB10418
|
||
|
CVE-2024-0321 - https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769
|
||
|
CVE-2024-0322 - https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec
|
||
|
CVE-2024-0337 - https://wpscan.com/vulnerability/2f17a274-8676-4f4e-989f-436030527890/
|
||
|
CVE-2024-0344 - https://vuldb.com/?id.250112
|
||
|
CVE-2024-0346 - https://drive.google.com/file/d/1bao4YK4GwvAvCdCrsW5UpJZdvREdc_Yj/view?usp=sharing
|
||
|
CVE-2024-0355 - https://medium.com/@heishou/dfsms-has-sql-injection-vulnerability-e9cfbc375be8
|
||
|
CVE-2024-0357 - https://vuldb.com/?id.250124
|
||
|
CVE-2024-0361 - https://vuldb.com/?id.250128
|
||
|
CVE-2024-0365 - https://wpscan.com/vulnerability/4b8b9638-d52a-40bc-b298-ae1c74788c18/
|
||
|
CVE-2024-0399 - https://wpscan.com/vulnerability/1550e30c-bf80-48e0-bc51-67d29ebe7272/
|
||
|
CVE-2024-0418 - https://cxsecurity.com/issue/WLB-2024010023
|
||
|
CVE-2024-0419 - https://cxsecurity.com/issue/WLB-2024010027
|
||
|
CVE-2024-0419 - https://www.youtube.com/watch?v=6dAWGH0-6TY
|
||
|
CVE-2024-0420 - https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7e54b7/
|
||
|
CVE-2024-0421 - https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/
|
||
|
CVE-2024-0425 - https://github.com/mi2acle/forucmsvuln/blob/master/passwordreset.md
|
||
|
CVE-2024-0426 - https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md
|
||
|
CVE-2024-0439 - https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce
|
||
|
CVE-2024-0440 - https://huntr.com/bounties/263fd7eb-f9a9-4578-9655-0e28c609272f
|
||
|
CVE-2024-0455 - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c
|
||
|
CVE-2024-0464 - https://vuldb.com/?id.250569
|
||
|
CVE-2024-0480 - http://packetstormsecurity.com/files/176548/Taokeyun-SQL-Injection.html
|
||
|
CVE-2024-0496 - https://vuldb.com/?id.250601
|
||
|
CVE-2024-0500 - https://vuldb.com/?id.250608
|
||
|
CVE-2024-0503 - https://drive.google.com/file/d/1n9Zas-iSOfKVMN3UzPyVGgQgCmig2A5I/view?usp=sharing
|
||
|
CVE-2024-0510 - http://packetstormsecurity.com/files/176547/HaoKeKeJi-YiQiNiu-Server-Side-Request-Forgery.html
|
||
|
CVE-2024-0521 - https://huntr.com/bounties/a569c64b-1e2b-4bed-a19f-47fd5a3da453
|
||
|
CVE-2024-0531 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/setBlackRule.md
|
||
|
CVE-2024-0532 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/WifExtraSet.md
|
||
|
CVE-2024-0533 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.devname.md
|
||
|
CVE-2024-0534 - https://github.com/yaoyue123/iot/blob/main/Tenda/A15/SetOnlineDevName.mac.md
|
||
|
CVE-2024-0538 - https://vuldb.com/?id.250708
|
||
|
CVE-2024-0543 - https://vuldb.com/?id.250713
|
||
|
CVE-2024-0546 - https://packetstormsecurity.com/files/94905/EasyFTP-1.7.0.x-Denial-Of-Service.html
|
||
|
CVE-2024-0547 - https://packetstormsecurity.com/files/163079/Ability-FTP-Server-2.34-Denial-Of-Service.html
|
||
|
CVE-2024-0548 - https://packetstormsecurity.com/files/163038/FreeFloat-FTP-Server-1.0-Denial-Of-Service.html
|
||
|
CVE-2024-0550 - https://huntr.com/bounties/c6afeb5e-f211-4b3d-aa4b-6bad734217a6
|
||
|
CVE-2024-0551 - https://huntr.com/bounties/f114c787-ab5f-4f83-afa5-c000435efb78
|
||
|
CVE-2024-0559 - https://research.cleantalk.org/cve-2024-0559/
|
||
|
CVE-2024-0559 - https://wpscan.com/vulnerability/b257daf2-9540-4a0f-a560-54b47d2b913f/
|
||
|
CVE-2024-0561 - https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/
|
||
|
CVE-2024-0566 - https://wpscan.com/vulnerability/ca83db95-4a08-4615-aa8d-016022404c32/
|
||
|
CVE-2024-0574 - https://vuldb.com/?id.250790
|
||
|
CVE-2024-0575 - https://vuldb.com/?id.250791
|
||
|
CVE-2024-0599 - https://vuldb.com/?id.250837
|
||
|
CVE-2024-0603 - https://vuldb.com/?id.250839
|
||
|
CVE-2024-0646 - https://access.redhat.com/errata/RHSA-2024:0850
|
||
|
CVE-2024-0647 - https://www.youtube.com/watch?v=KtDjoJlrpAc
|
||
|
CVE-2024-0670 - http://seclists.org/fulldisclosure/2024/Mar/29
|
||
|
CVE-2024-0670 - https://checkmk.com/werk/16361
|
||
|
CVE-2024-0672 - https://wpscan.com/vulnerability/eceb6585-5969-4aa6-9908-b6bfb578190a/
|
||
|
CVE-2024-0673 - https://wpscan.com/vulnerability/d80e725d-356a-4997-a352-33565e291fc8/
|
||
|
CVE-2024-0677 - https://wpscan.com/vulnerability/0f7757c9-69fa-49db-90b0-40f0ff29bee7/
|
||
|
CVE-2024-0684 - https://www.openwall.com/lists/oss-security/2024/01/18/2
|
||
|
CVE-2024-0693 - https://0day.today/exploit/description/39218
|
||
|
CVE-2024-0693 - https://packetstormsecurity.com/files/176377/Easy-File-Sharing-FTP-Server-2.0-Denial-Of-Service.html
|
||
|
CVE-2024-0693 - https://www.youtube.com/watch?v=Rcl6VWg_bPY
|
||
|
CVE-2024-0695 - https://packetstormsecurity.com/files/176381/Easy-Chat-Server-3.1-Denial-Of-Service.html
|
||
|
CVE-2024-0695 - https://vuldb.com/?id.251480
|
||
|
CVE-2024-0695 - https://www.exploitalert.com/view-details.html?id=40072
|
||
|
CVE-2024-0695 - https://www.youtube.com/watch?v=nGyS2Rp5aEo
|
||
|
CVE-2024-0700 - https://github.com/wTeBwAA/PoC-SimpleTweet/blob/main/POST-request
|
||
|
CVE-2024-0700 - https://www.wordfence.com/threat-intel/vulnerabilities/id/a5da021c-3835-4251-a3e5-3b5aaa11ea14?source=cve
|
||
|
CVE-2024-0701 - https://codecanyon.net/item/userpro-user-profiles-with-social-login/5958681
|
||
|
CVE-2024-0711 - https://wpscan.com/vulnerability/8e286c04-ef32-4af0-be78-d978999b2a90/
|
||
|
CVE-2024-0713 - https://drive.google.com/file/d/1C6_4A-96BtR9VTNSadUY09ErroqLEVJ4/view?usp=sharing
|
||
|
CVE-2024-0719 - https://wpscan.com/vulnerability/6e67bf7f-07e6-432b-a8f4-aa69299aecaf/
|
||
|
CVE-2024-0720 - https://drive.google.com/drive/folders/1ZFjWlD5axvhWp--I7tuiZ9uOpSBmU_f6?usp=drive_link
|
||
|
CVE-2024-0720 - https://github.com/beraoudabdelkhalek/research/tree/main/CVEs/CVE-2024-0720
|
||
|
CVE-2024-0723 - https://packetstormsecurity.com/files/176545/freeSSHd-1.0.9-Denial-Of-Service.html
|
||
|
CVE-2024-0725 - https://packetstormsecurity.com/files/176544/ProSSHD-1.2-20090726-Denial-Of-Service.html
|
||
|
CVE-2024-0731 - https://fitoxs.com/vuldb/01-PCMan%20v2.0.7-exploit.txt
|
||
|
CVE-2024-0732 - https://fitoxs.com/vuldb/02-PCMan%20v2.0.7-exploit.txt
|
||
|
CVE-2024-0736 - https://0day.today/exploit/39249
|
||
|
CVE-2024-0737 - https://packetstormsecurity.com/files/176553/LightFTP-1.1-Denial-Of-Service.html
|
||
|
CVE-2024-0741 - https://bugzilla.mozilla.org/show_bug.cgi?id=1864587
|
||
|
CVE-2024-0745 - https://bugzilla.mozilla.org/show_bug.cgi?id=1871838
|
||
|
CVE-2024-0750 - https://bugzilla.mozilla.org/show_bug.cgi?id=1863083
|
||
|
CVE-2024-0763 - https://huntr.com/bounties/25a2f487-5a9c-4c7f-a2d3-b0527db73ea5
|
||
|
CVE-2024-0765 - https://huntr.com/bounties/8978ab27-710c-44ce-bfd8-a2ea416dc786
|
||
|
CVE-2024-0769 - https://github.com/c2dc/cve-reported/blob/main/CVE-2024-0769/CVE-2024-0769.md
|
||
|
CVE-2024-0772 - https://youtu.be/WIeWeuXbkiY
|
||
|
CVE-2024-0773 - https://drive.google.com/drive/folders/1YjJFvxis3gLWX95990Y-nJMbWCQHB02U?usp=sharing
|
||
|
CVE-2024-0776 - https://vuldb.com/?id.251678
|
||
|
CVE-2024-0778 - https://github.com/dezhoutorizhao/cve/blob/main/rce.md
|
||
|
CVE-2024-0778 - https://vuldb.com/?id.251696
|
||
|
CVE-2024-0779 - https://wpscan.com/vulnerability/ced134cf-82c5-401b-9476-b6456e1924e2/
|
||
|
CVE-2024-0780 - https://wpscan.com/vulnerability/be3045b1-72e6-450a-8dd2-4702a9328447/
|
||
|
CVE-2024-0781 - https://drive.google.com/drive/folders/1f61RXqelSDY0T92aLjmb8BhgAHt_eeUS
|
||
|
CVE-2024-0782 - https://drive.google.com/drive/folders/1ecVTReqCS_G8svyq3MG79E2y59psMcPn?usp=sharing
|
||
|
CVE-2024-0782 - https://vuldb.com/?id.251698
|
||
|
CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC
|
||
|
CVE-2024-0783 - https://github.com/keru6k/Online-Admission-System-RCE-PoC/blob/main/poc.py
|
||
|
CVE-2024-0784 - https://github.com/biantaibao/octopus_SQL/blob/main/report.md
|
||
|
CVE-2024-0784 - https://vuldb.com/?id.251700
|
||
|
CVE-2024-0788 - https://fluidattacks.com/advisories/brubeck/
|
||
|
CVE-2024-0795 - https://huntr.com/bounties/f69e3307-7b44-4776-ac60-2990990723ec
|
||
|
CVE-2024-0799 - https://www.tenable.com/security/research/tra-2024-07
|
||
|
CVE-2024-0800 - https://www.tenable.com/security/research/tra-2024-07
|
||
|
CVE-2024-0801 - https://www.tenable.com/security/research/tra-2024-07
|
||
|
CVE-2024-0811 - http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html
|
||
|
CVE-2024-0815 - https://huntr.com/bounties/83bf8191-b259-4b24-8ec9-0115d7c05350
|
||
|
CVE-2024-0817 - https://huntr.com/bounties/44d5cbd9-a046-417b-a8d4-bea6fda9cbe3
|
||
|
CVE-2024-0818 - https://huntr.com/bounties/85b06a1b-ac0b-4096-a06d-330891570cd9
|
||
|
CVE-2024-0820 - https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/
|
||
|
CVE-2024-0855 - https://wpscan.com/vulnerability/5d5da91e-3f34-46b0-8db2-354a88bdf934/
|
||
|
CVE-2024-0856 - https://wpscan.com/vulnerability/eb383600-0cff-4f24-8127-1fb118f0565a/
|
||
|
CVE-2024-0858 - https://wpscan.com/vulnerability/f6627a35-d158-495e-9d56-69405cfca221/
|
||
|
CVE-2024-0861 - https://gitlab.com/gitlab-org/gitlab/-/issues/439240
|
||
|
CVE-2024-0868 - https://wpscan.com/vulnerability/bb7c2d2b-cdfe-433b-96cf-714e71d12b22/
|
||
|
CVE-2024-0879 - https://research.jfrog.com/vulnerabilities/vector-admin-filter-bypass/
|
||
|
CVE-2024-0880 - https://vuldb.com/?id.252032
|
||
|
CVE-2024-0881 - https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/
|
||
|
CVE-2024-0885 - https://packetstormsecurity.com/files/176633/SpyCamLizard-1.230-Denial-Of-Service.html
|
||
|
CVE-2024-0886 - https://fitoxs.com/vuldb/09-exploit-perl.txt
|
||
|
CVE-2024-0887 - https://fitoxs.com/vuldb/18-exploit-perl.txt
|
||
|
CVE-2024-0889 - https://packetstormsecurity.com/files/176661/Golden-FTP-Server-2.02b-Denial-Of-Service.html
|
||
|
CVE-2024-0890 - https://github.com/biantaibao/octopus_SQL2/blob/main/report.md
|
||
|
CVE-2024-0891 - https://github.com/biantaibao/octopus_XSS/blob/main/report.md
|
||
|
CVE-2024-0891 - https://vuldb.com/?id.252043
|
||
|
CVE-2024-0902 - https://wpscan.com/vulnerability/fd53e40a-516b-47b9-b495-321774432367/
|
||
|
CVE-2024-0904 - https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/
|
||
|
CVE-2024-0905 - https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/
|
||
|
CVE-2024-0911 - https://lists.gnu.org/archive/html/bug-indent/2024-01/msg00000.html
|
||
|
CVE-2024-0917 - https://huntr.com/bounties/2d840735-e255-4700-9709-6f7361829119
|
||
|
CVE-2024-0921 - https://github.com/xiyuanhuaigu/cve/blob/main/rce.md
|
||
|
CVE-2024-0922 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formQuickIndex.md
|
||
|
CVE-2024-0923 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetDeviceName.md
|
||
|
CVE-2024-0924 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetPPTPServer.md
|
||
|
CVE-2024-0925 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formSetVirtualSer.md
|
||
|
CVE-2024-0926 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/formWifiWpsOOB.md
|
||
|
CVE-2024-0927 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromAddressNat_1.md
|
||
|
CVE-2024-0928 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromDhcpListClient_1.md
|
||
|
CVE-2024-0929 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromNatStaticSetting.md
|
||
|
CVE-2024-0930 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/fromSetWirelessRepeat.md
|
||
|
CVE-2024-0930 - https://vuldb.com/?id.252135
|
||
|
CVE-2024-0931 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/saveParentControlInfo_1.md
|
||
|
CVE-2024-0931 - https://vuldb.com/?id.252136
|
||
|
CVE-2024-0932 - https://github.com/yaoyue123/iot/blob/main/Tenda/AC10U/setSmartPowerManagement.md
|
||
|
CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5
|
||
|
CVE-2024-0936 - https://github.com/bayuncao/vul-cve-5/blob/main/poc.py
|
||
|
CVE-2024-0937 - https://github.com/bayuncao/vul-cve-6/blob/main/poc.py
|
||
|
CVE-2024-0937 - https://vuldb.com/?id.252182
|
||
|
CVE-2024-0939 - https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md
|
||
|
CVE-2024-0951 - https://wpscan.com/vulnerability/88b2e479-eb15-4213-9df8-3d353074974e/
|
||
|
CVE-2024-0953 - https://bugzilla.mozilla.org/show_bug.cgi?id=1837916
|
||
|
CVE-2024-0958 - https://drive.google.com/drive/folders/17JTwjuT09q7he_oXkMtZS5jyyXw8ZIgg?usp=sharing
|
||
|
CVE-2024-0964 - https://huntr.com/bounties/25e25501-5918-429c-8541-88832dfd3741
|
||
|
CVE-2024-0968 - https://huntr.com/bounties/566033b9-df20-4928-b4aa-5cd4c3ca1561
|
||
|
CVE-2024-0973 - https://wpscan.com/vulnerability/798de421-4814-46a9-a055-ebb95a7218ed/
|
||
|
CVE-2024-0986 - https://drive.google.com/file/d/10BYLQ7Rk4oag96afLZouSvDDPvsO7SoJ/view?usp=drive_link
|
||
|
CVE-2024-0998 - https://vuldb.com/?id.252267
|
||
|
CVE-2024-1008 - https://vuldb.com/?id.252277
|
||
|
CVE-2024-1009 - https://youtu.be/oL98TSjy89Q?si=_T6YkJZlbn7SJ4Gn
|
||
|
CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS
|
||
|
CVE-2024-1010 - https://github.com/jomskiller/Employee-Management-System---Stored-XSS/
|
||
|
CVE-2024-1011 - https://github.com/jomskiller/Employee-Managemet-System---Broken-Access-Control
|
||
|
CVE-2024-1014 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html
|
||
|
CVE-2024-1015 - https://www.hackplayers.com/2024/01/cve-2024-1014-and-cve-2024-1015.html
|
||
|
CVE-2024-1016 - https://packetstormsecurity.com/files/176675/Solar-FTP-Server-2.1.2-Denial-Of-Service.html
|
||
|
CVE-2024-1017 - https://packetstormsecurity.com/files/176714/Gabriels-FTP-Server-1.2-Denial-Of-Service.html
|
||
|
CVE-2024-1017 - https://www.youtube.com/watch?v=wwHuXfYS8yQ
|
||
|
CVE-2024-1019 - https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30
|
||
|
CVE-2024-1020 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/gdd3hiwz8uo6ylab
|
||
|
CVE-2024-1021 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/yemvnt5uo53gfem5
|
||
|
CVE-2024-1022 - https://drive.google.com/file/d/1lPZ1yL9UlU-uB03xz17q4OR9338X_1am/view?usp=sharing
|
||
|
CVE-2024-1029 - https://vuldb.com/?id.252302
|
||
|
CVE-2024-1030 - https://vuldb.com/?id.252303
|
||
|
CVE-2024-1061 - https://www.tenable.com/security/research/tra-2024-02
|
||
|
CVE-2024-1068 - https://wpscan.com/vulnerability/25e3c1a1-3c45-41df-ae50-0e20d86c5484/
|
||
|
CVE-2024-1076 - https://wpscan.com/vulnerability/9c3e9c72-3d6c-4e2c-bb8a-f4efce1371d5/
|
||
|
CVE-2024-1086 - https://github.com/Notselwyn/CVE-2024-1086
|
||
|
CVE-2024-1086 - https://news.ycombinator.com/item?id=39828424
|
||
|
CVE-2024-1086 - https://pwning.tech/nftables/
|
||
|
CVE-2024-1098 - https://vuldb.com/?id.252455
|
||
|
CVE-2024-1098 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/ouiw375l0m8mw5ls
|
||
|
CVE-2024-1099 - https://www.yuque.com/mailemonyeyongjuan/tha8tr/dcilugg0htp973nx
|
||
|
CVE-2024-1106 - https://wpscan.com/vulnerability/0672f8af-33e2-459c-ac8a-7351247a8a26/
|
||
|
CVE-2024-1142 - https://support.sonatype.com/hc/en-us/articles/27034479038739-CVE-2024-1142-Sonatype-IQ-Server-Path-Traversal-2024-03-06
|
||
|
CVE-2024-1163 - https://huntr.com/bounties/c1cbc18b-e4ab-4332-ad13-0033f0f976f5
|
||
|
CVE-2024-1184 - https://fitoxs.com/vuldb/10-exploit-perl.txt
|
||
|
CVE-2024-1185 - https://fitoxs.com/vuldb/11-exploit-perl.txt
|
||
|
CVE-2024-1186 - https://fitoxs.com/vuldb/12-exploit-perl.txt
|
||
|
CVE-2024-1186 - https://www.exploit-db.com/exploits/45884
|
||
|
CVE-2024-1187 - https://fitoxs.com/vuldb/13-exploit-perl.txt
|
||
|
CVE-2024-1188 - https://fitoxs.com/vuldb/14-exploit-perl.txt
|
||
|
CVE-2024-1189 - https://fitoxs.com/vuldb/15-exploit-perl.txt
|
||
|
CVE-2024-1193 - https://vuldb.com/?id.252683
|
||
|
CVE-2024-1195 - https://vuldb.com/?id.252685
|
||
|
CVE-2024-1204 - https://wpscan.com/vulnerability/03191b00-0b05-42db-9ce2-fc525981b6c9/
|
||
|
CVE-2024-1215 - https://github.com/PrecursorYork/crud-without-refresh-reload-Reflected_XSS-POC/blob/main/README.md
|
||
|
CVE-2024-1219 - https://wpscan.com/vulnerability/ce4ac9c4-d293-4464-b6a0-82ddf8d4860b/
|
||
|
CVE-2024-1231 - https://wpscan.com/vulnerability/7d3968d9-61ed-4c00-8764-0360cf03255e/
|
||
|
CVE-2024-1232 - https://wpscan.com/vulnerability/2a29b509-4cd5-43c8-84f4-f86251dd28f8/
|
||
|
CVE-2024-1252 - https://vuldb.com/?id.252991
|
||
|
CVE-2024-1253 - https://github.com/b51s77/cve/blob/main/upload.md
|
||
|
CVE-2024-1254 - https://github.com/rockersiyuan/CVE/blob/main/Smart%20S20.md
|
||
|
CVE-2024-1266 - https://drive.google.com/file/d/16a9lQqUFBICw-Hhbe9bT5sSB7qwZjMwA/view?usp=sharing
|
||
|
CVE-2024-1269 - https://github.com/PrecursorYork/Product-Management-System-Using-PHP-and-MySQL-Reflected-XSS-POC/blob/main/README.md
|
||
|
CVE-2024-1273 - https://wpscan.com/vulnerability/9784d7c8-e3aa-42af-ace8-5b2b37ebc9cb/
|
||
|
CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/
|
||
|
CVE-2024-1279 - https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/
|
||
|
CVE-2024-1290 - https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/
|
||
|
CVE-2024-1292 - https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/
|
||
|
CVE-2024-1306 - https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/
|
||
|
CVE-2024-1307 - https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/
|
||
|
CVE-2024-1309 - https://www.honeywell.com/us/en/product-security
|
||
|
CVE-2024-1309 - https://www.kb.cert.org/vuls/id/417980
|
||
|
CVE-2024-1310 - https://wpscan.com/vulnerability/a7735feb-876e-461c-9a56-ea6067faf277/
|
||
|
CVE-2024-1316 - https://wpscan.com/vulnerability/d80dfe2f-207d-4cdf-8c71-27936c6318e5/
|
||
|
CVE-2024-1319 - https://wpscan.com/vulnerability/5904dc7e-1058-4c40-bca3-66ba57b1414b/
|
||
|
CVE-2024-1331 - https://wpscan.com/vulnerability/b2bac900-3d8f-406c-b03d-c8db156acc59/
|
||
|
CVE-2024-1333 - https://wpscan.com/vulnerability/30546402-03b8-4e18-ad7e-04a6b556ffd7/
|
||
|
CVE-2024-1401 - https://wpscan.com/vulnerability/91064ba5-cf65-46e6-88df-0e4d96a3ef9f/
|
||
|
CVE-2024-1432 - https://github.com/bayuncao/vul-cve-12
|
||
|
CVE-2024-1455 - https://github.com/langchain-ai/langchain/commit/727d5023ce88e18e3074ef620a98137d26ff92a3
|
||
|
CVE-2024-1460 - https://fluidattacks.com/advisories/mingus/
|
||
|
CVE-2024-1481 - https://bugzilla.redhat.com/show_bug.cgi?id=2262169
|
||
|
CVE-2024-1487 - https://wpscan.com/vulnerability/c028cd73-f30a-4c8b-870f-3071055f0496/
|
||
|
CVE-2024-1526 - https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/
|
||
|
CVE-2024-1564 - https://wpscan.com/vulnerability/ecb1e36f-9c6e-4754-8878-03c97194644d/
|
||
|
CVE-2024-1588 - https://wpscan.com/vulnerability/2772c921-d977-4150-b207-ae5ba5e2a6db/
|
||
|
CVE-2024-1589 - https://wpscan.com/vulnerability/5cfbbddd-d941-4665-be8b-a54454527571/
|
||
|
CVE-2024-1638 - https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2
|
||
|
CVE-2024-1658 - https://wpscan.com/vulnerability/9489925e-5a47-4608-90a2-0139c5e1c43c/
|
||
|
CVE-2024-1660 - https://wpscan.com/vulnerability/5bd16f84-22bf-4170-b65c-08caf67d0005/
|
||
|
CVE-2024-1661 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-Totolink/X6000R-Hardcoded-Password.md
|
||
|
CVE-2024-1664 - https://wpscan.com/vulnerability/fc3beca7-af38-4ab2-b05f-13b47d042b85/
|
||
|
CVE-2024-1668 - https://gist.github.com/Xib3rR4dAr/91bd37338022b15379f393356d1056a1
|
||
|
CVE-2024-1669 - https://issues.chromium.org/issues/41495060
|
||
|
CVE-2024-1670 - https://issues.chromium.org/issues/41481374
|
||
|
CVE-2024-1671 - https://issues.chromium.org/issues/41487933
|
||
|
CVE-2024-1672 - https://issues.chromium.org/issues/41485789
|
||
|
CVE-2024-1675 - https://issues.chromium.org/issues/41486208
|
||
|
CVE-2024-1676 - https://issues.chromium.org/issues/40944847
|
||
|
CVE-2024-1700 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS
|
||
|
CVE-2024-1701 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control
|
||
|
CVE-2024-1702 - https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection
|
||
|
CVE-2024-1703 - https://vuldb.com/?id.254391
|
||
|
CVE-2024-1704 - https://vuldb.com/?id.254392
|
||
|
CVE-2024-1705 - https://vuldb.com/?id.254393
|
||
|
CVE-2024-1707 - https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md
|
||
|
CVE-2024-1708 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
|
||
|
CVE-2024-1709 - https://github.com/rapid7/metasploit-framework/pull/18870
|
||
|
CVE-2024-1709 - https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
|
||
|
CVE-2024-1709 - https://techcrunch.com/2024/02/21/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit/
|
||
|
CVE-2024-1709 - https://www.bleepingcomputer.com/news/security/connectwise-urges-screenconnect-admins-to-patch-critical-rce-flaw/
|
||
|
CVE-2024-1709 - https://www.horizon3.ai/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/
|
||
|
CVE-2024-1709 - https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
|
||
|
CVE-2024-1709 - https://www.huntress.com/blog/detection-guidance-for-connectwise-cwe-288-2
|
||
|
CVE-2024-1709 - https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8
|
||
|
CVE-2024-1712 - https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/
|
||
|
CVE-2024-1713 - https://github.com/google/security-research/security/advisories/GHSA-r7m9-grw7-vcc4
|
||
|
CVE-2024-1743 - https://wpscan.com/vulnerability/3cb1f707-6093-42a7-a778-2b296bdf1735/
|
||
|
CVE-2024-1745 - https://wpscan.com/vulnerability/b63bbfeb-d6f7-4c33-8824-b86d64d3f598/
|
||
|
CVE-2024-1746 - https://wpscan.com/vulnerability/5f35572a-4129-4fe0-a465-d25f4c3b4419/
|
||
|
CVE-2024-1750 - https://vuldb.com/?id.254532
|
||
|
CVE-2024-1752 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/
|
||
|
CVE-2024-1754 - https://wpscan.com/vulnerability/c061e792-e37a-4cf6-b46b-ff111c5a5c84/
|
||
|
CVE-2024-1755 - https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/
|
||
|
CVE-2024-1756 - https://wpscan.com/vulnerability/0baedd8d-2bbe-4091-bec4-f99e25d7290d/
|
||
|
CVE-2024-1781 - https://github.com/Icycu123/X6000R-AX3000-Wifi-6-Giga/blob/main/2/X6000R%20AX3000%20WiFi%206%20Giga%E7%84%A1%E7%B7%9A%E8%B7%AF%E7%94%B1%E5%99%A8%E6%9C%AA%E6%8E%88%E6%9D%83rce.md
|
||
|
CVE-2024-1784 - https://github.com/liyako/vulnerability/blob/main/POC/Limbas-Blind-SQL-injection.md
|
||
|
CVE-2024-1784 - https://vuldb.com/?id.254575
|
||
|
CVE-2024-1821 - https://github.com/jxp98/VulResearch/blob/main/2024/02/2Crime%20Reporting%20System%20-%20SQL%20Injection-police_add.md
|
||
|
CVE-2024-1824 - https://vuldb.com/?id.254612
|
||
|
CVE-2024-1827 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.2Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_login.md
|
||
|
CVE-2024-1828 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.3Library%20System%20In%20PHP%20-%20SQL%20Injection-teacher_reg.md
|
||
|
CVE-2024-1828 - https://vuldb.com/?id.254616
|
||
|
CVE-2024-1829 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.4Library%20System%20In%20PHP%20-%20SQL%20Injection-student_reg.md
|
||
|
CVE-2024-1830 - https://github.com/jxp98/VulResearch/blob/main/2024/02/3.5Library%20System%20In%20PHP%20-%20SQL%20Injection-student_lostpass.md
|
||
|
CVE-2024-1833 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/employee-management-system.md#2accountloginphp
|
||
|
CVE-2024-1834 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Simple-Student-Attendance-System.md#2pageattendancexss
|
||
|
CVE-2024-1846 - https://wpscan.com/vulnerability/ea2a8420-4b0e-4efb-a0c6-ceea996dae5a/
|
||
|
CVE-2024-1849 - https://wpscan.com/vulnerability/e6d9fe28-def6-4f25-9967-a77f91899bfe/
|
||
|
CVE-2024-1871 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/XSS%20Vulnerability%20in%20Project%20Assignment%20Report.md
|
||
|
CVE-2024-1871 - https://vuldb.com/?id.254694
|
||
|
CVE-2024-1874 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
||
|
CVE-2024-1874 - https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7
|
||
|
CVE-2024-1876 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Project%20SQL%20Injection%20Update.md
|
||
|
CVE-2024-1877 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/Employee%20Leave%20Cancel%20SQL%20Injection.md
|
||
|
CVE-2024-1878 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20EMPLOYEE%20MANAGEMENT%20SYSTEM/IDOR%20Employee%20Profile.md
|
||
|
CVE-2024-1892 - https://huntr.com/bounties/271f94f2-1e05-4616-ac43-41752389e26b
|
||
|
CVE-2024-1899 - https://www.tenable.com/security/research/tra-2024-05
|
||
|
CVE-2024-1905 - https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/
|
||
|
CVE-2024-1919 - https://vuldb.com/?id.254854
|
||
|
CVE-2024-1922 - https://vuldb.com/?id.254857
|
||
|
CVE-2024-1923 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BSimple%20Student%20Attendance%20System%20using%20PHP%20and%20MySQL%5D%20SQLi%20on%20ajax-api.php%3Faction=delete_class.md
|
||
|
CVE-2024-1924 - https://github.com/1testnew/CVE_Hunter/blob/main/SQLi-1.md
|
||
|
CVE-2024-1926 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Free%20and%20Open%20Source%20inventory%20management%20system-SQLi.md
|
||
|
CVE-2024-1927 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20SQLi.md
|
||
|
CVE-2024-1928 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Web-Based%20Student%20Clearance%20System%20-%20XSS.md
|
||
|
CVE-2024-1929 - https://www.openwall.com/lists/oss-security/2024/03/04/2
|
||
|
CVE-2024-1930 - https://www.openwall.com/lists/oss-security/2024/03/04/2
|
||
|
CVE-2024-1932 - https://huntr.com/bounties/fefd711e-3bf0-4884-9acc-167649c1f9a2
|
||
|
CVE-2024-1956 - https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/
|
||
|
CVE-2024-1958 - https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/
|
||
|
CVE-2024-1962 - https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/
|
||
|
CVE-2024-1970 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/OnlineLearningSystemV2-XSS.md
|
||
|
CVE-2024-1971 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SQL%20Injection%20Auth.md
|
||
|
CVE-2024-1977 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2022-004
|
||
|
CVE-2024-1981 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/
|
||
|
CVE-2024-1982 - https://research.hisolutions.com/2024/01/multiple-vulnerabilities-in-wordpress-plugin-wpvivid-backup-and-migration/
|
||
|
CVE-2024-1983 - https://wpscan.com/vulnerability/bf3a31de-a227-4db1-bd18-ce6a78dc96fb/
|
||
|
CVE-2024-2002 - https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt
|
||
|
CVE-2024-2014 - https://github.com/mashroompc0527/CVE/blob/main/vul.md
|
||
|
CVE-2024-2018 - https://melapress.com/support/kb/wp-activity-log-plugin-changelog/
|
||
|
CVE-2024-2021 - https://github.com/dtxharry/cve/blob/main/cve.md
|
||
|
CVE-2024-20287 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-inject-bHStWgXO
|
||
|
CVE-2024-20295 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ
|
||
|
CVE-2024-20356 - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb
|
||
|
CVE-2024-2044 - https://www.shielder.com/advisories/pgadmin-path-traversal_leads_to_unsafe_deserialization_and_rce/
|
||
|
CVE-2024-2053 - http://seclists.org/fulldisclosure/2024/Mar/11
|
||
|
CVE-2024-2053 - https://korelogic.com/Resources/Advisories/KL-001-2024-001.txt
|
||
|
CVE-2024-2054 - http://seclists.org/fulldisclosure/2024/Mar/12
|
||
|
CVE-2024-2054 - https://korelogic.com/Resources/Advisories/KL-001-2024-002.txt
|
||
|
CVE-2024-2055 - http://seclists.org/fulldisclosure/2024/Mar/13
|
||
|
CVE-2024-2055 - https://korelogic.com/Resources/Advisories/KL-001-2024-003.txt
|
||
|
CVE-2024-2056 - http://seclists.org/fulldisclosure/2024/Mar/14
|
||
|
CVE-2024-2056 - https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt
|
||
|
CVE-2024-2057 - https://github.com/bayuncao/vul-cve-16/tree/main/PoC.pkl
|
||
|
CVE-2024-2058 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md
|
||
|
CVE-2024-2059 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md
|
||
|
CVE-2024-2060 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/login_crud.php%20SQL%20Injection.md
|
||
|
CVE-2024-2061 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_supplier.php%20SQL%20Injection.md
|
||
|
CVE-2024-2062 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/edit_categories.php%20SQL%20Injection.md
|
||
|
CVE-2024-2063 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/profile_crud.php%20Unauthenticated%20STORED%20XSS.md
|
||
|
CVE-2024-2064 - https://github.com/Andriesces/SelectCours-_Sever-side-Template-injection/blob/main/README.md
|
||
|
CVE-2024-2065 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Barangay%20Population%20Monitoring%20System/Stored%20XSS%20update-resident.php%20.md
|
||
|
CVE-2024-2066 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20add-computer.php%20.md
|
||
|
CVE-2024-2067 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/SQL%20Injection%20delete-computer.php%20.md
|
||
|
CVE-2024-2068 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Computer%20Inventory%20System%20Using%20PHP/STORED%20XSS%20upadte-computer.php%20.md
|
||
|
CVE-2024-2069 - https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/SOURCECODESTER%20%5BFAQ%20Management%20System%20Using%20PHP%20and%20MySQL%5D%20SQLi%20on%20delete-faq.php.md
|
||
|
CVE-2024-2071 - https://github.com/will121351/wenqin.webray.com.cn/blob/main/CVE-project/faq-management-system.md
|
||
|
CVE-2024-20729 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1890
|
||
|
CVE-2024-2073 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Block%20Inserter%20for%20Dynamic%20Content%20-%20Sql%20Injection.md
|
||
|
CVE-2024-2075 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Daily%20Habit%20Tracker.md
|
||
|
CVE-2024-2077 - https://github.com/yethu123/vulns-finding/blob/main/Simple%20Online%20Bidding%20System.md
|
||
|
CVE-2024-2093 - https://github.com/vektor-inc/vk-all-in-one-expansion-unit/pull/1072
|
||
|
CVE-2024-20954 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20989 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20990 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20991 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20992 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20993 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20994 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20995 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20997 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20998 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-20999 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21000 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21001 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21002 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21003 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21004 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21005 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21006 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21007 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21008 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21009 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-2101 - https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/
|
||
|
CVE-2024-21010 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21011 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21012 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21013 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21014 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21015 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21016 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21017 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21018 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21019 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-2102 - https://wpscan.com/vulnerability/3d15f589-956c-4c71-98b1-3ba89d22262c/
|
||
|
CVE-2024-21020 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21021 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21022 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21023 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21024 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21025 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21026 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21027 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21028 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21029 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21030 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21031 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21032 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21033 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21034 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21035 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21036 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21037 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21038 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21039 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21040 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21041 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21042 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21043 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21044 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21045 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21046 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21047 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21048 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21049 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21050 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21051 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21052 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21053 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21054 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21055 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21056 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21057 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21058 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21059 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21060 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21061 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21062 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21063 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21064 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21065 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21066 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21067 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21068 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21069 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21070 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21071 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21072 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21073 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21074 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21075 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21076 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21077 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21078 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21079 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21080 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21081 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21082 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21083 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21084 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21085 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21086 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21087 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21088 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21089 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21090 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21091 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21092 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21093 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21094 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21095 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21096 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21097 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21098 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21099 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21100 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21101 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21102 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21103 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21104 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21105 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21106 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21107 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21108 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21109 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21110 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21111 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21112 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21113 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21114 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21115 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21116 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21117 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21118 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21119 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21120 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-21121 - https://www.oracle.com/security-alerts/cpuapr2024.html
|
||
|
CVE-2024-2118 - https://wpscan.com/vulnerability/e9d53cb9-a5cb-49f5-bcba-295ae6fa44c3/
|
||
|
CVE-2024-21338 - https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
|
||
|
CVE-2024-21413 - https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/
|
||
|
CVE-2024-2145 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Stored%20XSS%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-2146 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Reflected%20XSS%20in%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-2147 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Sql%20Injection%20Authentication%20Bypass%20in%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-2148 - https://github.com/vanitashtml/CVE-Dumps/blob/main/RCE%20via%20Arbitrary%20File%20Upload%20in%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6070734
|
||
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBKJUR-6070733
|
||
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6070732
|
||
|
CVE-2024-21484 - https://security.snyk.io/vuln/SNYK-JS-JSRSASIGN-6070731
|
||
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084
|
||
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337
|
||
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335
|
||
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334
|
||
|
CVE-2024-21485 - https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336
|
||
|
CVE-2024-21488 - https://gist.github.com/icemonster/282ab98fb68fc22aac7c576538f6369c
|
||
|
CVE-2024-21488 - https://security.snyk.io/vuln/SNYK-JS-NETWORK-6184371
|
||
|
CVE-2024-2149 - https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md
|
||
|
CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746
|
||
|
CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747
|
||
|
CVE-2024-21490 - https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
|
||
|
CVE-2024-21492 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21493 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21493 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078
|
||
|
CVE-2024-21494 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21494 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859
|
||
|
CVE-2024-21495 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21495 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275
|
||
|
CVE-2024-21496 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21496 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860
|
||
|
CVE-2024-21497 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21497 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861
|
||
|
CVE-2024-21498 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21498 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862
|
||
|
CVE-2024-21499 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21499 - https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863
|
||
|
CVE-2024-21500 - https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/
|
||
|
CVE-2024-21501 - https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
|
||
|
CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
|
||
|
CVE-2024-21501 - https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334
|
||
|
CVE-2024-21502 - https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26
|
||
|
CVE-2024-21502 - https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36
|
||
|
CVE-2024-21502 - https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045
|
||
|
CVE-2024-21503 - https://security.snyk.io/vuln/SNYK-PYTHON-BLACK-6256273
|
||
|
CVE-2024-21504 - https://security.snyk.io/vuln/SNYK-PHP-LIVEWIRELIVEWIRE-6446222
|
||
|
CVE-2024-21505 - https://security.snyk.io/vuln/SNYK-JS-WEB3UTILS-6229337
|
||
|
CVE-2024-21506 - https://gist.github.com/keltecc/62a7c2bf74a997d0a7b48a0ff3853a03
|
||
|
CVE-2024-21506 - https://security.snyk.io/vuln/SNYK-PYTHON-PYMONGO-6370597
|
||
|
CVE-2024-21507 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591300
|
||
|
CVE-2024-21508 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591085
|
||
|
CVE-2024-21509 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6591084
|
||
|
CVE-2024-21511 - https://security.snyk.io/vuln/SNYK-JS-MYSQL2-6670046
|
||
|
CVE-2024-2152 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-2153 - https://github.com/vanitashtml/CVE-Dumps/blob/main/SQL%20Injection%20in%20View%20Order%20-%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-2154 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Unauthenticated%20SQL%20Injection%20-%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-2154 - https://vuldb.com/?id.255586
|
||
|
CVE-2024-2159 - https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/
|
||
|
CVE-2024-21623 - https://securitylab.github.com/research/github-actions-untrusted-input/
|
||
|
CVE-2024-21626 - http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
|
||
|
CVE-2024-21632 - https://www.descope.com/blog/post/noauth
|
||
|
CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/commit/d348c43b24a9de350ff6e5bd610545a10c1fc712
|
||
|
CVE-2024-21633 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-2hqv-2xv4-5h5w
|
||
|
CVE-2024-21640 - https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh
|
||
|
CVE-2024-21644 - https://github.com/pyload/pyload/security/advisories/GHSA-mqpq-2p68-46fv
|
||
|
CVE-2024-21645 - https://github.com/pyload/pyload/security/advisories/GHSA-ghmw-rwh8-6qmr
|
||
|
CVE-2024-21652 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv
|
||
|
CVE-2024-21661 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7
|
||
|
CVE-2024-21662 - https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454
|
||
|
CVE-2024-21663 - https://github.com/DEMON1A/Discord-Recon/issues/23
|
||
|
CVE-2024-21664 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3
|
||
|
CVE-2024-21665 - https://github.com/pimcore/ecommerce-framework-bundle/security/advisories/GHSA-cx99-25hr-5jxf
|
||
|
CVE-2024-21666 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-c38c-c8mh-vq68
|
||
|
CVE-2024-21667 - https://github.com/pimcore/customer-data-framework/security/advisories/GHSA-g273-wppx-82w4
|
||
|
CVE-2024-2169 - https://kb.cert.org/vuls/id/417980
|
||
|
CVE-2024-2169 - https://www.kb.cert.org/vuls/id/417980
|
||
|
CVE-2024-21732 - https://github.com/Ghostfox2003/cms/blob/main/1.md
|
||
|
CVE-2024-21733 - http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html
|
||
|
CVE-2024-2180 - https://fluidattacks.com/advisories/gomez/
|
||
|
CVE-2024-21887 - http://packetstormsecurity.com/files/176668/Ivanti-Connect-Secure-Unauthenticated-Remote-Code-Execution.html
|
||
|
CVE-2024-2189 - https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af468eb6/
|
||
|
CVE-2024-21907 - https://alephsecurity.com/vulns/aleph-2018004
|
||
|
CVE-2024-21907 - https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678
|
||
|
CVE-2024-2193 - https://www.vusec.net/projects/ghostrace/
|
||
|
CVE-2024-22049 - https://github.com/advisories/GHSA-5pq7-52mg-hr42
|
||
|
CVE-2024-22049 - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42
|
||
|
CVE-2024-22086 - https://github.com/hayyp/cherry/issues/1
|
||
|
CVE-2024-22087 - https://github.com/foxweb/pico/issues/31
|
||
|
CVE-2024-22088 - https://github.com/chendotjs/lotos/issues/7
|
||
|
CVE-2024-22107 - https://adepts.of0x.cc/gtbcc-pwned/
|
||
|
CVE-2024-22107 - https://x-c3ll.github.io/cves.html
|
||
|
CVE-2024-22108 - https://adepts.of0x.cc/gtbcc-pwned/
|
||
|
CVE-2024-22108 - https://x-c3ll.github.io/cves.html
|
||
|
CVE-2024-22120 - https://support.zabbix.com/browse/ZBX-24505
|
||
|
CVE-2024-22144 - https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve
|
||
|
CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/pull/1792
|
||
|
CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx
|
||
|
CVE-2024-22191 - https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h
|
||
|
CVE-2024-22194 - https://github.com/casework/CASE-Utilities-Python/commit/db428a0745dac4fdd888ced9c52f617695519f9d
|
||
|
CVE-2024-22196 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c
|
||
|
CVE-2024-22197 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-pxmr-q2x3-9x9m
|
||
|
CVE-2024-22198 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-8r25-68wm-jw35
|
||
|
CVE-2024-2220 - https://wpscan.com/vulnerability/fe8c001e-8880-4570-b010-a41fc8ee0c58/
|
||
|
CVE-2024-22202 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6648-6g96-mg35
|
||
|
CVE-2024-22208 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-9hhf-xmcw-r3xg
|
||
|
CVE-2024-22211 - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59
|
||
|
CVE-2024-22318 - http://packetstormsecurity.com/files/177069/IBM-i-Access-Client-Solutions-Remote-Credential-Theft.html
|
||
|
CVE-2024-22318 - http://seclists.org/fulldisclosure/2024/Feb/7
|
||
|
CVE-2024-22368 - http://www.openwall.com/lists/oss-security/2024/01/10/2
|
||
|
CVE-2024-22368 - https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md
|
||
|
CVE-2024-22368 - https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes
|
||
|
CVE-2024-22368 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html
|
||
|
CVE-2024-22409 - https://github.com/datahub-project/datahub/security/advisories/GHSA-x3v6-r479-m4xv
|
||
|
CVE-2024-22411 - https://github.com/avo-hq/avo/security/advisories/GHSA-g8vp-2v5p-9qfh
|
||
|
CVE-2024-22412 - https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r
|
||
|
CVE-2024-22414 - https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-mrcw-j96f-p6v6
|
||
|
CVE-2024-22416 - https://github.com/pyload/pyload/security/advisories/GHSA-pgpj-v85q-h5fm
|
||
|
CVE-2024-22418 - https://github.com/Intermesh/groupoffice/security/advisories/GHSA-p7w9-h6c3-wqpp
|
||
|
CVE-2024-22419 - https://github.com/vyperlang/vyper/security/advisories/GHSA-2q8v-3gqq-4f8p
|
||
|
CVE-2024-22422 - https://github.com/Mintplex-Labs/anything-llm/security/advisories/GHSA-xmj6-g32r-fc5q
|
||
|
CVE-2024-22490 - https://github.com/cui2shark/security/blob/main/beetl-bbs%20-%20A%20reflected%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20the%20search%20box.md
|
||
|
CVE-2024-22491 - https://github.com/cui2shark/security/blob/main/A%20stored%20cross-site%20scripting%20(XSS)%20vulnerability%20was%20discovered%20in%20beetl-bbs%20post%20save.md
|
||
|
CVE-2024-22496 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-username)%20.md
|
||
|
CVE-2024-22497 - https://github.com/cui2shark/security/blob/main/(JFinalcms%20admin-login-password)%20.md
|
||
|
CVE-2024-22514 - https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution
|
||
|
CVE-2024-22515 - https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability
|
||
|
CVE-2024-22526 - https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3
|
||
|
CVE-2024-22529 - https://github.com/unpWn4bL3/iot-security/blob/main/29.md
|
||
|
CVE-2024-22532 - https://github.com/pwndorei/CVE-2024-22532
|
||
|
CVE-2024-22550 - https://packetstormsecurity.com/files/176312/ShopSite-14.0-Cross-Site-Scripting.html
|
||
|
CVE-2024-22551 - https://packetstormsecurity.com/files/176314/WhatACart-2.0.7-Cross-Site-Scripting.html
|
||
|
CVE-2024-22562 - https://github.com/matthiaskramm/swftools/issues/210
|
||
|
CVE-2024-22563 - https://github.com/openvswitch/ovs-issues/issues/315
|
||
|
CVE-2024-22568 - https://github.com/kayo-zjq/myc/blob/main/1.md
|
||
|
CVE-2024-22569 - https://github.com/Num-Nine/CVE/issues/12
|
||
|
CVE-2024-22570 - https://github.com/Num-Nine/CVE/issues/11
|
||
|
CVE-2024-22591 - https://github.com/ysuzhangbin/cms2/blob/main/1.md
|
||
|
CVE-2024-22592 - https://github.com/ysuzhangbin/cms2/blob/main/2.md
|
||
|
CVE-2024-22593 - https://github.com/ysuzhangbin/cms2/blob/main/3.md
|
||
|
CVE-2024-22601 - https://github.com/ljw11e/cms/blob/main/5.md
|
||
|
CVE-2024-22603 - https://github.com/ljw11e/cms/blob/main/4.md
|
||
|
CVE-2024-2262 - https://wpscan.com/vulnerability/30544377-b90d-4762-b38a-ec89bda0dfdc/
|
||
|
CVE-2024-2263 - https://wpscan.com/vulnerability/ec092ed9-eb3e-40a7-a878-ab854104e290/
|
||
|
CVE-2024-22632 - https://tomiodarim.io/posts/cve-2024-22632-3/
|
||
|
CVE-2024-22633 - https://tomiodarim.io/posts/cve-2024-22632-3/
|
||
|
CVE-2024-22635 - https://packetstormsecurity.com/files/176365/WebCalendar-1.3.0-Cross-Site-Scripting.html
|
||
|
CVE-2024-22637 - https://packetstormsecurity.com/files/176403/Form-Tools-3.1.1-Cross-Site-Scripting.html
|
||
|
CVE-2024-22638 - https://packetstormsecurity.com/files/176420/liveSite-2019.1-Remote-Code-Execution.html
|
||
|
CVE-2024-22638 - https://www.exploit-db.com/exploits/51936
|
||
|
CVE-2024-22639 - https://packetstormsecurity.com/files/176411/iGalerie-3.0.22-Cross-Site-Scripting.html
|
||
|
CVE-2024-2264 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md
|
||
|
CVE-2024-22640 - https://github.com/zunak/CVE-2024-22640
|
||
|
CVE-2024-22651 - https://github.com/goldds96/Report/blob/main/DLink/DIR-815/CI.md
|
||
|
CVE-2024-22660 - https://github.com/Covteam/iot_vuln/tree/main/setLanguageCfg
|
||
|
CVE-2024-22662 - https://github.com/Covteam/iot_vuln/tree/main/setParentalRules
|
||
|
CVE-2024-22663 - https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2
|
||
|
CVE-2024-22667 - https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt
|
||
|
CVE-2024-22667 - https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47
|
||
|
CVE-2024-2267 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md
|
||
|
CVE-2024-2268 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md
|
||
|
CVE-2024-2269 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/SQL%20Injection%20Search/SQL%20Injection%20in%20search.php%20.md
|
||
|
CVE-2024-22699 - https://github.com/biantaibao/cms/blob/main/1.md
|
||
|
CVE-2024-2270 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/StoredXSS%20Signup/Stored%20XSS%20signup.php%20.md
|
||
|
CVE-2024-2271 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Shop/Blind%20SQL%20Injection%20Shop.php%20.md
|
||
|
CVE-2024-22715 - https://github.com/RumblingIsOccupied/cms/blob/main/1.md
|
||
|
CVE-2024-2272 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Blind%20SQL%20Injection%20%20Home/Blind%20SQL%20Injection%20Home.php%20.md
|
||
|
CVE-2024-22727 - https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways
|
||
|
CVE-2024-22729 - https://github.com/adhikara13/CVE/blob/main/netis_MW5360/blind%20command%20injection%20in%20password%20parameter%20in%20initial%20settings.md
|
||
|
CVE-2024-22734 - https://www.redlinecybersecurity.com/blog/cve-2024-22734
|
||
|
CVE-2024-22749 - https://github.com/gpac/gpac/issues/2713
|
||
|
CVE-2024-22749 - https://github.com/hanxuer/crashes/blob/main/gapc/01/readme.md
|
||
|
CVE-2024-22751 - https://github.com/5erua/vuls/blob/main/dir882.md
|
||
|
CVE-2024-22751 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-22752 - https://github.com/hacker625/CVE-2024-22752
|
||
|
CVE-2024-2277 - https://vuldb.com/?id.256046
|
||
|
CVE-2024-22773 - https://medium.com/@wagneralves_87750/poc-cve-2024-22773-febf0d3a5433
|
||
|
CVE-2024-22773 - https://www.youtube.com/watch?v=-r0TWJq55DU&t=7s
|
||
|
CVE-2024-2278 - https://wpscan.com/vulnerability/2cbabde8-1e3e-4205-8a5c-b889447236a0/
|
||
|
CVE-2024-22795 - https://github.com/Hagrid29/ForeScout-SecureConnector-EoP
|
||
|
CVE-2024-2281 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/BROKEN%20ACCESS%20CONTROL%20.md
|
||
|
CVE-2024-22817 - https://github.com/mafangqian/cms/blob/main/1.md
|
||
|
CVE-2024-22818 - https://github.com/mafangqian/cms/blob/main/3.md
|
||
|
CVE-2024-22819 - https://github.com/mafangqian/cms/blob/main/2.md
|
||
|
CVE-2024-2282 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20Login.md
|
||
|
CVE-2024-2282 - https://vuldb.com/?id.256049
|
||
|
CVE-2024-2283 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/SQL%20Injection%20member-view.php%20.md
|
||
|
CVE-2024-22830 - https://www.defencetech.it/wp-content/uploads/2024/04/Report-CVE-2024-22830.pdf
|
||
|
CVE-2024-22836 - https://github.com/u32i/cve/tree/main/CVE-2024-22836
|
||
|
CVE-2024-2284 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-chat.php%20.md
|
||
|
CVE-2024-2285 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/boyiddha%20utomated-Mess-Management-System/STORED%20XSS%20member-member-edit.php%20.md
|
||
|
CVE-2024-22851 - https://www.drive-byte.de/en/blog/liveconfig-advisory-cve-2024-22851
|
||
|
CVE-2024-22852 - https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md
|
||
|
CVE-2024-22852 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-22853 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-22854 - https://tomekwasiak.pl/cve-2024-22854/
|
||
|
CVE-2024-22856 - https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html
|
||
|
CVE-2024-22857 - https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857
|
||
|
CVE-2024-22859 - https://github.com/github/advisory-database/pull/3490
|
||
|
CVE-2024-22871 - https://hackmd.io/@fe1w0/rymmJGida
|
||
|
CVE-2024-22889 - https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9
|
||
|
CVE-2024-22891 - https://github.com/EQSTLab/PoC/tree/main/2024/RCE/CVE-2024-22891
|
||
|
CVE-2024-22899 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
||
|
CVE-2024-22900 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
||
|
CVE-2024-22901 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
||
|
CVE-2024-22902 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
||
|
CVE-2024-22903 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
||
|
CVE-2024-22911 - https://github.com/matthiaskramm/swftools/issues/216
|
||
|
CVE-2024-22912 - https://github.com/matthiaskramm/swftools/issues/212
|
||
|
CVE-2024-22913 - https://github.com/matthiaskramm/swftools/issues/213
|
||
|
CVE-2024-22914 - https://github.com/matthiaskramm/swftools/issues/214
|
||
|
CVE-2024-22915 - https://github.com/matthiaskramm/swftools/issues/215
|
||
|
CVE-2024-22916 - https://kee02p.github.io/2024/01/13/CVE-2024-22916/
|
||
|
CVE-2024-22916 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-22919 - https://github.com/matthiaskramm/swftools/issues/209
|
||
|
CVE-2024-22920 - https://github.com/matthiaskramm/swftools/issues/211
|
||
|
CVE-2024-22923 - https://gist.github.com/whiteman007/
|
||
|
CVE-2024-22927 - https://github.com/weng-xianhu/eyoucms/issues/57
|
||
|
CVE-2024-22939 - https://github.com/NUDTTAN91/CVE-2024-22939
|
||
|
CVE-2024-22939 - https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md
|
||
|
CVE-2024-22942 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/1/TOTOlink%20A3300R%20setWanCfg.md
|
||
|
CVE-2024-22955 - https://github.com/matthiaskramm/swftools/issues/207
|
||
|
CVE-2024-22956 - https://github.com/matthiaskramm/swftools/issues/208
|
||
|
CVE-2024-22957 - https://github.com/matthiaskramm/swftools/issues/206
|
||
|
CVE-2024-22983 - https://github.com/keru6k/CVE-2024-22983/blob/main/CVE-2024-22983.md
|
||
|
CVE-2024-22988 - https://gist.github.com/whiteman007/b50a9b64007a5d7bcb7a8bee61d2cb47
|
||
|
CVE-2024-22988 - https://www.vicarius.io/vsociety/posts/revealing-cve-2024-22988-a-unique-dive-into-exploiting-access-control-gaps-in-zkbio-wdms-uncover-the-untold-crafted-for-beginners-with-a-rare-glimpse-into-pentesting-strategies
|
||
|
CVE-2024-23031 - https://github.com/weng-xianhu/eyoucms/issues/57
|
||
|
CVE-2024-23032 - https://github.com/weng-xianhu/eyoucms/issues/57
|
||
|
CVE-2024-23033 - https://github.com/weng-xianhu/eyoucms/issues/57
|
||
|
CVE-2024-23034 - https://github.com/weng-xianhu/eyoucms/issues/57
|
||
|
CVE-2024-23052 - https://github.com/WuKongOpenSource/WukongCRM-9.0-JAVA/issues/28
|
||
|
CVE-2024-23054 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-23054/README.md
|
||
|
CVE-2024-23055 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23055
|
||
|
CVE-2024-23057 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/5/TOTOlink%20A3300R%20setNtpCfg.md
|
||
|
CVE-2024-23058 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/6/TOTOlink%20A3300R%20setTr069Cfg.md
|
||
|
CVE-2024-23059 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/2/TOTOlink%20A3300R%20setDdnsCfg.md
|
||
|
CVE-2024-23060 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/4/TOTOLINK%20A3300R%20setDmzCfg.md
|
||
|
CVE-2024-23061 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/3/TOTOLINK%20A3300R%20setScheduleCfg.md
|
||
|
CVE-2024-2307 - https://bugzilla.redhat.com/show_bug.cgi?id=2268513
|
||
|
CVE-2024-2309 - https://wpscan.com/vulnerability/a4152818-1e07-46a7-aec4-70f1a1b579a6/
|
||
|
CVE-2024-23094 - https://github.com/TinkAnet/cve/blob/main/csrf3.md
|
||
|
CVE-2024-2310 - https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/
|
||
|
CVE-2024-2318 - https://gist.github.com/whiteman007/a3b25a7ddf38774329d72930e0cd841a
|
||
|
CVE-2024-2322 - https://wpscan.com/vulnerability/c740ed3b-d6b8-4afc-8c6b-a1ec37597055/
|
||
|
CVE-2024-2329 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_resource_icon.md
|
||
|
CVE-2024-2330 - https://github.com/jikedaodao/cve/blob/main/NS-ASG-sql-addmacbind.md
|
||
|
CVE-2024-23301 - https://github.com/rear/rear/pull/3123
|
||
|
CVE-2024-2332 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md
|
||
|
CVE-2024-23329 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-hcvp-2cc7-jrwr
|
||
|
CVE-2024-2333 - https://github.com/0x404Ming/CVE_Hunter/blob/main/SQLi-3.md
|
||
|
CVE-2024-23330 - https://github.com/tutao/tutanota/security/advisories/GHSA-32w8-v5fc-vpp7
|
||
|
CVE-2024-23331 - https://github.com/vitejs/vite/security/advisories/GHSA-c24v-8rfc-w8vw
|
||
|
CVE-2024-23334 - https://github.com/aio-libs/aiohttp/pull/8079
|
||
|
CVE-2024-23342 - https://minerva.crocs.fi.muni.cz/
|
||
|
CVE-2024-23346 - https://github.com/materialsproject/pymatgen/security/advisories/GHSA-vgv8-5cpj-qj2f
|
||
|
CVE-2024-2344 - https://gist.github.com/Xib3rR4dAr/05a32f63d75082ab05de27e313e70fa3
|
||
|
CVE-2024-23446 - https://www.elastic.co/community/security
|
||
|
CVE-2024-23447 - https://www.elastic.co/community/security
|
||
|
CVE-2024-23448 - https://www.elastic.co/community/security
|
||
|
CVE-2024-23450 - https://www.elastic.co/community/security
|
||
|
CVE-2024-23525 - https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a
|
||
|
CVE-2024-23525 - https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes
|
||
|
CVE-2024-23525 - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html
|
||
|
CVE-2024-2353 - https://github.com/OraclePi/repo/blob/main/totolink%20X6000R/1/X6000R%20AX3000%20WiFi%206%20Giga%20unauthed%20rce.md
|
||
|
CVE-2024-2355 - https://vuldb.com/?id.256315
|
||
|
CVE-2024-23633 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-fq23-g58m-799r
|
||
|
CVE-2024-23634 - https://github.com/geoserver/geoserver/security/advisories/GHSA-75m5-hh4r-q9gx
|
||
|
CVE-2024-23634 - https://osgeo-org.atlassian.net/browse/GEOS-11213
|
||
|
CVE-2024-2364 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Musicshelf_Manifest_issue.md
|
||
|
CVE-2024-23640 - https://github.com/geoserver/geoserver/security/advisories/GHSA-9rfr-pf2x-g4xf
|
||
|
CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11149
|
||
|
CVE-2024-23640 - https://osgeo-org.atlassian.net/browse/GEOS-11155
|
||
|
CVE-2024-23641 - https://github.com/sveltejs/kit/security/advisories/GHSA-g5m6-hxpp-fc49
|
||
|
CVE-2024-23642 - https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525
|
||
|
CVE-2024-23642 - https://osgeo-org.atlassian.net/browse/GEOS-11152
|
||
|
CVE-2024-23643 - https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7
|
||
|
CVE-2024-23646 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-cwx6-4wmf-c6xv
|
||
|
CVE-2024-23648 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-mrqg-mwh7-q94j
|
||
|
CVE-2024-23649 - https://github.com/LemmyNet/lemmy/security/advisories/GHSA-r64r-5h43-26qv
|
||
|
CVE-2024-2365 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md
|
||
|
CVE-2024-23655 - https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g
|
||
|
CVE-2024-23656 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r
|
||
|
CVE-2024-23660 - https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/
|
||
|
CVE-2024-23674 - https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1
|
||
|
CVE-2024-23681 - https://github.com/advisories/GHSA-98hq-4wmw-98w9
|
||
|
CVE-2024-23681 - https://github.com/ls1intum/Ares/security/advisories/GHSA-98hq-4wmw-98w9
|
||
|
CVE-2024-23686 - https://github.com/advisories/GHSA-qqhq-8r2c-c3f5
|
||
|
CVE-2024-23686 - https://github.com/jeremylong/DependencyCheck/security/advisories/GHSA-qqhq-8r2c-c3f5
|
||
|
CVE-2024-2369 - https://wpscan.com/vulnerability/252dfc35-4c8c-4304-aa09-73dfe986b10d/
|
||
|
CVE-2024-23709 - https://android.googlesource.com/platform/external/sonivox/+/3f798575d2d39cd190797427d13471d6e7ceae4c
|
||
|
CVE-2024-23717 - https://android.googlesource.com/platform/packages/modules/Bluetooth/+/c5c528beb6e1cfed3ec93a3a264084df32ce83c2
|
||
|
CVE-2024-23722 - https://medium.com/@adurands82/fluent-bit-dos-vulnerability-cve-2024-23722-4e3e74af9d00
|
||
|
CVE-2024-23724 - https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2024-23724
|
||
|
CVE-2024-23745 - https://blog.xpnsec.com/dirtynib/
|
||
|
CVE-2024-23745 - https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model
|
||
|
CVE-2024-23745 - https://github.com/louiselalanne/CVE-2024-23745
|
||
|
CVE-2024-23746 - https://github.com/louiselalanne/CVE-2024-23746
|
||
|
CVE-2024-23747 - https://github.com/louiselalanne/CVE-2024-23747
|
||
|
CVE-2024-23749 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html
|
||
|
CVE-2024-23749 - http://seclists.org/fulldisclosure/2024/Feb/14
|
||
|
CVE-2024-23752 - https://github.com/gventuri/pandas-ai/issues/868
|
||
|
CVE-2024-23756 - https://github.com/c0d3x27/CVEs/tree/main/CVE-2024-23756
|
||
|
CVE-2024-23759 - https://herolab.usd.de/security-advisories/usd-2023-0046/
|
||
|
CVE-2024-23760 - https://herolab.usd.de/security-advisories/usd-2023-0050/
|
||
|
CVE-2024-23761 - https://herolab.usd.de/security-advisories/usd-2023-0048/
|
||
|
CVE-2024-23762 - https://herolab.usd.de/security-advisories/usd-2023-0049/
|
||
|
CVE-2024-23763 - https://herolab.usd.de/security-advisories/usd-2023-0047/
|
||
|
CVE-2024-23817 - https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-7947-48q7-cp5m
|
||
|
CVE-2024-23818 - https://osgeo-org.atlassian.net/browse/GEOS-11153
|
||
|
CVE-2024-23819 - https://osgeo-org.atlassian.net/browse/GEOS-11154
|
||
|
CVE-2024-23822 - https://github.com/sni/Thruk/security/advisories/GHSA-4mrh-mx7x-rqjx
|
||
|
CVE-2024-23824 - https://github.com/0xbunniee/MailCow-Pixel-Flood-Attack
|
||
|
CVE-2024-23824 - https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-45rv-3c5p-w4h7
|
||
|
CVE-2024-23825 - https://github.com/TablePress/TablePress/security/advisories/GHSA-x8rf-c8x6-mrpg
|
||
|
CVE-2024-23826 - https://github.com/spbu-se/spbu_se_site/security/advisories/GHSA-5vfc-v7hg-pvwm
|
||
|
CVE-2024-23827 - https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m
|
||
|
CVE-2024-23829 - https://github.com/aio-libs/aiohttp/pull/8074
|
||
|
CVE-2024-23829 - https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2
|
||
|
CVE-2024-23833 - https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-6p92-qfqf-qwx4
|
||
|
CVE-2024-23837 - https://redmine.openinfosecfoundation.org/issues/6444
|
||
|
CVE-2024-23850 - https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA@mail.gmail.com/
|
||
|
CVE-2024-23897 - http://packetstormsecurity.com/files/176839/Jenkins-2.441-LTS-2.426.3-CVE-2024-23897-Scanner.html
|
||
|
CVE-2024-23897 - http://packetstormsecurity.com/files/176840/Jenkins-2.441-LTS-2.426.3-Arbitrary-File-Read.html
|
||
|
CVE-2024-2391 - https://www.exploit-db.com/exploits/51153
|
||
|
CVE-2024-2394 - https://github.com/LiAoRJ/CVE_Hunter/blob/main/RCE-1.md
|
||
|
CVE-2024-23940 - https://medium.com/@s1kr10s/av-when-a-friend-becomes-an-enemy-55f41aba42b1
|
||
|
CVE-2024-23985 - https://packetstormsecurity.com/files/176663/EzServer-6.4.017-Denial-Of-Service.html
|
||
|
CVE-2024-24001 - https://github.com/jishenghua/jshERP/issues/99
|
||
|
CVE-2024-24002 - https://github.com/jishenghua/jshERP/issues/99
|
||
|
CVE-2024-24003 - https://github.com/jishenghua/jshERP/issues/99
|
||
|
CVE-2024-24004 - https://github.com/jishenghua/jshERP/issues/99
|
||
|
CVE-2024-2402 - https://wpscan.com/vulnerability/98e050cf-5686-4216-bad1-575decf3eaa7/
|
||
|
CVE-2024-24034 - https://github.com/ELIZEUOPAIN/CVE-2024-24034/tree/main
|
||
|
CVE-2024-24035 - https://github.com/ELIZEUOPAIN/CVE-2024-24035/tree/main
|
||
|
CVE-2024-2404 - https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/
|
||
|
CVE-2024-24041 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md
|
||
|
CVE-2024-24041 - https://portswigger.net/web-security/cross-site-scripting
|
||
|
CVE-2024-2405 - https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/
|
||
|
CVE-2024-24050 - https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050
|
||
|
CVE-2024-24059 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability
|
||
|
CVE-2024-24062 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#12-stored-cross-site-scripting-sysrole
|
||
|
CVE-2024-24115 - https://mechaneus.github.io/CVE-2024-24115.html
|
||
|
CVE-2024-24115 - https://mechaneus.github.io/CVE-PENDING-COTONTI.html
|
||
|
CVE-2024-24130 - https://github.com/Hebing123/cve/issues/13
|
||
|
CVE-2024-24131 - https://github.com/Hebing123/cve/issues/14
|
||
|
CVE-2024-24133 - https://github.com/Hebing123/cve/issues/16
|
||
|
CVE-2024-24134 - https://github.com/BurakSevben/2024_Online_Food_Menu_XSS/
|
||
|
CVE-2024-24135 - https://github.com/BurakSevben/2024_Product_Inventory_with_Export_to_Excel_XSS/
|
||
|
CVE-2024-24136 - https://github.com/BurakSevben/2024_Math_Game_XSS
|
||
|
CVE-2024-24139 - https://github.com/BurakSevben/Login_System_with_Email_Verification_SQL_Injection/
|
||
|
CVE-2024-24140 - https://github.com/BurakSevben/Daily_Habit_Tracker_App_SQL_Injection
|
||
|
CVE-2024-24141 - https://github.com/BurakSevben/School-Task-Manager-System-SQLi-1
|
||
|
CVE-2024-24142 - https://github.com/BurakSevben/School-Task-Manager-SQL-Injection-2
|
||
|
CVE-2024-24146 - https://github.com/libming/libming/issues/307
|
||
|
CVE-2024-24147 - https://github.com/libming/libming/issues/311
|
||
|
CVE-2024-24148 - https://github.com/libming/libming/issues/308
|
||
|
CVE-2024-24149 - https://github.com/libming/libming/issues/310
|
||
|
CVE-2024-24150 - https://github.com/libming/libming/issues/309
|
||
|
CVE-2024-24155 - https://github.com/axiomatic-systems/Bento4/issues/919
|
||
|
CVE-2024-24156 - https://github.com/gnuboard/g6/issues/316
|
||
|
CVE-2024-24160 - https://github.com/wy876/cve/issues/1
|
||
|
CVE-2024-24161 - https://github.com/wy876/cve/issues/2
|
||
|
CVE-2024-24186 - https://github.com/pcmacdon/jsish/issues/98
|
||
|
CVE-2024-24188 - https://github.com/pcmacdon/jsish/issues/100
|
||
|
CVE-2024-24189 - https://github.com/pcmacdon/jsish/issues/101
|
||
|
CVE-2024-24246 - https://github.com/qpdf/qpdf/issues/1123
|
||
|
CVE-2024-24256 - https://github.com/l8l1/killl.github.io/blob/main/3.md
|
||
|
CVE-2024-2428 - https://wpscan.com/vulnerability/4832e223-4571-4b45-97db-2fd403797c49/
|
||
|
CVE-2024-2429 - https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/
|
||
|
CVE-2024-24300 - https://github.com/yckuo-sdc/PoC
|
||
|
CVE-2024-24301 - https://github.com/yckuo-sdc/PoC
|
||
|
CVE-2024-2432 - https://security.paloaltonetworks.com/CVE-2024-2432
|
||
|
CVE-2024-24321 - https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md
|
||
|
CVE-2024-24321 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-24325 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md
|
||
|
CVE-2024-24326 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/8/TOTOlink%20A3300R%20setStaticDhcpRules.md
|
||
|
CVE-2024-24327 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/7/TOTOlink%20A3300R%20setIpv6Cfg.md
|
||
|
CVE-2024-24328 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/12/TOTOlink%20A3300R%20setMacFilterRules.md
|
||
|
CVE-2024-24329 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/10/TOTOlink%20A3300R%20setPortForwardRules.md
|
||
|
CVE-2024-24330 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/14/TOTOlink%20A3300R%20setRemoteCfg.md
|
||
|
CVE-2024-24331 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/13/TOTOlink%20A3300R%20setWiFiScheduleCfg.md
|
||
|
CVE-2024-24332 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/9/TOTOlink%20A3300R%20setUrlFilterRules.md
|
||
|
CVE-2024-24333 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/15/TOTOlink%20A3300R%20setWiFiAclRules.md
|
||
|
CVE-2024-24336 - https://nitipoom-jar.github.io/CVE-2024-24336/
|
||
|
CVE-2024-24337 - https://nitipoom-jar.github.io/CVE-2024-24337/
|
||
|
CVE-2024-2439 - https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/
|
||
|
CVE-2024-24396 - https://cves.at/posts/cve-2024-24396/writeup/
|
||
|
CVE-2024-24397 - https://cves.at/posts/cve-2024-24397/writeup/
|
||
|
CVE-2024-24398 - https://cves.at/posts/cve-2024-24398/writeup/
|
||
|
CVE-2024-24399 - https://packetstormsecurity.com/files/176647/Lepton-CMS-7.0.0-Remote-Code-Execution.html
|
||
|
CVE-2024-2441 - https://wpscan.com/vulnerability/9647e273-5724-4a02-868d-9b79f4bb2b79/
|
||
|
CVE-2024-2444 - https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/
|
||
|
CVE-2024-24468 - https://github.com/tang-0717/cms/blob/main/3.md
|
||
|
CVE-2024-24469 - https://github.com/tang-0717/cms/blob/main/2.md
|
||
|
CVE-2024-24470 - https://github.com/tang-0717/cms/blob/main/1.md
|
||
|
CVE-2024-24482 - https://github.com/iBotPeaches/Apktool/security/advisories/GHSA-vgwr-4w3p-xmjv
|
||
|
CVE-2024-24494 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Stored_XSS.md
|
||
|
CVE-2024-24495 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/DailyHabitTracker-SQL_Injection.md
|
||
|
CVE-2024-24496 - https://github.com/0xQRx/VunerabilityResearch/blob/master/2024/DailyHabitTracker-Broken_Access_Control.md
|
||
|
CVE-2024-24497 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Login.md
|
||
|
CVE-2024-24498 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-Unauthenticated_Unrestricted_File_Upload_To_RCE.md
|
||
|
CVE-2024-24499 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/EmployeeManagementSystem-SQL_Injection_Admin_Update_Profile.md
|
||
|
CVE-2024-24506 - https://bugs.limesurvey.org/bug_relationship_graph.php?bug_id=19364&graph=relation
|
||
|
CVE-2024-24506 - https://www.exploit-db.com/exploits/51926
|
||
|
CVE-2024-24511 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24511%20-%3E%20Stored%20XSS%20in%20input%20Title%20of%20the%20Component
|
||
|
CVE-2024-24512 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-24512%20-%3E%20Stored%20XSS%20in%20input%20SubTitle%20of%20the%20Component
|
||
|
CVE-2024-24524 - https://github.com/harryrabbit5651/cms/blob/main/1.md
|
||
|
CVE-2024-2453 - https://www.cisa.gov/news-events/ics-advisories/icsa-24-081-01
|
||
|
CVE-2024-24543 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0130/setSchedWifi.md
|
||
|
CVE-2024-24559 - https://github.com/vyperlang/vyper/security/advisories/GHSA-6845-xw22-ffxv
|
||
|
CVE-2024-24560 - https://github.com/vyperlang/vyper/security/advisories/GHSA-gp3w-2v2m-p686
|
||
|
CVE-2024-24561 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2c
|
||
|
CVE-2024-24563 - https://github.com/vyperlang/vyper/security/advisories/GHSA-52xq-j7v9-v4v2
|
||
|
CVE-2024-24564 - https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx
|
||
|
CVE-2024-24565 - https://github.com/crate/crate/security/advisories/GHSA-475g-vj6c-xf96
|
||
|
CVE-2024-24566 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-pf55-fj96-xf37
|
||
|
CVE-2024-24569 - https://github.com/pixee/java-security-toolkit/security/advisories/GHSA-qh4g-4m4w-jgv2
|
||
|
CVE-2024-24570 - http://packetstormsecurity.com/files/177133/Statamic-CMS-Cross-Site-Scripting.html
|
||
|
CVE-2024-24570 - http://seclists.org/fulldisclosure/2024/Feb/17
|
||
|
CVE-2024-24571 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-h7w3-xv88-2xqj
|
||
|
CVE-2024-24572 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-xw34-8pj6-75gc
|
||
|
CVE-2024-24573 - https://github.com/WillyXJ/facileManager/security/advisories/GHSA-w67q-pp62-j4pf
|
||
|
CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/pull/2827
|
||
|
CVE-2024-24574 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-7m8g-fprr-47fx
|
||
|
CVE-2024-24578 - https://github.com/jens-maus/RaspberryMatic/security/advisories/GHSA-q967-q4j8-637h
|
||
|
CVE-2024-24707 - https://snicco.io/vulnerability-disclosure/cwicly/remote-code-execution-cwicly-1-4-0-2?_s_id=cve
|
||
|
CVE-2024-24724 - https://packetstormsecurity.com/files/177857
|
||
|
CVE-2024-24725 - https://www.exploit-db.com/exploits/51903
|
||
|
CVE-2024-24736 - https://packetstormsecurity.com/files/176784/YahooPOPs-1.6-Denial-Of-Service.html
|
||
|
CVE-2024-24747 - https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4
|
||
|
CVE-2024-24752 - https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5
|
||
|
CVE-2024-24753 - https://github.com/brefphp/bref/security/advisories/GHSA-99f9-gv72-fw9r
|
||
|
CVE-2024-24754 - https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w
|
||
|
CVE-2024-24756 - https://github.com/crafatar/crafatar/security/advisories/GHSA-5cxq-25mp-q5f2
|
||
|
CVE-2024-24762 - https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p
|
||
|
CVE-2024-24762 - https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238
|
||
|
CVE-2024-24762 - https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389
|
||
|
CVE-2024-24765 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c
|
||
|
CVE-2024-24766 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm
|
||
|
CVE-2024-24767 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x
|
||
|
CVE-2024-24768 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h
|
||
|
CVE-2024-24793 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
||
|
CVE-2024-24793 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
||
|
CVE-2024-24794 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
||
|
CVE-2024-24794 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1931
|
||
|
CVE-2024-24806 - http://www.openwall.com/lists/oss-security/2024/02/08/2
|
||
|
CVE-2024-24806 - https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6
|
||
|
CVE-2024-24808 - https://github.com/pyload/pyload/security/advisories/GHSA-g3cm-qg2v-2hj5
|
||
|
CVE-2024-24809 - https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5
|
||
|
CVE-2024-24810 - https://github.com/wixtoolset/issues/security/advisories/GHSA-7wh2-wxc7-9ph5
|
||
|
CVE-2024-24814 - https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv
|
||
|
CVE-2024-24818 - https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7j
|
||
|
CVE-2024-24824 - https://github.com/Graylog2/graylog2-server/security/advisories/GHSA-p6gg-5hf4-4rgj
|
||
|
CVE-2024-24830 - https://github.com/openobserve/openobserve/security/advisories/GHSA-hfxx-g56f-8h5v
|
||
|
CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/SetSpeedWan.md
|
||
|
CVE-2024-2485 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md
|
||
|
CVE-2024-2489 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetQosBand.md
|
||
|
CVE-2024-2490 - https://github.com/Emilytutu/IoT-vulnerable/blob/main/Tenda/AC18/setSchedWifi_end.md
|
||
|
CVE-2024-24945 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md
|
||
|
CVE-2024-24945 - https://portswigger.net/web-security/cross-site-scripting
|
||
|
CVE-2024-25003 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html
|
||
|
CVE-2024-25003 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html
|
||
|
CVE-2024-25003 - http://seclists.org/fulldisclosure/2024/Feb/14
|
||
|
CVE-2024-25003 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004
|
||
|
CVE-2024-25004 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html
|
||
|
CVE-2024-25004 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html
|
||
|
CVE-2024-25004 - http://seclists.org/fulldisclosure/2024/Feb/14
|
||
|
CVE-2024-25004 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004
|
||
|
CVE-2024-25007 - https://www.ericsson.com/en/about-us/security/psirt/security-bulletin--ericsson-network-manager-march-2024
|
||
|
CVE-2024-2505 - https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/
|
||
|
CVE-2024-2509 - https://research.cleantalk.org/cve-2024-2509/
|
||
|
CVE-2024-2509 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/
|
||
|
CVE-2024-25106 - https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7
|
||
|
CVE-2024-25108 - https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf
|
||
|
CVE-2024-25117 - https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273
|
||
|
CVE-2024-25122 - https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
|
||
|
CVE-2024-25123 - https://github.com/Open-MSS/MSS/security/advisories/GHSA-pf2h-qjcr-qvq2
|
||
|
CVE-2024-25124 - http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html
|
||
|
CVE-2024-25124 - https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg
|
||
|
CVE-2024-25126 - https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx
|
||
|
CVE-2024-2515 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20home.php.md
|
||
|
CVE-2024-2516 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20home.php.md
|
||
|
CVE-2024-25164 - https://github.com/u32i/cve/tree/main/CVE-2024-25164
|
||
|
CVE-2024-25165 - https://github.com/matthiaskramm/swftools/issues/217
|
||
|
CVE-2024-25166 - https://github.com/xiaocheng-keji/71cms/issues/1
|
||
|
CVE-2024-25167 - https://github.com/biantaibao/eblog_xss/blob/main/report.md
|
||
|
CVE-2024-25168 - https://github.com/biantaibao/snow_SQL/blob/main/report.md
|
||
|
CVE-2024-25169 - https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0
|
||
|
CVE-2024-2517 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Blind%20SQL%20Injection%20-%20book_history.php.md
|
||
|
CVE-2024-25170 - https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0
|
||
|
CVE-2024-2518 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20book_history.php.md
|
||
|
CVE-2024-25180 - https://github.com/joaoviictorti/My-CVES/blob/main/CVE-2024-25180/README.md
|
||
|
CVE-2024-25180 - https://security.snyk.io/vuln/SNYK-JS-PDFMAKE-6347243
|
||
|
CVE-2024-2519 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20navbar.php.md
|
||
|
CVE-2024-25197 - https://github.com/ros-planning/navigation2/issues/3940
|
||
|
CVE-2024-2520 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20bookdate.php.md
|
||
|
CVE-2024-25200 - https://github.com/espruino/Espruino/issues/2457
|
||
|
CVE-2024-25201 - https://github.com/espruino/Espruino/issues/2456
|
||
|
CVE-2024-25202 - https://github.com/Agampreet-Singh/CVE-2024-25202
|
||
|
CVE-2024-25202 - https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52
|
||
|
CVE-2024-25207 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-2.md
|
||
|
CVE-2024-25208 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20XSS-1.md
|
||
|
CVE-2024-25209 - https://github.com/BurakSevben/CVEs/blob/main/Barangay%20Population%20Monitoring%20System/Barangay%20Population%20System%20-%20SQL%20Injection.md
|
||
|
CVE-2024-2521 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20bookdate.php.md
|
||
|
CVE-2024-25210 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tacker%20-%20SQL%20Injection-1.md
|
||
|
CVE-2024-25211 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Expense%20Tracker/Simple%20Expense%20Tracker%20-%20SQL%20Injection-2.md
|
||
|
CVE-2024-25212 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%204.md
|
||
|
CVE-2024-25213 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%203.md
|
||
|
CVE-2024-25214 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20Authentication%20Bypass.md
|
||
|
CVE-2024-25215 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%202.md
|
||
|
CVE-2024-25216 - https://github.com/BurakSevben/CVEs/blob/main/Employee%20Management%20System/Employee%20Managment%20System%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2024-25217 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Medicine%20Ordering%20System/OMOS%20-%20SQL%20Injection(Unauthenticated).md
|
||
|
CVE-2024-25218 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-1.md
|
||
|
CVE-2024-25219 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-%202.md
|
||
|
CVE-2024-2522 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20booktime.php.md
|
||
|
CVE-2024-2522 - https://vuldb.com/?id.256959
|
||
|
CVE-2024-25220 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%202.md
|
||
|
CVE-2024-25221 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20Cross-Site-Scripting%20-3.md
|
||
|
CVE-2024-25222 - https://github.com/BurakSevben/CVEs/blob/main/Task%20Manager%20App/Task%20Manager%20App%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2024-25223 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20SQL%20Injection.md
|
||
|
CVE-2024-25224 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%202.md
|
||
|
CVE-2024-25225 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Admin%20Panel%20App/Simple%20Admin%20Panel%20App%20-%20Cross-Site-Scripting%20-%201.md
|
||
|
CVE-2024-25226 - https://github.com/BurakSevben/CVEs/blob/main/Supplier%20Managment%20System/Supplier%20Managment%20System%20-%20SQL%20Injection.md
|
||
|
CVE-2024-25228 - https://blog.leakix.net/2024/01/vinchin-backup-rce-chain/
|
||
|
CVE-2024-2523 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20booktime.php.md
|
||
|
CVE-2024-25239 - https://blu3ming.github.io/sourcecodester-employee-management-system-sql-injection/
|
||
|
CVE-2024-2524 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20receipt.php.md
|
||
|
CVE-2024-2525 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20receipt.php.md
|
||
|
CVE-2024-2526 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20rooms.php.md
|
||
|
CVE-2024-25260 - https://sourceware.org/bugzilla/show_bug.cgi?id=31058
|
||
|
CVE-2024-25262 - https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912
|
||
|
CVE-2024-25269 - https://github.com/strukturag/libheif/issues/1073
|
||
|
CVE-2024-2527 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20rooms.php.md
|
||
|
CVE-2024-2528 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-rooms.php.md
|
||
|
CVE-2024-25288 - https://github.com/slims/slims9_bulian/issues/229
|
||
|
CVE-2024-2529 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20rooms.php.md
|
||
|
CVE-2024-25291 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25291
|
||
|
CVE-2024-25292 - https://github.com/ji-zzang/EQST-PoC/tree/main/2024/RCE/CVE-2024-25292
|
||
|
CVE-2024-25293 - https://github.com/EQSTLab/PoC/tree/main/2024/LCE/CVE-2024-25293
|
||
|
CVE-2024-25297 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/BLUDIT%20Stored%20XSS.md
|
||
|
CVE-2024-25298 - https://github.com/CpyRe/I-Find-CVE-2024/blob/main/REDAXO%20RCE.md
|
||
|
CVE-2024-2530 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-rooms.php.md
|
||
|
CVE-2024-25300 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/XSS.md
|
||
|
CVE-2024-25301 - https://github.com/WoodManGitHub/MyCVEs/blob/main/2024-REDAXO/RCE.md
|
||
|
CVE-2024-25301 - https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459
|
||
|
CVE-2024-25302 - https://github.com/tubakvgc/CVE/blob/main/Event_Student_Attendance_System.md
|
||
|
CVE-2024-25304 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-2.md
|
||
|
CVE-2024-25305 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass.md
|
||
|
CVE-2024-25306 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-1.md
|
||
|
CVE-2024-25307 - https://github.com/tubakvgc/CVEs/blob/main/Cinema%20Seat%20Reservation%20System/Cinema%20Seat%20Reservation%20System%20-%20SQL%20Injection.md
|
||
|
CVE-2024-25308 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-6.md
|
||
|
CVE-2024-25309 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-7.md
|
||
|
CVE-2024-2531 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Arbitrary%20File%20Upload%20-%20update-rooms.php.md
|
||
|
CVE-2024-25310 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-3.md
|
||
|
CVE-2024-25312 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20SQL%20Injection%20-5.md
|
||
|
CVE-2024-25313 - https://github.com/tubakvgc/CVEs/blob/main/Simple%20School%20Management%20System/Simple%20School%20Managment%20System%20-%20Authentication%20Bypass%20-%202.md
|
||
|
CVE-2024-25314 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-2.md
|
||
|
CVE-2024-25315 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-1.md
|
||
|
CVE-2024-25316 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-4.md
|
||
|
CVE-2024-25318 - https://github.com/tubakvgc/CVEs/blob/main/Hotel%20Managment%20System/Hotel%20Managment%20System%20-%20SQL%20Injection-3.md
|
||
|
CVE-2024-2532 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20update-users.php.md
|
||
|
CVE-2024-25320 - https://github.com/cqliuke/cve/blob/main/sql.md
|
||
|
CVE-2024-25327 - https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html
|
||
|
CVE-2024-2533 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20update-users.php.md
|
||
|
CVE-2024-2534 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20-%20users.php.md
|
||
|
CVE-2024-25343 - https://github.com/ShravanSinghRathore/Tenda-N300-F3-Router/wiki/Password-Policy-Bypass-Vulnerability-CVE%E2%80%902024%E2%80%9025343
|
||
|
CVE-2024-25344 - https://packetstormsecurity.com/files/177224/ITFlow-Cross-Site-Request-Forgery.html
|
||
|
CVE-2024-2535 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/Reflected%20XSS%20-%20users.php.md
|
||
|
CVE-2024-25350 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Edit_Ticket.md
|
||
|
CVE-2024-25351 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/ZooManagementSystem-SQL_Injection_Change_Image.md
|
||
|
CVE-2024-25354 - https://gist.github.com/6en6ar/c3b11b4058b8e2bc54717408d451fb79
|
||
|
CVE-2024-25360 - https://github.com/leetsun/Hints/tree/main/moto-CX2L/4
|
||
|
CVE-2024-25366 - https://github.com/mz-automation/libiec61850/issues/492
|
||
|
CVE-2024-25369 - https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20(XSS).md
|
||
|
CVE-2024-25373 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_49B384.md
|
||
|
CVE-2024-2538 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e
|
||
|
CVE-2024-25385 - https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md
|
||
|
CVE-2024-25385 - https://github.com/noirotm/flvmeta/issues/23
|
||
|
CVE-2024-25386 - https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2
|
||
|
CVE-2024-25386 - https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/
|
||
|
CVE-2024-25398 - https://github.com/Nivedita-22/SRELAY-exploit-writeup/blob/main/Srelay.md
|
||
|
CVE-2024-25410 - https://github.com/flusity/flusity-CMS/issues/9
|
||
|
CVE-2024-25413 - https://github.com/capture0x/Magento-ver.-2.4.6
|
||
|
CVE-2024-25413 - https://packetstormsecurity.com/files/175801/FireBear-Improved-Import-And-Export-3.8.6-XSLT-Server-Side-Injection.html
|
||
|
CVE-2024-25414 - https://github.com/capture0x/CSZ_CMS
|
||
|
CVE-2024-25414 - https://packetstormsecurity.com/files/175889/CSZ-CMS-1.3.0-Shell-Upload.html
|
||
|
CVE-2024-25415 - https://github.com/capture0x/Phoenix
|
||
|
CVE-2024-25415 - https://packetstormsecurity.com/files/175913/CE-Phoenix-1.0.8.20-Remote-Command-Execution.html
|
||
|
CVE-2024-25417 - https://github.com/Carl0724/cms/blob/main/3.md
|
||
|
CVE-2024-25418 - https://github.com/Carl0724/cms/blob/main/2.md
|
||
|
CVE-2024-25419 - https://github.com/Carl0724/cms/blob/main/1.md
|
||
|
CVE-2024-25423 - https://github.com/DriverUnload/cve-2024-25423
|
||
|
CVE-2024-25428 - https://github.com/wuweiit/mushroom/issues/19
|
||
|
CVE-2024-2543 - https://gist.github.com/Xib3rR4dAr/a248426dfee107c6fda08e80f98fa894
|
||
|
CVE-2024-25434 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25434%20-%3E%20Stored%20XSS%20in%20input%20public%20name%20of%20the%20Component
|
||
|
CVE-2024-25435 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25435%20-%3E%20Reflected%20XSS%20on%20md1patient%20login%20page
|
||
|
CVE-2024-25436 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions
|
||
|
CVE-2024-25438 - https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions
|
||
|
CVE-2024-25442 - https://bugs.launchpad.net/hugin/+bug/2025032
|
||
|
CVE-2024-25443 - https://bugs.launchpad.net/hugin/+bug/2025035
|
||
|
CVE-2024-25445 - https://bugs.launchpad.net/hugin/+bug/2025038
|
||
|
CVE-2024-25446 - https://bugs.launchpad.net/hugin/+bug/2025037
|
||
|
CVE-2024-25447 - https://github.com/derf/feh/issues/709
|
||
|
CVE-2024-25448 - https://github.com/derf/feh/issues/711
|
||
|
CVE-2024-25450 - https://github.com/derf/feh/issues/712
|
||
|
CVE-2024-25451 - https://github.com/axiomatic-systems/Bento4/issues/872
|
||
|
CVE-2024-25452 - https://github.com/axiomatic-systems/Bento4/issues/873
|
||
|
CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/204
|
||
|
CVE-2024-25453 - https://github.com/axiomatic-systems/Bento4/issues/874
|
||
|
CVE-2024-25454 - https://github.com/axiomatic-systems/Bento4/issues/875
|
||
|
CVE-2024-25458 - https://tanzhuyin.com/posts/cve-2024-25458/
|
||
|
CVE-2024-2546 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md
|
||
|
CVE-2024-2547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md
|
||
|
CVE-2024-25502 - https://github.com/flusity/flusity-CMS/issues/10
|
||
|
CVE-2024-25503 - https://github.com/EQSTLab/PoC/tree/main/2024/XSS/CVE-2024-25503
|
||
|
CVE-2024-25507 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#plan_template_previewaspx
|
||
|
CVE-2024-25508 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#bulletin_template_showaspx
|
||
|
CVE-2024-25509 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_file_downloadaspx
|
||
|
CVE-2024-25510 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_showaspx
|
||
|
CVE-2024-25511 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#address_public_newaspx
|
||
|
CVE-2024-25512 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#attachdownloadaspx
|
||
|
CVE-2024-25513 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#kaizen_downloadaspx
|
||
|
CVE-2024-25514 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_template_child_field_listaspx
|
||
|
CVE-2024-25517 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx
|
||
|
CVE-2024-25518 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx
|
||
|
CVE-2024-25519 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx
|
||
|
CVE-2024-25520 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx
|
||
|
CVE-2024-25521 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx
|
||
|
CVE-2024-25522 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx
|
||
|
CVE-2024-25523 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx
|
||
|
CVE-2024-25524 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx
|
||
|
CVE-2024-25526 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx
|
||
|
CVE-2024-25527 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#worklog_template_showaspx
|
||
|
CVE-2024-25528 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_stat_settingaspx
|
||
|
CVE-2024-2553 - https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md
|
||
|
CVE-2024-25530 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_find_condictionaspx
|
||
|
CVE-2024-25531 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#searchcondictionaspx
|
||
|
CVE-2024-25533 - https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#information-leakage-and-unauthorized-access-to-sensitive-data
|
||
|
CVE-2024-2554 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#3sql-injection-vulnerability-in-update-employeephp
|
||
|
CVE-2024-2555 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp
|
||
|
CVE-2024-2556 - https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md
|
||
|
CVE-2024-2557 - https://github.com/vanitashtml/CVE-Dumps/blob/main/Execute%20After%20Redirect%20-%20Food%20Management%20System.md
|
||
|
CVE-2024-25575 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1963
|
||
|
CVE-2024-25575 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1963
|
||
|
CVE-2024-2558 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md
|
||
|
CVE-2024-2559 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md
|
||
|
CVE-2024-2560 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md
|
||
|
CVE-2024-25618 - https://github.com/mastodon/mastodon/security/advisories/GHSA-vm39-j3vx-pch3
|
||
|
CVE-2024-25619 - https://github.com/mastodon/mastodon/security/advisories/GHSA-7w3c-p9j8-mq3x
|
||
|
CVE-2024-25625 - https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx
|
||
|
CVE-2024-25627 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf
|
||
|
CVE-2024-25634 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv
|
||
|
CVE-2024-25635 - https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f
|
||
|
CVE-2024-25648 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1959
|
||
|
CVE-2024-25648 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1959
|
||
|
CVE-2024-25652 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652
|
||
|
CVE-2024-25653 - https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25653
|
||
|
CVE-2024-2567 - https://github.com/ctflearner/Android_Findings/blob/main/AndroidWeatherApp/Android_backup.md
|
||
|
CVE-2024-25676 - https://excellium-services.com/cert-xlm-advisory/cve-2024-25676
|
||
|
CVE-2024-2568 - https://github.com/bigbigbigbaby/cms/blob/main/5.md
|
||
|
CVE-2024-2569 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20admin-manage-user.php.md
|
||
|
CVE-2024-2570 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md
|
||
|
CVE-2024-2571 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md
|
||
|
CVE-2024-25712 - https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html
|
||
|
CVE-2024-25713 - https://github.com/ibireme/yyjson/security/advisories/GHSA-q4m7-9pcm-fpxh
|
||
|
CVE-2024-2572 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md
|
||
|
CVE-2024-25728 - https://www.bleepingcomputer.com/news/security/expressvpn-bug-has-been-leaking-some-dns-requests-for-years/
|
||
|
CVE-2024-2573 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md
|
||
|
CVE-2024-25730 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-25730
|
||
|
CVE-2024-25734 - http://packetstormsecurity.com/files/177081
|
||
|
CVE-2024-25735 - http://packetstormsecurity.com/files/177082
|
||
|
CVE-2024-25736 - http://packetstormsecurity.com/files/177083
|
||
|
CVE-2024-2574 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md
|
||
|
CVE-2024-25742 - https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
|
||
|
CVE-2024-25746 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/add_white_node.md
|
||
|
CVE-2024-25748 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md
|
||
|
CVE-2024-2575 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md
|
||
|
CVE-2024-25751 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetSysTime.md
|
||
|
CVE-2024-25753 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md
|
||
|
CVE-2024-25756 - https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md
|
||
|
CVE-2024-2576 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md
|
||
|
CVE-2024-2577 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md
|
||
|
CVE-2024-2577 - https://vuldb.com/?id.257080
|
||
|
CVE-2024-25807 - https://github.com/Hebing123/cve/issues/17
|
||
|
CVE-2024-25808 - https://github.com/Hebing123/cve/issues/17
|
||
|
CVE-2024-2581 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md
|
||
|
CVE-2024-25811 - https://github.com/Fei123-design/vuln/blob/master/Dreamer%20CMS%20Unauthorized%20access%20vulnerability.md
|
||
|
CVE-2024-25817 - https://github.com/advisories/GHSA-3qx3-6hxr-j2ch
|
||
|
CVE-2024-25817 - https://www.cubeyond.net/blog/my-cves/eza-cve-report
|
||
|
CVE-2024-25828 - https://github.com/sec-Kode/cve
|
||
|
CVE-2024-2583 - https://wpscan.com/vulnerability/98d8c713-e8cd-4fad-a8fb-7a40db2742a2/
|
||
|
CVE-2024-25830 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
||
|
CVE-2024-25831 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
||
|
CVE-2024-25832 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
||
|
CVE-2024-25833 - https://neroteam.com/blog/f-logic-datacube3-vulnerability-report
|
||
|
CVE-2024-25843 - https://security.friendsofpresta.org/modules/2024/02/27/ba_importer.html
|
||
|
CVE-2024-25850 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md
|
||
|
CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md
|
||
|
CVE-2024-25851 - https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md
|
||
|
CVE-2024-25852 - https://github.com/ZackSecurity/VulnerReport/blob/cve/Linksys/1.md
|
||
|
CVE-2024-25866 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Login.md
|
||
|
CVE-2024-25867 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-SQL_Injection_Add_Type.md
|
||
|
CVE-2024-25868 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Stored_XSS_Add_Type.md
|
||
|
CVE-2024-25869 - https://github.com/0xQRx/VulnerabilityResearch/blob/master/2024/MembershipManagementSystem-Unrestricted_Fileupload.md
|
||
|
CVE-2024-25873 - https://github.com/dd3x3r/enhavo/blob/main/html-injection-page-content-blockquote-author-v0.13.1.md
|
||
|
CVE-2024-25874 - https://github.com/dd3x3r/enhavo/blob/main/xss-create-tag-v0.13.1.md
|
||
|
CVE-2024-25875 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-undertitel-v0.13.1.md
|
||
|
CVE-2024-25876 - https://github.com/dd3x3r/enhavo/blob/main/xss-page-content-header-titel-v0.13.1.md
|
||
|
CVE-2024-25891 - https://github.com/ChurchCRM/CRM/issues/6856
|
||
|
CVE-2024-25892 - https://github.com/ChurchCRM/CRM/issues/6858
|
||
|
CVE-2024-25893 - https://github.com/ChurchCRM/CRM/issues/6856
|
||
|
CVE-2024-25894 - https://github.com/ChurchCRM/CRM/issues/6849
|
||
|
CVE-2024-25895 - https://github.com/ChurchCRM/CRM/issues/6853
|
||
|
CVE-2024-25896 - https://github.com/ChurchCRM/CRM/issues/6854
|
||
|
CVE-2024-25897 - https://github.com/ChurchCRM/CRM/issues/6856
|
||
|
CVE-2024-25898 - https://github.com/ChurchCRM/CRM/issues/6851
|
||
|
CVE-2024-25938 - https://talosintelligence.com/vulnerability_reports/TALOS-2024-1958
|
||
|
CVE-2024-25938 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1958
|
||
|
CVE-2024-25973 - http://seclists.org/fulldisclosure/2024/Feb/23
|
||
|
CVE-2024-25973 - https://r.sec-consult.com/openolat
|
||
|
CVE-2024-25974 - http://seclists.org/fulldisclosure/2024/Feb/23
|
||
|
CVE-2024-25974 - https://r.sec-consult.com/openolat
|
||
|
CVE-2024-2603 - https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/
|
||
|
CVE-2024-2604 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md
|
||
|
CVE-2024-26134 - https://github.com/agronholm/cbor2/security/advisories/GHSA-375g-39jq-vq7m
|
||
|
CVE-2024-26135 - https://github.com/Ylianst/MeshCentral/security/advisories/GHSA-cp68-qrhr-g9h8
|
||
|
CVE-2024-26149 - https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w
|
||
|
CVE-2024-26152 - https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg
|
||
|
CVE-2024-2627 - https://issues.chromium.org/issues/41493290
|
||
|
CVE-2024-26329 - https://x41-dsec.de/lab/advisories/x41-2024-001-chilkat-prng/
|
||
|
CVE-2024-26333 - https://github.com/matthiaskramm/swftools/issues/219
|
||
|
CVE-2024-26334 - https://github.com/matthiaskramm/swftools/issues/221
|
||
|
CVE-2024-26335 - https://github.com/matthiaskramm/swftools/issues/222
|
||
|
CVE-2024-26337 - https://github.com/matthiaskramm/swftools/issues/223
|
||
|
CVE-2024-26339 - https://github.com/matthiaskramm/swftools/issues/225
|
||
|
CVE-2024-26342 - https://github.com/Nicholas-wei/bug-discovery/blob/main/asus/2/ASUS_ac68u.md
|
||
|
CVE-2024-26349 - https://github.com/Icycu123/cms/blob/main/1.md
|
||
|
CVE-2024-26362 - https://packetstormsecurity.com/files/177075/Enpass-Desktop-Application-6.9.2-HTML-Injection.html
|
||
|
CVE-2024-26369 - https://github.com/eProsima/Fast-DDS/issues/4365
|
||
|
CVE-2024-26445 - https://github.com/xiaolanjing0/cms/blob/main/1.md
|
||
|
CVE-2024-26454 - https://github.com/OmRajpurkar/Healthcare-Chatbot/issues/4
|
||
|
CVE-2024-26454 - https://medium.com/@0x0d0x0a/healthcare-chatbot-xss-cve-2024-26454-acf2607bf210
|
||
|
CVE-2024-26470 - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2024-26470
|
||
|
CVE-2024-26476 - https://github.com/mpdf/mpdf/issues/867
|
||
|
CVE-2024-26489 - https://github.com/2111715623/cms/blob/main/3.md
|
||
|
CVE-2024-26490 - https://github.com/2111715623/cms/blob/main/2.md
|
||
|
CVE-2024-26491 - https://github.com/2111715623/cms/blob/main/1.md
|
||
|
CVE-2024-26492 - https://packetstormsecurity.com/files/165555/Online-Diagnostic-Lab-Management-System-1.0-Missing-Access-Control.html
|
||
|
CVE-2024-26492 - https://www.exploit-db.com/exploits/50660
|
||
|
CVE-2024-26495 - https://github.com/friendica/friendica/issues/13884
|
||
|
CVE-2024-26504 - https://tomiodarim.io/posts/cve-2024-26504/
|
||
|
CVE-2024-26521 - https://github.com/capture0x/Phoenix
|
||
|
CVE-2024-26521 - https://github.com/hackervegas001/CVE-2024-26521
|
||
|
CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/492
|
||
|
CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/495
|
||
|
CVE-2024-26540 - https://github.com/GreycLab/CImg/issues/403
|
||
|
CVE-2024-26542 - https://github.com/c0d3x27/CVEs/blob/main/CVE-2024-26542/README.md
|
||
|
CVE-2024-26548 - https://github.com/cwh031600/vivotek/blob/main/vivotek-FD8166A-uploadfile-dos/vivotek-FD8166A-uploadfile-analysis.md
|
||
|
CVE-2024-26557 - https://github.com/Hebing123/cve/issues/18
|
||
|
CVE-2024-26559 - https://syst1m.cn/2024/01/22/U%E9%AA%8C%E8%AF%81%E7%BD%91%E7%BB%9C%E7%94%A8%E6%88%B7%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E/
|
||
|
CVE-2024-26577 - https://github.com/guusec/VSeeDoS
|
||
|
CVE-2024-26633 - https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd
|
||
|
CVE-2024-26798 - https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f
|
||
|
CVE-2024-26798 - https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d
|
||
|
CVE-2024-26798 - https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b
|
||
|
CVE-2024-26798 - https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520
|
||
|
CVE-2024-26798 - https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8
|
||
|
CVE-2024-2690 - https://github.com/wkeyi0x1/vul-report/issues/2
|
||
|
CVE-2024-2697 - https://wpscan.com/vulnerability/c430b30d-61db-45f5-8499-91b491503b9c/
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d
|
||
|
CVE-2024-26979 - https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000
|
||
|
CVE-2024-27000 - https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026
|
||
|
CVE-2024-2703 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetDeviceName_mac.md
|
||
|
CVE-2024-2704 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetFirewallCfg.md
|
||
|
CVE-2024-2705 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formSetQosBand.md
|
||
|
CVE-2024-2706 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWifiWpsStart.md
|
||
|
CVE-2024-2707 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formWriteFacMac.md
|
||
|
CVE-2024-2708 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/formexeCommand.md
|
||
|
CVE-2024-27081 - https://github.com/esphome/esphome/security/advisories/GHSA-8p25-3q46-8q2p
|
||
|
CVE-2024-27082 - https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h
|
||
|
CVE-2024-27088 - https://github.com/medikoo/es5-ext/issues/201
|
||
|
CVE-2024-2709 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md
|
||
|
CVE-2024-27092 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp
|
||
|
CVE-2024-27093 - https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4
|
||
|
CVE-2024-2710 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/setSchedWifi_start.md
|
||
|
CVE-2024-2711 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/addWifiMacFilter_deviceMac.md
|
||
|
CVE-2024-27132 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-recipe-xss-jfsa-2024-000631930/
|
||
|
CVE-2024-27133 - https://research.jfrog.com/vulnerabilities/mlflow-untrusted-dataset-xss-jfsa-2024-000631932/
|
||
|
CVE-2024-27285 - https://github.com/lsegal/yard/security/advisories/GHSA-8mq4-9jjh-9xrc
|
||
|
CVE-2024-27285 - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2024-27285.yml
|
||
|
CVE-2024-27287 - https://github.com/esphome/esphome/security/advisories/GHSA-9p43-hj5j-96h5
|
||
|
CVE-2024-2729 - https://wpscan.com/vulnerability/5014f886-020e-49d1-96a5-2159eed8ba14/
|
||
|
CVE-2024-27297 - https://hackmd.io/03UGerewRcy3db44JQoWvw
|
||
|
CVE-2024-27299 - https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing
|
||
|
CVE-2024-27299 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw
|
||
|
CVE-2024-27300 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx
|
||
|
CVE-2024-27301 - https://github.com/root3nl/SupportApp/security/advisories/GHSA-jr78-247f-rhqc
|
||
|
CVE-2024-27302 - https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq
|
||
|
CVE-2024-27318 - https://security.snyk.io/vuln/SNYK-PYTHON-ONNX-2395479
|
||
|
CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/561ac3c17b92cb55d3032504a076fa4b
|
||
|
CVE-2024-2738 - https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e
|
||
|
CVE-2024-2739 - https://wpscan.com/vulnerability/5b84145b-f94e-4ea7-84d5-56cf776817a2/
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5
|
||
|
CVE-2024-27398 - https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79
|
||
|
CVE-2024-27399 - https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4
|
||
|
CVE-2024-2744 - https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f/
|
||
|
CVE-2024-27453 - https://www.exsiliumsecurity.com/CVE-2024-27453.html
|
||
|
CVE-2024-27474 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md
|
||
|
CVE-2024-27476 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md
|
||
|
CVE-2024-27477 - https://github.com/dead1nfluence/Leantime-POC/blob/main/README.md
|
||
|
CVE-2024-2749 - https://wpscan.com/vulnerability/c0640d3a-80b3-4cad-a3cf-fb5d86558e91/
|
||
|
CVE-2024-27515 - https://github.com/mindstellar/Osclass/issues/495
|
||
|
CVE-2024-27516 - https://github.com/LiveHelperChat/livehelperchat/issues/2054
|
||
|
CVE-2024-27517 - https://github.com/webasyst/webasyst-framework/issues/377
|
||
|
CVE-2024-27518 - https://github.com/secunnix/CVE-2024-27518
|
||
|
CVE-2024-27518 - https://www.youtube.com/watch?v=FM5XlZPdvdo
|
||
|
CVE-2024-27521 - https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md
|
||
|
CVE-2024-2754 - https://github.com/wkeyi0x1/vul-report/issues/4
|
||
|
CVE-2024-27558 - https://github.com/kilooooo/cms/blob/main/2.md
|
||
|
CVE-2024-27559 - https://github.com/kilooooo/cms/blob/main/1.md
|
||
|
CVE-2024-2756 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
||
|
CVE-2024-2756 - https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4
|
||
|
CVE-2024-27561 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_installUpdateThemePluginAction_plugins.md
|
||
|
CVE-2024-27563 - https://github.com/zer0yu/CVE_Request/blob/master/WonderCMS/wondercms_pluginThemeUrl.md
|
||
|
CVE-2024-27564 - https://github.com/dirk1983/chatgpt/issues/114
|
||
|
CVE-2024-27565 - https://github.com/dirk1983/chatgpt-wechat-personal/issues/4
|
||
|
CVE-2024-27567 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/config_vpn_pptp.md
|
||
|
CVE-2024-27568 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/setupEC20Apn.md
|
||
|
CVE-2024-27569 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/init_nvram.md
|
||
|
CVE-2024-2757 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
||
|
CVE-2024-2757 - https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq
|
||
|
CVE-2024-27570 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md
|
||
|
CVE-2024-27571 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/makeCurRemoteApList.md
|
||
|
CVE-2024-27572 - https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md
|
||
|
CVE-2024-27592 - https://medium.com/@nicatabbasov00002/open-redirect-vulnerability-62986ccaf0f7
|
||
|
CVE-2024-27593 - https://blog.smarttecs.com/posts/2024-002-cve-2024-27593/
|
||
|
CVE-2024-2760 - https://fluidattacks.com/advisories/kent/
|
||
|
CVE-2024-2761 - https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/
|
||
|
CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos
|
||
|
CVE-2024-27619 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-27620 - https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html
|
||
|
CVE-2024-27625 - https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html
|
||
|
CVE-2024-27626 - https://packetstormsecurity.com/files/177239/Dotclear-2.29-Cross-Site-Scripting.html
|
||
|
CVE-2024-27627 - https://packetstormsecurity.com/files/177254/SuperCali-1.1.0-Cross-Site-Scripting.html
|
||
|
CVE-2024-2763 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetCfm.md
|
||
|
CVE-2024-27630 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
|
||
|
CVE-2024-27631 - https://github.com/ally-petitt/CVE-2024-27631
|
||
|
CVE-2024-27631 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
|
||
|
CVE-2024-27632 - https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
|
||
|
CVE-2024-2764 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetPPTPServer.md
|
||
|
CVE-2024-27665 - https://github.com/Thirukrishnan/CVE-2024-27665/
|
||
|
CVE-2024-27668 - https://github.com/LY102483/cms/blob/main/1.md
|
||
|
CVE-2024-27680 - https://github.com/xiaolanjing0/cms/blob/main/4.md
|
||
|
CVE-2024-27683 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-27684 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-27689 - https://github.com/Xin246/cms/blob/main/2.md
|
||
|
CVE-2024-27694 - https://github.com/sms2056/cms/blob/main/1.md
|
||
|
CVE-2024-27703 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27703/README.md
|
||
|
CVE-2024-27705 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27705
|
||
|
CVE-2024-27706 - https://github.com/b-hermes/vulnerability-research/blob/main/CVE-2024-27706/README.md
|
||
|
CVE-2024-27707 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-27707
|
||
|
CVE-2024-27718 - https://github.com/tldjgggg/cve/blob/main/sql.md
|
||
|
CVE-2024-27719 - https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-002
|
||
|
CVE-2024-27733 - https://github.com/Sadw11v/cve/blob/main/upload.md
|
||
|
CVE-2024-27734 - https://github.com/sms2056/cms/blob/main/3.md
|
||
|
CVE-2024-27743 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md
|
||
|
CVE-2024-27744 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md
|
||
|
CVE-2024-27746 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27746.md
|
||
|
CVE-2024-27747 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27747.md
|
||
|
CVE-2024-27752 - https://github.com/flyhha/cms/blob/main/1.md
|
||
|
CVE-2024-27757 - https://github.com/jubilianite/flusity-CMS/security/advisories/GHSA-5843-5m74-7fqh
|
||
|
CVE-2024-27758 - https://gist.github.com/renbou/957f70d27470982994f12a1d70153d09
|
||
|
CVE-2024-27916 - https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37
|
||
|
CVE-2024-27921 - https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc
|
||
|
CVE-2024-27923 - https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v
|
||
|
CVE-2024-27927 - https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3
|
||
|
CVE-2024-27932 - https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr
|
||
|
CVE-2024-27933 - https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq
|
||
|
CVE-2024-27934 - https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf
|
||
|
CVE-2024-27935 - https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp
|
||
|
CVE-2024-27936 - https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw
|
||
|
CVE-2024-27938 - https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide
|
||
|
CVE-2024-2805 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md
|
||
|
CVE-2024-28056 - https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/
|
||
|
CVE-2024-2806 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md
|
||
|
CVE-2024-28065 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-007.txt
|
||
|
CVE-2024-28066 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-008.txt
|
||
|
CVE-2024-2807 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md
|
||
|
CVE-2024-2808 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md
|
||
|
CVE-2024-28085 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
|
||
|
CVE-2024-28085 - https://www.openwall.com/lists/oss-security/2024/03/27/5
|
||
|
CVE-2024-28088 - https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md
|
||
|
CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-28089
|
||
|
CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC.gif
|
||
|
CVE-2024-28089 - https://github.com/actuator/cve/blob/main/Hitron/Hitron_DOM_XSS_POC_DOS_ALT.gif
|
||
|
CVE-2024-2809 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md
|
||
|
CVE-2024-2810 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md
|
||
|
CVE-2024-28102 - https://github.com/latchset/jwcrypto/security/advisories/GHSA-j857-7rvv-vj97
|
||
|
CVE-2024-28105 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf
|
||
|
CVE-2024-28106 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r
|
||
|
CVE-2024-28107 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r
|
||
|
CVE-2024-28108 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh
|
||
|
CVE-2024-2811 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md
|
||
|
CVE-2024-28116 - https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh
|
||
|
CVE-2024-28117 - https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv
|
||
|
CVE-2024-28118 - https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4
|
||
|
CVE-2024-28119 - https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58
|
||
|
CVE-2024-2812 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWriteFacMac.md
|
||
|
CVE-2024-28120 - https://github.com/Exafunction/codeium-chrome/security/advisories/GHSA-8c7j-2h97-q63p
|
||
|
CVE-2024-28120 - https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-2024-028_codeium-chrome
|
||
|
CVE-2024-28122 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259
|
||
|
CVE-2024-2813 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md
|
||
|
CVE-2024-2814 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md
|
||
|
CVE-2024-2815 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md
|
||
|
CVE-2024-2816 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md
|
||
|
CVE-2024-2817 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md
|
||
|
CVE-2024-28185 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf
|
||
|
CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-3xpw-36v7-2cmg
|
||
|
CVE-2024-28189 - https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf
|
||
|
CVE-2024-28192 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm
|
||
|
CVE-2024-28193 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-3782-758f-mj85
|
||
|
CVE-2024-28194 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827
|
||
|
CVE-2024-28195 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj
|
||
|
CVE-2024-28196 - https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq
|
||
|
CVE-2024-2821 - https://vuldb.com/?id.257708
|
||
|
CVE-2024-28224 - https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224/
|
||
|
CVE-2024-2823 - https://github.com/lcg-22266/cms/blob/main/1.md
|
||
|
CVE-2024-28231 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w
|
||
|
CVE-2024-28232 - https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p
|
||
|
CVE-2024-28237 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c
|
||
|
CVE-2024-28239 - https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p
|
||
|
CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/files/14613084/poc.zip
|
||
|
CVE-2024-2824 - https://github.com/Matthias-Wandel/jhead/issues/84
|
||
|
CVE-2024-28247 - https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x
|
||
|
CVE-2024-28253 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-7vf4-x5m2-r6gr
|
||
|
CVE-2024-28254 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-j86m-rrpr-g8gw
|
||
|
CVE-2024-28255 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-6wx7-qw5p-wh84
|
||
|
CVE-2024-28275 - https://paste.sr.ht/~edaigle/0b4a037fbd3166c8c72fee18efaa7decaf75b0ab
|
||
|
CVE-2024-28286 - https://github.com/mz-automation/libiec61850/issues/496
|
||
|
CVE-2024-28294 - https://gist.github.com/lx39214/248dc58c6d05455d4bd06c4d3df8e2d0
|
||
|
CVE-2024-28318 - https://github.com/gpac/gpac/issues/2764
|
||
|
CVE-2024-28319 - https://github.com/gpac/gpac/issues/2763
|
||
|
CVE-2024-28320 - https://packetstormsecurity.com/files/177326/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-Account-Takeover.html
|
||
|
CVE-2024-28320 - https://sospiro014.github.io/Hospital-Management-System-1.0-Insecure-Direct-Object-Reference-+-Account-Takeover
|
||
|
CVE-2024-28322 - https://github.com/Sospiro014/zday1/blob/main/event-managment.md
|
||
|
CVE-2024-28322 - https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html
|
||
|
CVE-2024-28323 - https://packetstormsecurity.com/files/177168/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection.html
|
||
|
CVE-2024-28323 - https://sospiro014.github.io/User-Registration-And-Login-And-User-Management-System-3.1-SQL-Injection
|
||
|
CVE-2024-28325 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Credentials-Stored-in-Cleartext-CVE%E2%80%902024%E2%80%9028325
|
||
|
CVE-2024-28326 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Privilege-Escalation-CVE%E2%80%902024%E2%80%9028326
|
||
|
CVE-2024-28327 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/Insecure-Credential-Storage-CVE%E2%80%902024%E2%80%9028327
|
||
|
CVE-2024-28328 - https://github.com/ShravanSinghRathore/ASUS-RT-N300-B1/wiki/CSV-Injection-CVE%E2%80%902024%E2%80%9028328
|
||
|
CVE-2024-28335 - https://packetstormsecurity.com/files/177708/Lektor-Static-CMS-3.3.10-Arbitrary-File-Upload-Remote-Code-Execution.html
|
||
|
CVE-2024-28338 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md
|
||
|
CVE-2024-28344 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/
|
||
|
CVE-2024-28345 - https://securitycafe.ro/2024/03/21/cve-2024-28344-cve-2024-28345-in-sipwise-c5/
|
||
|
CVE-2024-2836 - https://wpscan.com/vulnerability/36f95b19-af74-4c56-9848-8ff270af4723/
|
||
|
CVE-2024-2837 - https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/
|
||
|
CVE-2024-28383 - https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_431CF0.md
|
||
|
CVE-2024-28421 - https://gist.github.com/LioTree/003202727a61c0fb3ec3c948ab5e38f9
|
||
|
CVE-2024-28421 - https://github.com/cobub/razor/issues/178
|
||
|
CVE-2024-28429 - https://github.com/itsqian797/cms/blob/main/2.md
|
||
|
CVE-2024-28430 - https://github.com/itsqian797/cms/blob/main/1.md
|
||
|
CVE-2024-28431 - https://github.com/itsqian797/cms/blob/main/3.md
|
||
|
CVE-2024-28432 - https://github.com/itsqian797/cms/blob/main/4.md
|
||
|
CVE-2024-28434 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28434
|
||
|
CVE-2024-28435 - https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-28435
|
||
|
CVE-2024-28441 - https://github.com/iamHuFei/HVVault/blob/main/webapp/%E9%AD%94%E6%96%B9%E7%BD%91%E8%A1%A8/magicflu-mailupdate-jsp-fileupload.md
|
||
|
CVE-2024-28442 - https://medium.com/@deepsahu1/cve-2024-28442-yealink-ip-phone-webview-escape-leads-to-sensitive-file-disclosure-via-directory-686ef8f80227
|
||
|
CVE-2024-28458 - https://github.com/keepinggg/poc/blob/main/poc_of_swfc
|
||
|
CVE-2024-2849 - https://github.com/CveSecLook/cve/issues/1
|
||
|
CVE-2024-2850 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md
|
||
|
CVE-2024-2851 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md
|
||
|
CVE-2024-28515 - https://github.com/heshi906/CVE-2024-28515
|
||
|
CVE-2024-2852 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md
|
||
|
CVE-2024-28520 - https://github.com/aknbg1thub/cve/blob/main/upload.md
|
||
|
CVE-2024-2853 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md
|
||
|
CVE-2024-28535 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_mitInterface.md
|
||
|
CVE-2024-28537 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromNatStaticSetting.md
|
||
|
CVE-2024-2854 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md
|
||
|
CVE-2024-28545 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md
|
||
|
CVE-2024-28547 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetFirewallCfg.md
|
||
|
CVE-2024-2855 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md
|
||
|
CVE-2024-28550 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formExpandDlnaFile.md
|
||
|
CVE-2024-28551 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md
|
||
|
CVE-2024-28553 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromAddressNat_entrys.md
|
||
|
CVE-2024-28556 - https://github.com/xuanluansec/vul/issues/1
|
||
|
CVE-2024-28557 - https://github.com/xuanluansec/vul/issues/2
|
||
|
CVE-2024-28558 - https://github.com/xuanluansec/vul/issues/3#issue-2243633522
|
||
|
CVE-2024-2856 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md
|
||
|
CVE-2024-28562 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28563 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28564 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28565 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28566 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28567 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28568 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28569 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-2857 - https://wpscan.com/vulnerability/b7a35c5b-474a-444a-85ee-c50782c7a6c2/
|
||
|
CVE-2024-28570 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28571 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28572 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28573 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28574 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28575 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28576 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28577 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28578 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28579 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-2858 - https://wpscan.com/vulnerability/43297210-17a6-4b51-b8ca-32ceef9fc09a/
|
||
|
CVE-2024-28580 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28581 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28582 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28583 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28584 - https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909
|
||
|
CVE-2024-28595 - https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-28595.md
|
||
|
CVE-2024-28623 - https://github.com/GURJOTEXPERT/ritecms
|
||
|
CVE-2024-28635 - https://packetstormsecurity.com/2403-exploits/surveyjssurveycreator19132-xss.txt
|
||
|
CVE-2024-28639 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_1.md
|
||
|
CVE-2024-28640 - https://github.com/ZIKH26/CVE-information/blob/master/TOTOLINK/Vulnerability%20Information_2.md
|
||
|
CVE-2024-2866 - https://research.cleantalk.org/cve-2024-2509/
|
||
|
CVE-2024-2866 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/
|
||
|
CVE-2024-28665 - https://github.com/777erp/cms/blob/main/1.md
|
||
|
CVE-2024-28666 - https://github.com/777erp/cms/blob/main/2.md
|
||
|
CVE-2024-28667 - https://github.com/777erp/cms/blob/main/6.md
|
||
|
CVE-2024-28668 - https://github.com/777erp/cms/blob/main/5.md
|
||
|
CVE-2024-28669 - https://github.com/777erp/cms/blob/main/10.md
|
||
|
CVE-2024-28670 - https://github.com/777erp/cms/blob/main/9.md
|
||
|
CVE-2024-28671 - https://github.com/777erp/cms/blob/main/7.md
|
||
|
CVE-2024-28672 - https://github.com/777erp/cms/blob/main/3.md
|
||
|
CVE-2024-28673 - https://github.com/777erp/cms/blob/main/4.md
|
||
|
CVE-2024-28675 - https://github.com/777erp/cms/blob/main/12.md
|
||
|
CVE-2024-28676 - https://github.com/777erp/cms/blob/main/18.md
|
||
|
CVE-2024-28677 - https://github.com/777erp/cms/blob/main/14.md
|
||
|
CVE-2024-28678 - https://github.com/777erp/cms/blob/main/15.md
|
||
|
CVE-2024-28679 - https://github.com/777erp/cms/blob/main/19.md
|
||
|
CVE-2024-28680 - https://github.com/777erp/cms/blob/main/11.md
|
||
|
CVE-2024-28681 - https://github.com/777erp/cms/blob/main/17.md
|
||
|
CVE-2024-28682 - https://github.com/777erp/cms/blob/main/13.md
|
||
|
CVE-2024-28683 - https://github.com/777erp/cms/blob/main/20.md
|
||
|
CVE-2024-28684 - https://github.com/777erp/cms/blob/main/16.md
|
||
|
CVE-2024-28699 - https://github.com/flexpaper/pdf2json/issues/52
|
||
|
CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md
|
||
|
CVE-2024-28714 - https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png
|
||
|
CVE-2024-28715 - https://github.com/Lq0ne/CVE-2024-28715
|
||
|
CVE-2024-28716 - https://bugs.launchpad.net/solum/+bug/2047505
|
||
|
CVE-2024-28716 - https://drive.google.com/file/d/11x-6CjWCyap8_W1JpVzun56HQkPNLtWT/view?usp=drive_link
|
||
|
CVE-2024-28732 - https://gist.github.com/ErodedElk/1133d64dde2d92393a065edc9b243792
|
||
|
CVE-2024-28734 - https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html
|
||
|
CVE-2024-28735 - https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html
|
||
|
CVE-2024-28741 - https://blog.chebuya.com/posts/discovering-cve-2024-28741-remote-code-execution-on-northstar-c2-agents-via-pre-auth-stored-xss/
|
||
|
CVE-2024-28741 - https://packetstormsecurity.com/files/177542/NorthStar-C2-Agent-1.0-Cross-Site-Scripting-Remote-Command-Execution.html
|
||
|
CVE-2024-28756 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-012.txt
|
||
|
CVE-2024-28816 - https://github.com/AaravRajSIngh/Chatbot/pull/10
|
||
|
CVE-2024-28823 - https://github.com/awslabs/aws-js-s3-explorer/issues/118
|
||
|
CVE-2024-28834 - https://minerva.crocs.fi.muni.cz/
|
||
|
CVE-2024-28847 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-8p5r-6mvv-2435
|
||
|
CVE-2024-28848 - https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5xv3-fm7g-865r
|
||
|
CVE-2024-28849 - https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp
|
||
|
CVE-2024-28852 - https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639
|
||
|
CVE-2024-28853 - https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8
|
||
|
CVE-2024-28854 - https://en.wikipedia.org/wiki/Slowloris_(computer_security)
|
||
|
CVE-2024-28854 - https://github.com/tmccombs/tls-listener/security/advisories/GHSA-2qph-qpvm-2qf7
|
||
|
CVE-2024-28859 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r
|
||
|
CVE-2024-28861 - https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-pv9j-c53q-h433
|
||
|
CVE-2024-28863 - https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36
|
||
|
CVE-2024-2891 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md
|
||
|
CVE-2024-2899 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md
|
||
|
CVE-2024-2900 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md
|
||
|
CVE-2024-2901 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md
|
||
|
CVE-2024-29019 - https://github.com/advisories/GHSA-9p43-hj5j-96h5
|
||
|
CVE-2024-29019 - https://github.com/esphome/esphome/security/advisories/GHSA-5925-88xh-6h99
|
||
|
CVE-2024-2902 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md
|
||
|
CVE-2024-29021 - https://github.com/judge0/judge0/security/advisories/GHSA-q7vg-26pg-v5hr
|
||
|
CVE-2024-29025 - https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v
|
||
|
CVE-2024-29028 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos
|
||
|
CVE-2024-29029 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/
|
||
|
CVE-2024-2903 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md
|
||
|
CVE-2024-29030 - https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/
|
||
|
CVE-2024-29031 - https://securitylab.github.com/advisories/GHSL-2023-249_Meshery/
|
||
|
CVE-2024-29032 - https://github.com/Qiskit/qiskit-ibm-runtime/security/advisories/GHSA-x4x5-jv3x-9c7m
|
||
|
CVE-2024-29042 - https://github.com/franciscop/translate/security/advisories/GHSA-882j-4vj5-7vmj
|
||
|
CVE-2024-2907 - https://wpscan.com/vulnerability/d2588b47-a518-4cb2-a557-2c7eaffa17e4/
|
||
|
CVE-2024-2908 - https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/
|
||
|
CVE-2024-29090 - https://www.vicarius.io/vsociety/posts/chaos-in-the-ai-zoo-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-plugin-by-jordy-meow
|
||
|
CVE-2024-29149 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-010.txt
|
||
|
CVE-2024-29150 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-011.txt
|
||
|
CVE-2024-29156 - https://launchpad.net/bugs/2048114
|
||
|
CVE-2024-29179 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9
|
||
|
CVE-2024-29180 - https://github.com/webpack/webpack-dev-middleware/security/advisories/GHSA-wr3j-pwj9-hqq6
|
||
|
CVE-2024-29183 - https://securitylab.github.com/advisories/GHSL-2023-253_openrasp
|
||
|
CVE-2024-29186 - https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r
|
||
|
CVE-2024-29187 - https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r
|
||
|
CVE-2024-29190 - https://drive.google.com/file/d/1nbKMd2sKosbJef5Mh4DxjcHcQ8Hw0BNR/view?usp=share_link
|
||
|
CVE-2024-29190 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-wfgj-wrgh-h3r3
|
||
|
CVE-2024-29191 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
|
||
|
CVE-2024-29192 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
|
||
|
CVE-2024-29193 - https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/
|
||
|
CVE-2024-29194 - https://github.com/OneUptime/oneuptime/security/advisories/GHSA-246p-xmg8-wmcq
|
||
|
CVE-2024-29196 - https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72
|
||
|
CVE-2024-29197 - https://github.com/pimcore/pimcore/security/advisories/GHSA-5737-rqv4-v445
|
||
|
CVE-2024-29200 - https://github.com/kimai/kimai/security/advisories/GHSA-cj3c-5xpm-cx94
|
||
|
CVE-2024-29216 - https://sangomakb.atlassian.net/wiki/spaces/DVC/pages/45351279/Natural+Access+Software+Download
|
||
|
CVE-2024-29271 - https://github.com/givanz/VvvebJs/issues/342
|
||
|
CVE-2024-29272 - https://github.com/givanz/VvvebJs/issues/343
|
||
|
CVE-2024-29273 - https://github.com/zyx0814/dzzoffice/issues/244
|
||
|
CVE-2024-29275 - https://github.com/seacms-net/CMS/issues/15
|
||
|
CVE-2024-29276 - https://www.cnblogs.com/Rainy-Day/p/18061399
|
||
|
CVE-2024-29291 - https://gist.github.com/whiteman007/43bd7fa1fa0e47554b33f0cf93066784
|
||
|
CVE-2024-29296 - https://github.com/ThaySolis/CVE-2024-29296
|
||
|
CVE-2024-2930 - https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md
|
||
|
CVE-2024-29301 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2024-29302 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2024-29303 - https://packetstormsecurity.com/files/177737/Task-Management-System-1.0-SQL-Injection.html
|
||
|
CVE-2024-29309 - https://gist.github.com/Siebene/c22e1a4a4a8b61067180475895e60858
|
||
|
CVE-2024-29316 - https://nodebb.org/bounty/
|
||
|
CVE-2024-2932 - https://github.com/CveSecLook/cve/issues/3
|
||
|
CVE-2024-29338 - https://github.com/PWwwww123/cms/blob/main/1.md
|
||
|
CVE-2024-2934 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20SQL%20Injection.md
|
||
|
CVE-2024-2935 - https://github.com/BurakSevben/CVEs/blob/main/To%20Do%20List%20App/To%20Do%20List%20App%20-%20Cross-Site-Scripting.md
|
||
|
CVE-2024-29366 - https://github.com/20Yiju/DLink/blob/master/DIR-845L/CI.md
|
||
|
CVE-2024-29366 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-29368 - https://github.com/becpn/mozilocms
|
||
|
CVE-2024-29374 - https://gist.github.com/fir3storm/f9c7f3ec1a6496498517ed216d2640b2
|
||
|
CVE-2024-29375 - https://github.com/ismailcemunver/CVE-2024-29375
|
||
|
CVE-2024-29384 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41
|
||
|
CVE-2024-29384 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-29384
|
||
|
CVE-2024-29385 - https://github.com/songah119/Report/blob/main/CI-1.md
|
||
|
CVE-2024-29385 - https://www.dlink.com/en/security-bulletin/
|
||
|
CVE-2024-29386 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29386/
|
||
|
CVE-2024-29387 - https://cve.anas-cherni.me/2024/04/04/cve-2024-29387/
|
||
|
CVE-2024-29392 - https://gist.github.com/phulelouch/48ee63a7c46078574f3b3dc9a739052c
|
||
|
CVE-2024-29399 - https://github.com/ally-petitt/CVE-2024-29399
|
||
|
CVE-2024-29400 - https://github.com/Fr1ezy/RuoYi_info
|
||
|
CVE-2024-29401 - https://github.com/menghaining/PoC/blob/main/xzs-mysql/xzs-mysql%20--%20PoC.md
|
||
|
CVE-2024-29402 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
|
||
|
CVE-2024-29413 - https://github.com/RealestName/Vulnerability-Research/tree/main/CVE-2024-29413
|
||
|
CVE-2024-29421 - https://github.com/SpikeReply/advisories/blob/530dbd7ce68600a22c47dd1bcbe360220feda1d9/cve/xmedcon/cve-2024-29421.md
|
||
|
CVE-2024-2944 - https://vuldb.com/?id.258035
|
||
|
CVE-2024-29461 - https://gist.github.com/ErodedElk/399a226905c574efe705e3bff77955e3
|
||
|
CVE-2024-29461 - https://github.com/floodlight/floodlight/issues/867
|
||
|
CVE-2024-29499 - https://github.com/daddywolf/cms/blob/main/1.md
|
||
|
CVE-2024-29504 - https://github.com/summernote/summernote/pull/3782
|
||
|
CVE-2024-29513 - https://github.com/dru1d-foofus/briscKernelDriver
|
||
|
CVE-2024-29514 - https://github.com/zzq66/cve6/
|
||
|
CVE-2024-29515 - https://github.com/zzq66/cve7/
|
||
|
CVE-2024-2954 - https://blog.sth.sh/wordpress-action-network-1-4-3-authenticated-sql-injection-0-day-01fcd6e89e96
|
||
|
CVE-2024-2962 - https://gist.github.com/Xib3rR4dAr/ab293092ffcfe3c14a3c7daf5462a50b
|
||
|
CVE-2024-29650 - https://gist.github.com/tariqhawis/1bc340ca5ea6ae115c9ab9665cfd5921
|
||
|
CVE-2024-29650 - https://learn.snyk.io/lesson/prototype-pollution/#a0a863a5-fd3a-539f-e1ed-a0769f6c6e3b
|
||
|
CVE-2024-29651 - https://gist.github.com/tariqhawis/5db76b38112bba756615b688c32409ad
|
||
|
CVE-2024-29684 - https://github.com/iimiss/cms/blob/main/1.md
|
||
|
CVE-2024-29686 - https://www.exploit-db.com/exploits/51893
|
||
|
CVE-2024-2972 - https://wpscan.com/vulnerability/27134a4f-a59b-40e9-8fc8-abe1f58672ad/
|
||
|
CVE-2024-2980 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexeCommand.md
|
||
|
CVE-2024-2981 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/form_fast_setting_wifi_set.md
|
||
|
CVE-2024-2982 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWriteFacMac.md
|
||
|
CVE-2024-2982 - https://vuldb.com/?id.258151
|
||
|
CVE-2024-2983 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetClientState.md
|
||
|
CVE-2024-2984 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetCfm.md
|
||
|
CVE-2024-2985 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formQuickIndex.md
|
||
|
CVE-2024-29882 - https://github.com/ossrs/srs/security/advisories/GHSA-gv9r-qcjc-5hj7
|
||
|
CVE-2024-29894 - https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh
|
||
|
CVE-2024-29894 - https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73
|
||
|
CVE-2024-29895 - https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m
|
||
|
CVE-2024-29903 - https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv
|
||
|
CVE-2024-29916 - https://unsaflok.com
|
||
|
CVE-2024-29937 - https://www.youtube.com/watch?v=i_JOkHaCdzk
|
||
|
CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
|
||
|
CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md
|
||
|
CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md
|
||
|
CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md
|
||
|
CVE-2024-3004 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md
|
||
|
CVE-2024-3011 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md
|
||
|
CVE-2024-3012 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md
|
||
|
CVE-2024-3014 - https://vuldb.com/?id.258300
|
||
|
CVE-2024-3024 - https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing
|
||
|
CVE-2024-30248 - https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83
|
||
|
CVE-2024-30252 - https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg
|
||
|
CVE-2024-30257 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f
|
||
|
CVE-2024-30258 - https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing
|
||
|
CVE-2024-30258 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh
|
||
|
CVE-2024-30259 - https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing
|
||
|
CVE-2024-30259 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
|
||
|
CVE-2024-30264 - https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73
|
||
|
CVE-2024-3048 - https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/
|
||
|
CVE-2024-30564 - https://gist.github.com/mestrtee/5dc2c948c2057f98d3de0a9790903c6c
|
||
|
CVE-2024-30568 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ping_test).md
|
||
|
CVE-2024-30572 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection(ntp_server).md
|
||
|
CVE-2024-3058 - https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/
|
||
|
CVE-2024-30583 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_mitInterface.md
|
||
|
CVE-2024-30584 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security.md
|
||
|
CVE-2024-30585 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_deviceId.md
|
||
|
CVE-2024-30586 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formWifiBasicSet_security_5g.md
|
||
|
CVE-2024-30587 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_urls.md
|
||
|
CVE-2024-30588 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_start.md
|
||
|
CVE-2024-30589 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_entrys.md
|
||
|
CVE-2024-3059 - https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/
|
||
|
CVE-2024-30590 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/setSchedWifi_end.md
|
||
|
CVE-2024-30591 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/saveParentControlInfo_time.md
|
||
|
CVE-2024-30592 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromAddressNat_page.md
|
||
|
CVE-2024-30593 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_devName.md
|
||
|
CVE-2024-30594 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceMac.md
|
||
|
CVE-2024-30595 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceId.md
|
||
|
CVE-2024-30596 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formSetDeviceName_deviceId.md
|
||
|
CVE-2024-30597 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security.md
|
||
|
CVE-2024-30598 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWifiBasicSet_security_5g.md
|
||
|
CVE-2024-30599 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/addWifiMacFilter_deviceMac.md
|
||
|
CVE-2024-3060 - https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/
|
||
|
CVE-2024-30600 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_end.md
|
||
|
CVE-2024-30601 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_time.md
|
||
|
CVE-2024-30602 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/setSchedWifi_start.md
|
||
|
CVE-2024-30603 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_urls.md
|
||
|
CVE-2024-30604 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_list1.md
|
||
|
CVE-2024-30606 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromDhcpListClient_page.md
|
||
|
CVE-2024-30607 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/saveParentControlInfo_deviceId.md
|
||
|
CVE-2024-30612 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetClientState.md
|
||
|
CVE-2024-30613 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/setSmartPowerManagement.md
|
||
|
CVE-2024-30620 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serviceName_parameter_in_the_function_fromAdvSetMacMtuWan.md
|
||
|
CVE-2024-30621 - https://github.com/re1wn/IoT_vuln/blob/main/Tenda_AX1803_v1.0.0.1_contains_a_stack_overflow_via_the_serverName_parameter_in_the_function_fromAdvSetMacMtuWan.md
|
||
|
CVE-2024-30622 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_mitInterface.md
|
||
|
CVE-2024-30623 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_page.md
|
||
|
CVE-2024-30624 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_urls.md
|
||
|
CVE-2024-30625 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_entrys.md
|
||
|
CVE-2024-30626 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_end.md
|
||
|
CVE-2024-30627 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_deviceId.md
|
||
|
CVE-2024-30628 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromAddressNat_page.md
|
||
|
CVE-2024-30629 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromDhcpListClient_list1.md
|
||
|
CVE-2024-30630 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/saveParentControlInfo_time.md
|
||
|
CVE-2024-30631 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/setSchedWifi_start.md
|
||
|
CVE-2024-30632 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security_5g.md
|
||
|
CVE-2024-30633 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWifiBasicSet_security.md
|
||
|
CVE-2024-30634 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_mitInterface.md
|
||
|
CVE-2024-30635 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formSetCfm.md
|
||
|
CVE-2024-30636 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formQuickIndex.md
|
||
|
CVE-2024-30637 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/formWriteFacMac.md
|
||
|
CVE-2024-30638 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_entrys.md
|
||
|
CVE-2024-30639 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromAddressNat_page.md
|
||
|
CVE-2024-30645 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/setUsbUnload.md
|
||
|
CVE-2024-3075 - https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/
|
||
|
CVE-2024-3076 - https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/
|
||
|
CVE-2024-30802 - https://github.com/WarmBrew/web_vul/blob/main/TTX.md
|
||
|
CVE-2024-30807 - https://github.com/axiomatic-systems/Bento4/issues/937
|
||
|
CVE-2024-30808 - https://github.com/axiomatic-systems/Bento4/issues/937
|
||
|
CVE-2024-30809 - https://github.com/axiomatic-systems/Bento4/issues/937
|
||
|
CVE-2024-30840 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md
|
||
|
CVE-2024-30845 - https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66
|
||
|
CVE-2024-30845 - https://github.com/netcccyun/pan/issues/6
|
||
|
CVE-2024-30850 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/
|
||
|
CVE-2024-30851 - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc
|
||
|
CVE-2024-30862 - https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md
|
||
|
CVE-2024-30878 - https://github.com/jianyan74/rageframe2/issues/111
|
||
|
CVE-2024-30879 - https://github.com/jianyan74/rageframe2/issues/114
|
||
|
CVE-2024-30880 - https://github.com/jianyan74/rageframe2/issues/114
|
||
|
CVE-2024-30883 - https://github.com/jianyan74/rageframe2/issues/114
|
||
|
CVE-2024-30884 - https://github.com/Hebing123/cve/issues/28
|
||
|
CVE-2024-30885 - https://github.com/Hebing123/cve/issues/29
|
||
|
CVE-2024-30886 - https://github.com/Hebing123/cve/issues/30
|
||
|
CVE-2024-3089 - https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_csrf.md
|
||
|
CVE-2024-3089 - https://vuldb.com/?submit.306963
|
||
|
CVE-2024-30891 - https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md
|
||
|
CVE-2024-30915 - https://github.com/OpenDDS/OpenDDS/issues/4527
|
||
|
CVE-2024-3093 - https://wpscan.com/vulnerability/7c87fcd2-6ffd-4285-bbf5-36efea70b620/
|
||
|
CVE-2024-30938 - https://github.com/lampSEC/semcms/blob/main/semcms.md
|
||
|
CVE-2024-30939 - https://medium.com/@deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad
|
||
|
CVE-2024-3094 - http://www.openwall.com/lists/oss-security/2024/04/16/5
|
||
|
CVE-2024-3094 - https://lwn.net/Articles/967180/
|
||
|
CVE-2024-3094 - https://news.ycombinator.com/item?id=39895344
|
||
|
CVE-2024-3094 - https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils
|
||
|
CVE-2024-3094 - https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094
|
||
|
CVE-2024-30946 - https://github.com/testgo1safe/cms/blob/main/1.md
|
||
|
CVE-2024-30950 - https://github.com/CrownZTX/vulnerabilities/blob/main/fudforum/stored_xss_in_admsql.md
|
||
|
CVE-2024-30952 - https://github.com/CrownZTX/vulnerabilities/blob/main/pescms/stored_xss.md
|
||
|
CVE-2024-30953 - https://github.com/CrownZTX/vulnerabilities/blob/main/htmly/stored_xss_in_Menueditor.md
|
||
|
CVE-2024-3096 - http://www.openwall.com/lists/oss-security/2024/04/12/11
|
||
|
CVE-2024-3096 - https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr
|
||
|
CVE-2024-30965 - https://github.com/Fishkey1/cms/commit/e9d294951ab2dd85709f1d12ad4747f25d326b1b
|
||
|
CVE-2024-30973 - https://github.com/Athos-Zago/CVE-2024-30973/tree/main
|
||
|
CVE-2024-30979 - https://medium.com/@shanunirwan/cve-2024-30979-stored-cross-site-scripting-xss-in-cyber-cafe-management-system-project-ccms-1-44b10f50817b
|
||
|
CVE-2024-30980 - https://medium.com/@shanunirwan/cve-2024-30980-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-30bffd26dab7
|
||
|
CVE-2024-30981 - https://medium.com/@shanunirwan/cve-2024-30981-sql-injection-vulnerability-in-cyber-cafe-management-system-using-php-mysql-v1-0-534676f9bdeb
|
||
|
CVE-2024-30985 - https://medium.com/@shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062
|
||
|
CVE-2024-30986 - https://medium.com/@shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510
|
||
|
CVE-2024-30987 - https://medium.com/@shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254
|
||
|
CVE-2024-30988 - https://medium.com/@shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23
|
||
|
CVE-2024-30989 - https://medium.com/@shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6
|
||
|
CVE-2024-30990 - https://medium.com/@shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761
|
||
|
CVE-2024-30998 - https://github.com/efekaanakkar/CVEs/blob/main/PHPGurukul-Men-Salon-Management-System-2.0.md
|
||
|
CVE-2024-31002 - https://github.com/axiomatic-systems/Bento4/issues/939
|
||
|
CVE-2024-31003 - https://github.com/axiomatic-systems/Bento4/issues/939
|
||
|
CVE-2024-31004 - https://github.com/axiomatic-systems/Bento4/issues/941
|
||
|
CVE-2024-31005 - https://github.com/axiomatic-systems/Bento4/issues/941
|
||
|
CVE-2024-31008 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20(logic%20vulnerability).md
|
||
|
CVE-2024-31009 - https://github.com/ss122-0ss/semcms/blob/main/README.md
|
||
|
CVE-2024-31010 - https://github.com/ss122-0ss/semcms/blob/main/README.md
|
||
|
CVE-2024-31047 - https://github.com/AcademySoftwareFoundation/openexr/issues/1680
|
||
|
CVE-2024-31061 - https://github.com/sahildari/cve/blob/master/CVE-2024-31061.md
|
||
|
CVE-2024-31061 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2024-31062 - https://github.com/sahildari/cve/blob/master/CVE-2024-31062.md
|
||
|
CVE-2024-31062 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2024-31063 - https://github.com/sahildari/cve/blob/master/CVE-2024-31063.md
|
||
|
CVE-2024-31063 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2024-31064 - https://github.com/sahildari/cve/blob/master/CVE-2024-31064.md
|
||
|
CVE-2024-31065 - https://github.com/sahildari/cve/blob/master/CVE-2024-31065.md
|
||
|
CVE-2024-31065 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2024-3118 - https://vuldb.com/?id.258779
|
||
|
CVE-2024-31212 - https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw
|
||
|
CVE-2024-31213 - https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq
|
||
|
CVE-2024-31214 - https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9
|
||
|
CVE-2024-3124 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md
|
||
|
CVE-2024-3124 - https://vuldb.com/?submit.307752
|
||
|
CVE-2024-3125 - https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md
|
||
|
CVE-2024-3128 - https://github.com/ctflearner/Android_Findings/blob/main/Replify-Messenger/Backup.md
|
||
|
CVE-2024-3128 - https://vuldb.com/?submit.307761
|
||
|
CVE-2024-3129 - https://github.com/Sospiro014/zday1/blob/main/Image_Accordion_Gallery.md
|
||
|
CVE-2024-3131 - https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md
|
||
|
CVE-2024-31380 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve
|
||
|
CVE-2024-31380 - https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1?_s_id=cve
|
||
|
CVE-2024-3139 - https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md
|
||
|
CVE-2024-31390 - https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve
|
||
|
CVE-2024-31390 - https://snicco.io/vulnerability-disclosure/breakdance/client-mode-remote-code-execution-breakdance-1-7-0?_s_id=cve
|
||
|
CVE-2024-31390 - https://www.youtube.com/watch?v=9glx54-LfRE
|
||
|
CVE-2024-3140 - https://github.com/Sospiro014/zday1/blob/main/xss_1.md
|
||
|
CVE-2024-3141 - https://github.com/strik3r0x1/Vulns/blob/main/Clavister_E80-RXSS.md
|
||
|
CVE-2024-3141 - https://vuldb.com/?id.258916
|
||
|
CVE-2024-3142 - https://github.com/strik3r0x1/Vulns/blob/main/CSRF_Clavister-E80,E10.md
|
||
|
CVE-2024-3144 - https://github.com/Hckwzh/cms/blob/main/12.md
|
||
|
CVE-2024-31443 - https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
|
||
|
CVE-2024-31444 - https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87
|
||
|
CVE-2024-3145 - https://github.com/Hckwzh/cms/blob/main/13.md
|
||
|
CVE-2024-3145 - https://vuldb.com/?id.258920
|
||
|
CVE-2024-31453 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-xg8v-m2mh-45m6
|
||
|
CVE-2024-31454 - https://github.com/psi-4ward/psitransfer/security/advisories/GHSA-2p2x-p7wj-j5h2
|
||
|
CVE-2024-31457 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4
|
||
|
CVE-2024-31458 - https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x
|
||
|
CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv
|
||
|
CVE-2024-31459 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r
|
||
|
CVE-2024-3146 - https://github.com/Hckwzh/cms/blob/main/14.md
|
||
|
CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv
|
||
|
CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r
|
||
|
CVE-2024-3147 - https://github.com/Hckwzh/cms/blob/main/15.md
|
||
|
CVE-2024-31497 - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/
|
||
|
CVE-2024-31497 - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/
|
||
|
CVE-2024-31502 - https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md
|
||
|
CVE-2024-31506 - https://github.com/CveSecLook/cve/issues/4
|
||
|
CVE-2024-31507 - https://github.com/CveSecLook/cve/issues/6
|
||
|
CVE-2024-3154 - https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j
|
||
|
CVE-2024-31544 - https://github.com/emirhanmtl/vuln-research/blob/main/Stored-XSS-Computer-Laboratory-Management-System-PoC.md
|
||
|
CVE-2024-31545 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Computer-Laboratory-Management-System-PoC.md
|
||
|
CVE-2024-31546 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md
|
||
|
CVE-2024-31547 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md
|
||
|
CVE-2024-31581 - https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048
|
||
|
CVE-2024-31610 - https://github.com/ss122-0ss/School/blob/main/readme.md
|
||
|
CVE-2024-31616 - https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883
|
||
|
CVE-2024-31621 - https://www.exploit-db.com/exploits/52001
|
||
|
CVE-2024-31636 - https://github.com/lief-project/LIEF/issues/1038
|
||
|
CVE-2024-31648 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31648.md
|
||
|
CVE-2024-31649 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31649.md
|
||
|
CVE-2024-31650 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31650.md
|
||
|
CVE-2024-31651 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31651.md
|
||
|
CVE-2024-31652 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md
|
||
|
CVE-2024-31678 - https://github.com/CveSecLook/cve/issues/10
|
||
|
CVE-2024-31680 - https://github.com/heidashuai5588/cve/blob/main/upload.md
|
||
|
CVE-2024-31705 - https://github.com/V3locidad/GLPI_POC_Plugins_Shell
|
||
|
CVE-2024-31705 - https://seclists.org/fulldisclosure/2024/Apr/23
|
||
|
CVE-2024-31744 - https://github.com/jasper-software/jasper/issues/381
|
||
|
CVE-2024-31747 - https://medium.com/@deepsahu1/yealink-vp59-microsoft-teams-phone-lock-bypass-b7fee9dd9c8c
|
||
|
CVE-2024-31755 - https://github.com/DaveGamble/cJSON/issues/839
|
||
|
CVE-2024-31759 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
|
||
|
CVE-2024-31759 - https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md
|
||
|
CVE-2024-31760 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
|
||
|
CVE-2024-31760 - https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md
|
||
|
CVE-2024-31804 - https://www.exploit-db.com/exploits/51977
|
||
|
CVE-2024-31819 - https://chocapikk.com/posts/2024/cve-2024-31819/
|
||
|
CVE-2024-31819 - https://github.com/Chocapikk/CVE-2024-31819
|
||
|
CVE-2024-31839 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/
|
||
|
CVE-2024-31840 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31841 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31843 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31844 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31845 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31846 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31847 - https://www.gruppotim.it/it/footer/red-team.html
|
||
|
CVE-2024-31848 - https://www.tenable.com/security/research/tra-2024-09
|
||
|
CVE-2024-31849 - https://www.tenable.com/security/research/tra-2024-09
|
||
|
CVE-2024-31850 - https://www.tenable.com/security/research/tra-2024-09
|
||
|
CVE-2024-31852 - https://github.com/llvm/llvm-project/issues/80287
|
||
|
CVE-2024-3188 - https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/
|
||
|
CVE-2024-32019 - https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93
|
||
|
CVE-2024-32022 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
||
|
CVE-2024-32023 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
||
|
CVE-2024-32024 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
||
|
CVE-2024-32025 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
||
|
CVE-2024-32026 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
||
|
CVE-2024-32027 - https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
|
||
|
CVE-2024-3203 - https://vuldb.com/?submit.304556
|
||
|
CVE-2024-3204 - https://vuldb.com/?submit.304557
|
||
|
CVE-2024-3205 - https://vuldb.com/?submit.304561
|
||
|
CVE-2024-3207 - https://vuldb.com/?submit.304572
|
||
|
CVE-2024-32163 - https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md
|
||
|
CVE-2024-32166 - https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md
|
||
|
CVE-2024-3218 - https://github.com/garboa/cve_3/blob/main/file_put_content.md
|
||
|
CVE-2024-32206 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md
|
||
|
CVE-2024-32254 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md
|
||
|
CVE-2024-32256 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md
|
||
|
CVE-2024-32258 - https://github.com/TASEmulators/fceux/issues/727
|
||
|
CVE-2024-32258 - https://github.com/liyansong2018/CVE-2024-32258
|
||
|
CVE-2024-32282 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/formexecommand_cmdi.md
|
||
|
CVE-2024-32283 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formexecommand_cmdi.md
|
||
|
CVE-2024-32285 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formaddUserName.md
|
||
|
CVE-2024-32286 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromVirtualSer.md
|
||
|
CVE-2024-32287 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromqossetting.md
|
||
|
CVE-2024-32288 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromwebExcptypemanFilter.md
|
||
|
CVE-2024-32290 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromAddressNat_page.md
|
||
|
CVE-2024-32291 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromNatlimit.md
|
||
|
CVE-2024-32292 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formexecommand_cmdi.md
|
||
|
CVE-2024-32293 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromDhcpListClient_page.md
|
||
|
CVE-2024-32299 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/fromWizardHandle.md
|
||
|
CVE-2024-32301 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromWizardHandle.md
|
||
|
CVE-2024-32302 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/fromWizardHandle.md
|
||
|
CVE-2024-32303 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromWizardHandle.md
|
||
|
CVE-2024-32305 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromWizardHandle.md
|
||
|
CVE-2024-32306 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/fromWizardHandle.md
|
||
|
CVE-2024-32307 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/fromWizardHandle.md
|
||
|
CVE-2024-3231 - https://wpscan.com/vulnerability/81dbb5c0-ccdd-4af1-b2f2-71cb1b37fe93/
|
||
|
CVE-2024-32310 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/fromWizardHandle.md
|
||
|
CVE-2024-32311 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWanParameterSetting.md
|
||
|
CVE-2024-32312 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1203/formWanParameterSetting.md
|
||
|
CVE-2024-32313 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formWanParameterSetting.md
|
||
|
CVE-2024-32314 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexecommand_cmdi.md
|
||
|
CVE-2024-32316 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_list1.md
|
||
|
CVE-2024-32317 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/formWanParameterSetting.md
|
||
|
CVE-2024-32318 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromSetVlanInfo_vlan.md
|
||
|
CVE-2024-32320 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetTimeZone.md
|
||
|
CVE-2024-32337 - https://github.com/adiapera/xss_security_wondercms_3.4.3
|
||
|
CVE-2024-32338 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
|
||
|
CVE-2024-32339 - https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3
|
||
|
CVE-2024-32340 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
|
||
|
CVE-2024-32341 - https://github.com/adiapera/xss_home_page_wondercms_3.4.3
|
||
|
CVE-2024-32342 - https://github.com/adiapera/xss_create_boidcms_2.1.0
|
||
|
CVE-2024-32343 - https://github.com/adiapera/xss_create2_boidcms_2.1.0
|
||
|
CVE-2024-32344 - https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md
|
||
|
CVE-2024-32345 - https://github.com/adiapera/xss_language_cmsimple_5.15
|
||
|
CVE-2024-32359 - https://github.com/HouqiyuA/k8s-rbac-poc
|
||
|
CVE-2024-3239 - https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/
|
||
|
CVE-2024-32391 - https://github.com/magicblack/maccms10/issues/1133
|
||
|
CVE-2024-32392 - https://github.com/Hebing123/cve/issues/33
|
||
|
CVE-2024-32394 - https://gist.github.com/Swind1er/7aad5c28e5bdc91d73fa7489b7250c94
|
||
|
CVE-2024-32399 - https://github.com/NN0b0dy/CVE-2024-32399/blob/main/README.md
|
||
|
CVE-2024-32404 - https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt
|
||
|
CVE-2024-32405 - https://packetstormsecurity.com/files/178101/Relate-Cross-Site-Scripting.html
|
||
|
CVE-2024-32405 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2024-32406 - https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html
|
||
|
CVE-2024-3241 - https://wpscan.com/vulnerability/a645daee-42ea-43f8-9480-ef3be69606e0/
|
||
|
CVE-2024-32461 - https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34
|
||
|
CVE-2024-32467 - https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp
|
||
|
CVE-2024-3247 - https://forum.xpdfreader.com/viewtopic.php?t=43597
|
||
|
CVE-2024-32472 - https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f
|
||
|
CVE-2024-32477 - https://github.com/denoland/deno/security/advisories/GHSA-95cj-3hr2-7j5j
|
||
|
CVE-2024-32479 - https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw
|
||
|
CVE-2024-3248 - https://forum.xpdfreader.com/viewtopic.php?t=43657
|
||
|
CVE-2024-32480 - https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438
|
||
|
CVE-2024-32481 - https://github.com/vyperlang/vyper/security/advisories/GHSA-ppx5-q359-pvwj
|
||
|
CVE-2024-3251 - https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md
|
||
|
CVE-2024-3252 - https://vuldb.com/?id.259101
|
||
|
CVE-2024-3255 - https://vuldb.com/?id.259104
|
||
|
CVE-2024-3261 - https://wpscan.com/vulnerability/5a0d5922-eefc-48e1-9681-b63e420bb8b3/
|
||
|
CVE-2024-32645 - https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3
|
||
|
CVE-2024-32646 - https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m
|
||
|
CVE-2024-32648 - https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9
|
||
|
CVE-2024-32649 - https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h
|
||
|
CVE-2024-3265 - https://wpscan.com/vulnerability/ecb74622-eeed-48b6-a944-4e3494d6594d/
|
||
|
CVE-2024-32650 - https://github.com/rustls/rustls/security/advisories/GHSA-6g7w-8wpp-frhj
|
||
|
CVE-2024-32651 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3
|
||
|
CVE-2024-32653 - https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm
|
||
|
CVE-2024-32735 - https://www.tenable.com/security/research/tra-2024-14
|
||
|
CVE-2024-32736 - https://www.tenable.com/security/research/tra-2024-14
|
||
|
CVE-2024-32737 - https://www.tenable.com/security/research/tra-2024-14
|
||
|
CVE-2024-32738 - https://www.tenable.com/security/research/tra-2024-14
|
||
|
CVE-2024-32739 - https://www.tenable.com/security/research/tra-2024-14
|
||
|
CVE-2024-32743 - https://github.com/adiapera/xss_security_wondercms_3.4.3
|
||
|
CVE-2024-32744 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
|
||
|
CVE-2024-32745 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
|
||
|
CVE-2024-32746 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
|
||
|
CVE-2024-3281 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt
|
||
|
CVE-2024-32866 - https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf
|
||
|
CVE-2024-32869 - https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347
|
||
|
CVE-2024-32876 - https://github.com/TeamNewPipe/NewPipe/security/advisories/GHSA-wxrm-jhpf-vp6v
|
||
|
CVE-2024-32878 - https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-p5mv-gjc5-mwqv
|
||
|
CVE-2024-32880 - https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f
|
||
|
CVE-2024-32881 - https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j
|
||
|
CVE-2024-32884 - https://github.com/Byron/gitoxide/security/advisories/GHSA-98p4-xjmm-8mfh
|
||
|
CVE-2024-32884 - https://rustsec.org/advisories/RUSTSEC-2024-0335.html
|
||
|
CVE-2024-32890 - https://github.com/librespeed/speedtest/security/advisories/GHSA-3954-xrwh-fq4q
|
||
|
CVE-2024-32962 - https://github.com/node-saml/xml-crypto/security/advisories/GHSA-2xp3-57p7-qf4v
|
||
|
CVE-2024-32963 - https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm
|
||
|
CVE-2024-32964 - https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc
|
||
|
CVE-2024-32970 - https://github.com/payloadbox/xss-payload-list
|
||
|
CVE-2024-32977 - https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7
|
||
|
CVE-2024-32982 - https://github.com/litestar-org/litestar/security/advisories/GHSA-83pv-qr33-2vcf
|
||
|
CVE-2024-33101 - https://github.com/thinksaas/ThinkSAAS/issues/34
|
||
|
CVE-2024-33102 - https://github.com/thinksaas/ThinkSAAS/issues/35
|
||
|
CVE-2024-33103 - https://github.com/dokuwiki/dokuwiki/issues/4267
|
||
|
CVE-2024-33110 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
||
|
CVE-2024-33111 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
||
|
CVE-2024-33112 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
||
|
CVE-2024-33113 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
|
||
|
CVE-2024-33247 - https://github.com/CveSecLook/cve/issues/11
|
||
|
CVE-2024-33250 - https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md
|
||
|
CVE-2024-33255 - https://github.com/jerryscript-project/jerryscript/issues/5135
|
||
|
CVE-2024-33258 - https://github.com/jerryscript-project/jerryscript/issues/5114
|
||
|
CVE-2024-33259 - https://github.com/jerryscript-project/jerryscript/issues/5132
|
||
|
CVE-2024-33260 - https://github.com/jerryscript-project/jerryscript/issues/5133
|
||
|
CVE-2024-33263 - https://github.com/bellard/quickjs/issues/277
|
||
|
CVE-2024-33266 - https://security.friendsofpresta.org/modules/2024/04/25/deliveryorderautoupdate.html
|
||
|
CVE-2024-33272 - https://security.friendsofpresta.org/modules/2024/04/25/autosuggest.html
|
||
|
CVE-2024-33294 - https://github.com/CveSecLook/cve/issues/16
|
||
|
CVE-2024-33302 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33302.md
|
||
|
CVE-2024-33302 - https://portswigger.net/web-security/cross-site-scripting/stored
|
||
|
CVE-2024-33303 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33303.md
|
||
|
CVE-2024-33304 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33304.md
|
||
|
CVE-2024-33305 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33305.md
|
||
|
CVE-2024-33306 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33306.md
|
||
|
CVE-2024-33307 - https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-33307.md
|
||
|
CVE-2024-33332 - https://github.com/wy876/cve/issues/3
|
||
|
CVE-2024-33338 - https://github.com/7akahash1/POC/blob/main/1.md
|
||
|
CVE-2024-33345 - https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware
|
||
|
CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md
|
||
|
CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/
|
||
|
CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc
|
||
|
CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15
|
||
|
CVE-2024-33424 - https://github.com/adiapera/xss_language_cmsimple_5.15
|
||
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.assets/image-20240420005017430.png
|
||
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/heap-buffer-overflow-1.md
|
||
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-1/poc
|
||
|
CVE-2024-33428 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-1
|
||
|
CVE-2024-33428 - https://github.com/stsaz/phiola/issues/29
|
||
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.assets/image-20240420011116818.png
|
||
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/heap-buffer-overflow-2.md
|
||
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/heap-buffer-overflow-2/poc/
|
||
|
CVE-2024-33429 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/heap-buffer-overflow-2
|
||
|
CVE-2024-33429 - https://github.com/stsaz/phiola/issues/30
|
||
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/poc/I2ZFI3~5
|
||
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.assets/image-20240420011601263.png
|
||
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/segmentFault-1/segmentFault-1.md
|
||
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1
|
||
|
CVE-2024-33430 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/segmentFault-1/poc
|
||
|
CVE-2024-33430 - https://github.com/stsaz/phiola/issues/28
|
||
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.assets/image-20240420004701828.png
|
||
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/flowPointException-1.md
|
||
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/blob/master/phiola/flowPointException-1/poc/I0I72U~G
|
||
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1
|
||
|
CVE-2024-33431 - https://github.com/Helson-S/FuzzyTesting/tree/master/phiola/flowPointException-1/poc
|
||
|
CVE-2024-33431 - https://github.com/stsaz/phiola/issues/27
|
||
|
CVE-2024-33435 - https://github.com/vulreport3r/cve-reports/blob/main/Ncast_Yingshi_has_RCE_vulnerabilities/report.md
|
||
|
CVE-2024-33436 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41
|
||
|
CVE-2024-33436 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33436
|
||
|
CVE-2024-33437 - https://github.com/mlgualtieri/CSS-Exfil-Protection/issues/41
|
||
|
CVE-2024-33437 - https://github.com/randshell/vulnerability-research/tree/main/CVE-2024-33437
|
||
|
CVE-2024-33438 - https://github.com/julio-cfa/CVE-2024-33438
|
||
|
CVE-2024-33443 - https://gist.github.com/LioTree/a81111fb0c598a920cb49aaf0bd64e58
|
||
|
CVE-2024-33443 - https://github.com/liu21st/onethink/issues/40
|
||
|
CVE-2024-33444 - https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152
|
||
|
CVE-2024-33444 - https://github.com/liu21st/onethink/issues/39
|
||
|
CVE-2024-33445 - https://gist.github.com/LioTree/04a4ece38df53af4027d52b2aeb7aff6
|
||
|
CVE-2024-33445 - https://github.com/hisiphp/hisiphp/issues/11
|
||
|
CVE-2024-3346 - https://github.com/Yu1e/vuls/blob/main/Byzro%20Networks%20Smart%20S80%20management%20platform%20has%20rce%20vulnerability.md
|
||
|
CVE-2024-33485 - https://github.com/CveSecLook/cve/issues/17
|
||
|
CVE-2024-33525 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
||
|
CVE-2024-33526 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
||
|
CVE-2024-33527 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
||
|
CVE-2024-33528 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
||
|
CVE-2024-33529 - https://insinuator.net/2024/05/security-advisory-achieving-php-code-execution-in-ilias-elearning-lms-before-v7-30-v8-11-v9-1/
|
||
|
CVE-2024-33530 - https://insinuator.net/2024/05/vulnerability-in-jitsi-meet-meeting-password-disclosure-affecting-meetings-with-lobbies/
|
||
|
CVE-2024-3366 - https://github.com/xuxueli/xxl-job/issues/3391
|
||
|
CVE-2024-33664 - https://github.com/mpdavis/python-jose/issues/344
|
||
|
CVE-2024-33669 - https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html
|
||
|
CVE-2024-33669 - https://help.passbolt.com/incidents/pwned-password-service-information-leak
|
||
|
CVE-2024-3368 - https://wpscan.com/vulnerability/ab78b1a5-e28c-406b-baaf-6d53017f9328/
|
||
|
CVE-2024-3376 - https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md
|
||
|
CVE-2024-33763 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
||
|
CVE-2024-33764 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
||
|
CVE-2024-33766 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
||
|
CVE-2024-33767 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
||
|
CVE-2024-33768 - https://github.com/keepinggg/poc/tree/main/poc_of_lunasvg
|
||
|
CVE-2024-3377 - https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md
|
||
|
CVE-2024-33771 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
||
|
CVE-2024-33772 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
||
|
CVE-2024-33773 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
||
|
CVE-2024-33774 - https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md
|
||
|
CVE-2024-3378 - https://vuldb.com/?submit.310642
|
||
|
CVE-2024-33788 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33788
|
||
|
CVE-2024-33789 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33789
|
||
|
CVE-2024-33792 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33792
|
||
|
CVE-2024-33793 - https://github.com/ymkyu/CVE/tree/main/CVE-2024-33793
|
||
|
CVE-2024-33820 - https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17
|
||
|
CVE-2024-33829 - https://github.com/xyaly163/cms/blob/main/1.md
|
||
|
CVE-2024-33830 - https://github.com/xyaly163/cms/blob/main/2.md
|
||
|
CVE-2024-33831 - https://github.com/YMFE/yapi/issues/2745
|
||
|
CVE-2024-33832 - https://github.com/helloxz/onenav/issues/186
|
||
|
CVE-2024-33835 - https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md
|
||
|
CVE-2024-33891 - https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3
|
||
|
CVE-2024-33899 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983
|
||
|
CVE-2024-33900 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838
|
||
|
CVE-2024-33901 - https://gist.github.com/Fastor01/30c6d89c842feb1865ec2cd2d3806838
|
||
|
CVE-2024-33905 - https://medium.com/@pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90
|
||
|
CVE-2024-3400 - https://security.paloaltonetworks.com/CVE-2024-3400
|
||
|
CVE-2024-3400 - https://unit42.paloaltonetworks.com/cve-2024-3400/
|
||
|
CVE-2024-34020 - https://bugzilla.suse.com/show_bug.cgi?id=1223534
|
||
|
CVE-2024-3405 - https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/
|
||
|
CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3
|
||
|
CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/
|
||
|
CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67
|
||
|
CVE-2024-3407 - https://wpscan.com/vulnerability/262348ab-a335-4acf-8e4d-229fc0b4972f/
|
||
|
CVE-2024-34070 - https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53
|
||
|
CVE-2024-34075 - https://github.com/xiboon/kurwov/security/advisories/GHSA-hfrv-h3q8-9jpr
|
||
|
CVE-2024-34082 - https://github.com/getgrav/grav/security/advisories/GHSA-f8v5-jmfh-pr69
|
||
|
CVE-2024-34196 - https://gist.github.com/Swind1er/1ec2fde42254598a72f1d716f9cfe2a1
|
||
|
CVE-2024-34200 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpQosRules
|
||
|
CVE-2024-34201 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig
|
||
|
CVE-2024-34202 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setMacFilterRules
|
||
|
CVE-2024-34203 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setLanguageCfg
|
||
|
CVE-2024-34204 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setUpgradeFW
|
||
|
CVE-2024-34206 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setWebWlanIdx
|
||
|
CVE-2024-34207 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setStaticDhcpConfig
|
||
|
CVE-2024-34209 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/setIpPortFilterRules
|
||
|
CVE-2024-34210 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_injection
|
||
|
CVE-2024-34212 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/CloudACMunualUpdate_overflow
|
||
|
CVE-2024-34215 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules
|
||
|
CVE-2024-34217 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/addWlProfileClientMode
|
||
|
CVE-2024-34218 - https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost
|
||
|
CVE-2024-34220 - https://github.com/dovankha/CVE-2024-34220
|
||
|
CVE-2024-34221 - https://github.com/dovankha/CVE-2024-34221
|
||
|
CVE-2024-34224 - https://github.com/dovankha/CVE-2024-34224
|
||
|
CVE-2024-34225 - https://github.com/dovankha/CVE-2024-34225
|
||
|
CVE-2024-34226 - https://github.com/dovankha/CVE-2024-34226
|
||
|
CVE-2024-34230 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34230.md
|
||
|
CVE-2024-34231 - https://github.com/Amrita2000/CVES/blob/main/CVE-2024-34231.md
|
||
|
CVE-2024-34246 - https://github.com/wasm3/wasm3/issues/484
|
||
|
CVE-2024-34249 - https://github.com/wasm3/wasm3/issues/485
|
||
|
CVE-2024-34250 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3346
|
||
|
CVE-2024-34251 - https://github.com/bytecodealliance/wasm-micro-runtime/issues/3347
|
||
|
CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483
|
||
|
CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md
|
||
|
CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m
|
||
|
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203
|
||
|
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063
|
||
|
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/security/advisories/GHSA-38gf-rh2w-gmj7
|
||
|
CVE-2024-34347 - https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr
|
||
|
CVE-2024-34352 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847
|
||
|
CVE-2024-34359 - https://github.com/abetlen/llama-cpp-python/security/advisories/GHSA-56xg-wfcc-g829
|
||
|
CVE-2024-3437 - https://vuldb.com/?id.259631
|
||
|
CVE-2024-34391 - https://research.jfrog.com/vulnerabilities/libxmljs-attrs-type-confusion-rce-jfsa-2024-001033988/
|
||
|
CVE-2024-34392 - https://github.com/libxmljs/libxmljs/issues/646
|
||
|
CVE-2024-34392 - https://research.jfrog.com/vulnerabilities/libxmljs-namespaces-type-confusion-rce-jfsa-2024-001034096/
|
||
|
CVE-2024-34393 - https://github.com/marudor/libxmljs2/issues/204
|
||
|
CVE-2024-34393 - https://research.jfrog.com/vulnerabilities/libxmljs2-attrs-type-confusion-rce-jfsa-2024-001034097/
|
||
|
CVE-2024-34394 - https://github.com/marudor/libxmljs2/issues/205
|
||
|
CVE-2024-34394 - https://research.jfrog.com/vulnerabilities/libxmljs2-namespaces-type-confusion-rce-jfsa-2024-001034098/
|
||
|
CVE-2024-34397 - https://gitlab.gnome.org/GNOME/glib/-/issues/3268
|
||
|
CVE-2024-34401 - https://www.exploit-db.com/exploits/51988
|
||
|
CVE-2024-34408 - https://github.com/Tencent/libpag/issues/2230
|
||
|
CVE-2024-3442 - https://vuldb.com/?id.259695
|
||
|
CVE-2024-3443 - https://github.com/zyairelai/CVE-submissions/blob/main/prison-xss.md
|
||
|
CVE-2024-34467 - https://github.com/top-think/framework/issues/2996
|
||
|
CVE-2024-34470 - https://github.com/osvaldotenorio/CVE-2024-34470
|
||
|
CVE-2024-34471 - https://github.com/osvaldotenorio/CVE-2024-34471
|
||
|
CVE-2024-34472 - https://github.com/osvaldotenorio/CVE-2024-34472
|
||
|
CVE-2024-34473 - https://jira.o-ran-sc.org/browse/RIC-1055
|
||
|
CVE-2024-34478 - https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455
|
||
|
CVE-2024-34483 - https://github.com/faucetsdn/ryu/issues/193
|
||
|
CVE-2024-34484 - https://github.com/faucetsdn/ryu/issues/194
|
||
|
CVE-2024-34486 - https://github.com/faucetsdn/ryu/issues/190
|
||
|
CVE-2024-34487 - https://github.com/faucetsdn/ryu/issues/192
|
||
|
CVE-2024-34488 - https://github.com/faucetsdn/ryu/issues/191
|
||
|
CVE-2024-34489 - https://github.com/faucetsdn/ryu/issues/195
|
||
|
CVE-2024-34515 - https://github.com/spatie/image-optimizer/issues/210
|
||
|
CVE-2024-34523 - https://github.com/piuppi/Proof-of-Concepts/blob/main/AChecker/CVE-2024-34523.md
|
||
|
CVE-2024-34532 - https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe
|
||
|
CVE-2024-34533 - https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data
|
||
|
CVE-2024-34534 - https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander
|
||
|
CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/
|
||
|
CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v
|
||
|
CVE-2024-3472 - https://wpscan.com/vulnerability/d42f74dd-520f-40aa-9cf0-3544db9562c7/
|
||
|
CVE-2024-3474 - https://wpscan.com/vulnerability/e5c3e145-6738-4d85-8507-43ca1b1d5877/
|
||
|
CVE-2024-3475 - https://wpscan.com/vulnerability/bf540242-5306-4c94-ad50-782d0d5b127f/
|
||
|
CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db64ccd/
|
||
|
CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/
|
||
|
CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/
|
||
|
CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/
|
||
|
CVE-2024-34899 - https://hackerdna.com/courses/cve/cve-2024-34899
|
||
|
CVE-2024-34914 - https://chmod744.super.site/redacted-vulnerability
|
||
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.assets/image-20240505161831080.png
|
||
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/dos_mmExhausted.md
|
||
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/blob/master/ncmdump/dos_mmExhausted/poc/I7K9QM~F
|
||
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted
|
||
|
CVE-2024-34953 - https://github.com/Helson-S/FuzzyTesting/tree/master/ncmdump/dos_mmExhausted/poc
|
||
|
CVE-2024-34953 - https://github.com/taurusxin/ncmdump/issues/19
|
||
|
CVE-2024-34954 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md
|
||
|
CVE-2024-34955 - https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md
|
||
|
CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer
|
||
|
CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md
|
||
|
CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md
|
||
|
CVE-2024-35011 - https://github.com/Thirtypenny77/cms/blob/main/8.md
|
||
|
CVE-2024-35012 - https://github.com/Thirtypenny77/cms/blob/main/7.md
|
||
|
CVE-2024-35048 - https://github.com/javahuang/SurveyKing/issues/56
|
||
|
CVE-2024-35049 - https://github.com/javahuang/SurveyKing/issues/55
|
||
|
CVE-2024-35050 - https://github.com/javahuang/SurveyKing/issues/57
|
||
|
CVE-2024-35099 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/V9.3.5u.6698_B20230810/README.md
|
||
|
CVE-2024-35108 - https://github.com/FirstLIF/cms/blob/main/1.md
|
||
|
CVE-2024-35179 - https://github.com/stalwartlabs/mail-server/security/advisories/GHSA-5pfx-j27j-4c6h
|
||
|
CVE-2024-3521 - https://github.com/garboa/cve_3/blob/main/Upload2.md
|
||
|
CVE-2024-3529 - https://vuldb.com/?id.259899
|
||
|
CVE-2024-3532 - https://vuldb.com/?id.259902
|
||
|
CVE-2024-3548 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/
|
||
|
CVE-2024-3567 - https://gitlab.com/qemu-project/qemu/-/issues/2273
|
||
|
CVE-2024-3580 - https://wpscan.com/vulnerability/31f401c4-735a-4efb-b81f-ab98c00c526b/
|
||
|
CVE-2024-3582 - https://wpscan.com/vulnerability/5a348b5d-13aa-40c3-9d21-0554683f8019/
|
||
|
CVE-2024-3590 - https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/
|
||
|
CVE-2024-3591 - https://wpscan.com/vulnerability/f85d8b61-eaeb-433c-b857-06ee4db5c7d5/
|
||
|
CVE-2024-3594 - https://wpscan.com/vulnerability/7a8a834a-e5d7-4678-9d35-4390d1200437/
|
||
|
CVE-2024-36052 - https://sdushantha.medium.com/ansi-escape-injection-vulnerability-in-winrar-a2cbfac4b983
|
||
|
CVE-2024-36080 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf
|
||
|
CVE-2024-36081 - https://www.westermo.com/-/media/Files/Cyber-security/westermo_sa_EDW-100_24-05.pdf
|
||
|
CVE-2024-3617 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md
|
||
|
CVE-2024-3618 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md
|
||
|
CVE-2024-3619 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md
|
||
|
CVE-2024-3620 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md
|
||
|
CVE-2024-3621 - https://github.com/zyairelai/CVE-submissions/blob/main/kortex-register_case-sqli.md
|
||
|
CVE-2024-3628 - https://wpscan.com/vulnerability/171af8eb-ceeb-403a-abc2-969d9535a4c9/
|
||
|
CVE-2024-3629 - https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/
|
||
|
CVE-2024-3630 - https://wpscan.com/vulnerability/cbab7639-fdb2-4ee5-b5ca-9e30701a63b7/
|
||
|
CVE-2024-3631 - https://wpscan.com/vulnerability/c59a8b49-6f3e-452b-ba9b-50b80c522ee9/
|
||
|
CVE-2024-3634 - https://wpscan.com/vulnerability/76e000e0-314f-4e39-8871-68bf8cc95b22/
|
||
|
CVE-2024-3637 - https://wpscan.com/vulnerability/33f6fea6-c784-40ae-a548-55d41618752d/
|
||
|
CVE-2024-3641 - https://wpscan.com/vulnerability/f4047f1e-d5ea-425f-8def-76dd5e6a497e/
|
||
|
CVE-2024-3642 - https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8/
|
||
|
CVE-2024-3643 - https://wpscan.com/vulnerability/698277e6-56f9-4688-9a84-c2fa3ea9f7dc/
|
||
|
CVE-2024-3644 - https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/
|
||
|
CVE-2024-3660 - https://kb.cert.org/vuls/id/253266
|
||
|
CVE-2024-3660 - https://www.kb.cert.org/vuls/id/253266
|
||
|
CVE-2024-3661 - https://news.ycombinator.com/item?id=40279632
|
||
|
CVE-2024-3661 - https://www.leviathansecurity.com/blog/tunnelvision
|
||
|
CVE-2024-3661 - https://www.leviathansecurity.com/research/tunnelvision
|
||
|
CVE-2024-3690 - https://github.com/psudo-bugboy/CVE-2024
|
||
|
CVE-2024-3691 - https://github.com/nikhil-aniill/Small-CRM-CVE
|
||
|
CVE-2024-3691 - https://vuldb.com/?submit.312975
|
||
|
CVE-2024-3692 - https://wpscan.com/vulnerability/6f100f85-3a76-44be-8092-06eb8595b0c9/
|
||
|
CVE-2024-3695 - https://vuldb.com/?id.260482
|
||
|
CVE-2024-3703 - https://wpscan.com/vulnerability/3242b820-1da0-41ba-9f35-7be5dbc6d4b0/
|
||
|
CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md
|
||
|
CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection
|
||
|
CVE-2024-3721 - https://vuldb.com/?id.260573
|
||
|
CVE-2024-3735 - https://vuldb.com/?submit.311153
|
||
|
CVE-2024-3745 - https://fluidattacks.com/advisories/gershwin/
|
||
|
CVE-2024-3748 - https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/
|
||
|
CVE-2024-3749 - https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/
|
||
|
CVE-2024-3752 - https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/
|
||
|
CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/
|
||
|
CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/
|
||
|
CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control
|
||
|
CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py
|
||
|
CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md
|
||
|
CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md
|
||
|
CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md
|
||
|
CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md
|
||
|
CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md
|
||
|
CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/
|
||
|
CVE-2024-3823 - https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/
|
||
|
CVE-2024-3824 - https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/
|
||
|
CVE-2024-3873 - https://vuldb.com/?submit.312623
|
||
|
CVE-2024-3874 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md
|
||
|
CVE-2024-3875 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md
|
||
|
CVE-2024-3876 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromVirtualSer.md
|
||
|
CVE-2024-3877 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromqossetting.md
|
||
|
CVE-2024-3878 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromwebExcptypemanFilter.md
|
||
|
CVE-2024-3879 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md
|
||
|
CVE-2024-3880 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md
|
||
|
CVE-2024-3881 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md
|
||
|
CVE-2024-3903 - https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/
|
||
|
CVE-2024-3905 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md
|
||
|
CVE-2024-3906 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md
|
||
|
CVE-2024-3907 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md
|
||
|
CVE-2024-3908 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md
|
||
|
CVE-2024-3909 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formexeCommand.md
|
||
|
CVE-2024-3909 - https://vuldb.com/?id.261145
|
||
|
CVE-2024-3910 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/fromDhcpListClient_page.md
|
||
|
CVE-2024-3917 - https://wpscan.com/vulnerability/88162016-9fc7-4194-9e81-44c50991f6e9/
|
||
|
CVE-2024-3918 - https://wpscan.com/vulnerability/2074d0f5-4165-4130-9391-37cb21e8aa1b/
|
||
|
CVE-2024-3920 - https://wpscan.com/vulnerability/2fb28c77-3c35-4a2f-91ed-823d0d011048/
|
||
|
CVE-2024-3928 - https://github.com/ggfzx/OCP-Security-Misconfiguration/tree/main
|
||
|
CVE-2024-3931 - https://vuldb.com/?id.261368
|
||
|
CVE-2024-3932 - https://vuldb.com/?submit.314381
|
||
|
CVE-2024-3940 - https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/
|
||
|
CVE-2024-3941 - https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/
|
||
|
CVE-2024-3948 - https://github.com/xuanluansec/vul/issues/5
|
||
|
CVE-2024-3979 - https://github.com/COVESA/vsomeip/files/14904610/details.zip
|
||
|
CVE-2024-3979 - https://github.com/COVESA/vsomeip/issues/663
|
||
|
CVE-2024-4019 - https://github.com/scausoft/cve/blob/main/rce.md
|
||
|
CVE-2024-4040 - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
|
||
|
CVE-2024-4040 - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
|
||
|
CVE-2024-4061 - https://wpscan.com/vulnerability/175a9f3a-1f8d-44d1-8a12-e037251b025d/
|
||
|
CVE-2024-4064 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md
|
||
|
CVE-2024-4065 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md
|
||
|
CVE-2024-4066 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md
|
||
|
CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md
|
||
|
CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md
|
||
|
CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md
|
||
|
CVE-2024-4114 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md
|
||
|
CVE-2024-4115 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formAddDnsForward.md
|
||
|
CVE-2024-4116 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelDhcpRule.md
|
||
|
CVE-2024-4117 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formDelPortMapping.md
|
||
|
CVE-2024-4118 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindAdd.md
|
||
|
CVE-2024-4119 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindDel.md
|
||
|
CVE-2024-4119 - https://vuldb.com/?id.261862
|
||
|
CVE-2024-4120 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formIPMacBindModify.md
|
||
|
CVE-2024-4121 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formQOSRuleDel.md
|
||
|
CVE-2024-4122 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetDebugCfg.md
|
||
|
CVE-2024-4123 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetPortMapping.md
|
||
|
CVE-2024-4124 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetRemoteWebManage.md
|
||
|
CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetStaticRoute.md
|
||
|
CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md
|
||
|
CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md
|
||
|
CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66
|
||
|
CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md
|
||
|
CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md
|
||
|
CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md
|
||
|
CVE-2024-4167 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_422AA4.md
|
||
|
CVE-2024-4168 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_4260F0.md
|
||
|
CVE-2024-4169 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_42775C.md
|
||
|
CVE-2024-4170 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_429A30.md
|
||
|
CVE-2024-4171 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromWizardHandle.md
|
||
|
CVE-2024-4172 - https://github.com/bigbigbigbaby/cms2/blob/main/1.md
|
||
|
CVE-2024-4236 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1803/formSetSysToolDDNS.md
|
||
|
CVE-2024-4237 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md
|
||
|
CVE-2024-4238 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md
|
||
|
CVE-2024-4239 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md
|
||
|
CVE-2024-4240 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md
|
||
|
CVE-2024-4241 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md
|
||
|
CVE-2024-4242 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md
|
||
|
CVE-2024-4243 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md
|
||
|
CVE-2024-4244 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md
|
||
|
CVE-2024-4246 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md
|
||
|
CVE-2024-4247 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md
|
||
|
CVE-2024-4248 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md
|
||
|
CVE-2024-4249 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md
|
||
|
CVE-2024-4250 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md
|
||
|
CVE-2024-4251 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md
|
||
|
CVE-2024-4252 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md
|
||
|
CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md
|
||
|
CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/
|
||
|
CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/
|
||
|
CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md
|
||
|
CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md
|
||
|
CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md
|
||
|
CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg
|
||
|
CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/
|
||
|
CVE-2024-4348 - https://vuldb.com/?submit.320855
|
||
|
CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19
|
||
|
CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/
|
||
|
CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/
|
||
|
CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/
|
||
|
CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md
|
||
|
CVE-2024-4492 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md
|
||
|
CVE-2024-4493 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md
|
||
|
CVE-2024-4494 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md
|
||
|
CVE-2024-4495 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md
|
||
|
CVE-2024-4497 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md
|
||
|
CVE-2024-4512 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss.md
|
||
|
CVE-2024-4528 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss2.md
|
||
|
CVE-2024-4536 - https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198
|
||
|
CVE-2024-4542 - https://research.cleantalk.org/cve-2024-3548/
|
||
|
CVE-2024-4542 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/
|
||
|
CVE-2024-4547 - https://www.tenable.com/security/research/tra-2024-13
|
||
|
CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13
|
||
|
CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13
|
||
|
CVE-2024-4585 - https://github.com/Hckwzh/cms/blob/main/16.md
|
||
|
CVE-2024-4586 - https://github.com/Hckwzh/cms/blob/main/17.md
|
||
|
CVE-2024-4587 - https://github.com/Hckwzh/cms/blob/main/18.md
|
||
|
CVE-2024-4588 - https://github.com/Hckwzh/cms/blob/main/19.md
|
||
|
CVE-2024-4589 - https://github.com/Hckwzh/cms/blob/main/20.md
|
||
|
CVE-2024-4590 - https://github.com/Hckwzh/cms/blob/main/21.md
|
||
|
CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md
|
||
|
CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md
|
||
|
CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md
|
||
|
CVE-2024-4594 - https://github.com/Hckwzh/cms/blob/main/25.md
|
||
|
CVE-2024-4645 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss4.md
|
||
|
CVE-2024-4653 - https://github.com/Hefei-Coffee/cve/blob/main/sql.md
|
||
|
CVE-2024-4654 - https://github.com/Hefei-Coffee/cve/blob/main/sql2.md
|
||
|
CVE-2024-4723 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_case-status.md
|
||
|
CVE-2024-4725 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_client_user.md
|
||
|
CVE-2024-4726 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_clients.md
|
||
|
CVE-2024-4727 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court-type.md
|
||
|
CVE-2024-4728 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_court.md
|
||
|
CVE-2024-4730 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_judge.md
|
||
|
CVE-2024-4732 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_service.md
|
||
|
CVE-2024-4735 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_tasks.md
|
||
|
CVE-2024-4738 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md
|
||
|
CVE-2024-4792 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md
|
||
|
CVE-2024-4793 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md
|
||
|
CVE-2024-4794 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md
|
||
|
CVE-2024-4795 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md
|
||
|
CVE-2024-4796 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md
|
||
|
CVE-2024-4797 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md
|
||
|
CVE-2024-4798 - https://github.com/Hefei-Coffee/cve/blob/main/sql5.md
|
||
|
CVE-2024-4817 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md
|
||
|
CVE-2024-4818 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md
|
||
|
CVE-2024-4819 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md
|
||
|
CVE-2024-4853 - https://gitlab.com/wireshark/wireshark/-/issues/19724
|
||
|
CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19782
|
||
|
CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19783
|
||
|
CVE-2024-4855 - https://gitlab.com/wireshark/wireshark/-/issues/19784
|
||
|
CVE-2024-4860 - https://www.tenable.com/security/research/tra-2024-16
|
||
|
CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30
|
||
|
CVE-2024-5046 - https://github.com/CveSecLook/cve/issues/32
|
||
|
CVE-2024-5047 - https://github.com/I-Schnee-I/cev/blob/main/SourceCodester%20Student%20Management%20System%201.0%20controller.php%20Unrestricted%20Upload.md
|
||
|
CVE-2024-5048 - https://github.com/BurakSevben/CVEs/blob/main/Budget%20Management%20App/Budget%20Management%20App%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2024-5049 - https://github.com/polaris0x1/CVE/issues/2
|
||
|
CVE-2024-5051 - https://vuldb.com/?id.264748
|
||
|
CVE-2024-5063 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20Authentication%20Bypass.md
|
||
|
CVE-2024-5064 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%202%20(Unauthenticated).md
|
||
|
CVE-2024-5064 - https://vuldb.com/?id.264923
|
||
|
CVE-2024-5065 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%203%20(Unauthenticated).md
|
||
|
CVE-2024-5066 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%204.md
|
||
|
CVE-2024-5069 - https://vuldb.com/?id.264926
|
||
|
CVE-2024-5093 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20Authentication%20Bypass.md
|
||
|
CVE-2024-5094 - https://github.com/BurakSevben/CVEs/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20SQL%20Injection%20-%202.md
|
||
|
CVE-2024-5097 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20CSRF.md
|
||
|
CVE-2024-5098 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-1.md
|
||
|
CVE-2024-5099 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md
|
||
|
CVE-2024-5100 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-3.md
|
||
|
CVE-2024-5101 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md
|
||
|
CVE-2024-5116 - https://github.com/polaris0x1/CVE/issues/3
|
||
|
CVE-2024-5117 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2024-5118 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2024-5119 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%202.md
|
||
|
CVE-2024-5120 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%203.md
|
||
|
CVE-2024-5121 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%202.md
|
||
|
CVE-2024-5122 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%204.md
|
||
|
CVE-2024-5123 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20Cross-Site-Scripting%20-%201.md
|
||
|
CVE-2024-5134 - https://github.com/BurakSevben/CVEs/blob/main/Electricity%20Consumption%20Monitoring%20Tool/Electricity%20Consumption%20Monitoring%20Tool%20-%20SQL%20Injection.md
|
||
|
CVE-2024-5135 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20SQL%20Injection%20-%201.md
|
||
|
CVE-2024-5136 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%201.md
|
||
|
CVE-2024-5137 - https://github.com/BurakSevben/CVEs/blob/main/Directory%20Management%20System/Directory%20Management%20System%20-%20Cross-Site-Scripting%20-%202.md
|
||
|
CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38
|